Gijima is a proudly empowered South African Information and Communications Technology company listed on the JSE. It has gained recognition as the complete ICT partner to a considerable client base of large technology users in both the public and private sectors.
(034) 314-81... SHOW
Pender & Associates
Durban North, South Africa
Remote ICT Support & Cyber Security Protection Services. Trust us to secure your ICT assets and protect your data against cyber threats. Our clients range from State Owned Enterprises to Large Corporates to Small Businesses and Private Individuals. We are passionate about cyber security, and strive to keep abreast of new and emerging ICT technologies and cyber threats. We provide bespoke cyber security services and remote ICT support mainly in South Africa, the UK, Italy and the USA, but are able to support you wherever you are. We would very much like to provide you with the Network, Cyber Security Protection and ICT support to suit your requirements. Our Cyber Security and End Point Detection & Response is based on the SentinelOne platform and we deploy remote agents to your Windows, Mac or Linux PCs or Servers, to provide a managed endpoint cyber security service to mitigate malware, ransomware and other Day Zero cyber-attacks..
(031) 563-60... SHOW
Lantech I.T Innovations
Durban, South Africa
Our DOE Software runs on a highly secured Linux platform which is specifically designed to spool Windows images to desktops. The end user pc uses boot from LAN technology to load the Windows operating system from the DOE Server as they do not require physical hard disk drives. The windows operating system being an image on the Linux server cannot be altered or affected in any way by the end user or by anything else, e. g. viruses, hacking, crashing, registry corruption, hard disk failures, etc, etc. The Linux server can accommodate up to 100 client pc's running on gigabit LAN. Operating system speed is never compromised as the image is never altered or affected in any way. Users can have customised individual profiles & can log on to any Windows Server. Additional software can be added in an instant to the image. Any corrupt image can be rolled back to a known working copy via the server rollback option. Remote access is also possible through the server. Internet ac