Datacentrix is an ICT solutions provider that uses technology and services to deliver business value to organisations. We partner with our customers, equipping them with valuable insight and help them to align their technology undertakings with their
(031) 267-17... SHOW
Pender & Associates
Durban North, South Africa
Remote ICT Support & Cyber Security Protection Services. Trust us to secure your ICT assets and protect your data against cyber threats. Our clients range from State Owned Enterprises to Large Corporates to Small Businesses and Private Individuals. We are passionate about cyber security, and strive to keep abreast of new and emerging ICT technologies and cyber threats. We provide bespoke cyber security services and remote ICT support mainly in South Africa, the UK, Italy and the USA, but are able to support you wherever you are. We would very much like to provide you with the Network, Cyber Security Protection and ICT support to suit your requirements. Our Cyber Security and End Point Detection & Response is based on the SentinelOne platform and we deploy remote agents to your Windows, Mac or Linux PCs or Servers, to provide a managed endpoint cyber security service to mitigate malware, ransomware and other Day Zero cyber-attacks..
(031) 563-60... SHOW
Lantech I.T Innovations
Durban, South Africa
Our DOE Software runs on a highly secured Linux platform which is specifically designed to spool Windows images to desktops. The end user pc uses boot from LAN technology to load the Windows operating system from the DOE Server as they do not require physical hard disk drives. The windows operating system being an image on the Linux server cannot be altered or affected in any way by the end user or by anything else, e. g. viruses, hacking, crashing, registry corruption, hard disk failures, etc, etc. The Linux server can accommodate up to 100 client pc's running on gigabit LAN. Operating system speed is never compromised as the image is never altered or affected in any way. Users can have customised individual profiles & can log on to any Windows Server. Additional software can be added in an instant to the image. Any corrupt image can be rolled back to a known working copy via the server rollback option. Remote access is also possible through the server. Internet ac