Customers who have deployed the Respond Analyst see:

  • 10x reduction in security incidents that need incident response
  • 24×7 security monitoring without hiring a team of analysts
  • More accuracy
  • Higher productivity
  • Time saved NOT investigating false positives
  • Reduced pressure on the team
  • Improved effectiveness and efficiency in incident response activities

Zenith Systems

Based in Johannesburg, Zenith Systems has focused on supplying, implementing and supporting Cyber Security Solutions in Africa for 9 years. We have implemented solutions in South Africa, Botswana, Zimbabwe and Nigeria, to name but a few.

Our customers range from the largest banks and financial services companies thorugh to manufacturing, transportation, healthcare and government.



At OneNeck® IT Solutions, our commitment is to be an expert provider of hybrid IT solutions tailored for mid-market and enterprise companies and to provide high-touch customer service. Through a single point of accountability, OneNeck offers end-to-end, enterprise-class IT solutions, including cloud and hosting solutions, managed services, enterprise application management, professional services, IT hardware and top tier data centers.



At Veristor, we can help you chart a course for technology transformation that is custom built for the business and IT challenges you face. Our experts specialize in integrating technology seamlessly into your infrastructure and operation, and we’ve hand-picked a complete set of hardware and software solutions that can help you evolve for tomorrow, starting today.



EverSec Group is the trusted security advisor to over 200 clients, most of them representing the world’s largest brand names. EverSec supports the Network/Infrastructure Security, Cyber, IR, InfoSec, and Security Operations Center teams across those customers, to ensure their targeted environments are kept safe.


Saltworks Security

Saltworks Security is an application security company that partners with organizations to build world class application security programs from Policy to Production.


Castle Ventures Corporation

Castle Ventures is a cyber security company focused on positioning you to optimize your defense to a cyber-attack and data loss. We are a Managed Security Service Provider with an unwavering commitment to identifying and protecting your critical data. Our team has extensive technical expertise and we have a knack for integrating security systems. Through our unique approach and proprietary tools, we provide visibility about your data to enable you to make clear information security decisions



TSPi help customers improve efficiency, increase performance, and meet their mission. Utilizing agile development methodology and an iterative implementation approach we ensure rapid and efficient delivery of solutions that are thoroughly tested and proven to work to our customer's high standards and requirements.


CyberPeak Solutions

Cyberpeak Solutions helps organizations optimize their current cybersecurity products so they can realize a full return on investment. Once optimized you will have a clear picture of gaps and needs to ensure new purchases are targeted and strategic. We bring clarity to your security gaps and stop the constant cycle of needing to purchase new solutions.



Optiv Security is a security solutions integrator that enables clients to reduce risk by taking a strategic approach to cybersecurity. Align your security program to achieve specific business outcomes with our full suite of service capabilities, from strategy to technology—and everything in between.



At SecureNation, our mission is to be the Network Security Advocate and Technology Ally of our clients in order to provide them with the best possible solution at the best possible price.



SoftwareONE is a leading global platform, solutions and services provider with 30 years of experience in software and technology. Our offering spans from software licensing and procurement to software lifecycle management and every aspect of cloud-first advisory, delivery and managed solutions. We have the expertise to support our clients throughout their technology roadmap in today’s digital world.



Technology leaders are being asked to deliver business outcomes at scale and reduce costs without enough time, people, or budget. Trace3 understands that. We’ve built a business to help you deliver those outcomes and keep up with the rate of change.



Our mission is simple: to create IT solutions that drive business outcomes.



ThetaPoint is a leading provider of strategic consulting and managed security engineering services. We help clients plan, build and run successful SIEM and Log Management platforms in support of optimizing their SOC. We do this in conjunction with leading technology providers to properly align capabilities to our client’s needs. Recognized for our unique technical experience, in addition to our ability to quickly and rapidly solve complex cybersecurity challenges, ThetaPoint partners with some of the largest and most demanding clients in the commercial and public sector.


Red River

Red River brings together the ideal combination of talent, partners and products to disrupt the status quo in technology and drive success for business and government in ways previously unattainable. Red River serves organizations well beyond traditional technology integration, bringing more than 20 years of experience and mission-critical expertise in security, networking, analytics, collaboration, mobility and cloud solutions. Learn more at



DeFY is a boutique shop with more than 20 years of experience. Because we are 100% focused on and dedicated to Cyber Security, you can count on us to always offer the most reliable and innovative security technologies on the market. We specialize in enterprise solutions and providing a unique, customer-centric approach that aligns with our clients’ needs and goals.


Cyber Watch

Cyber Watch Systems is a consulting company. From selecting the best products and solutions to easing the transition for your team, we work with you every step of the way. Lean on us to protect your company from internal and external threats with next-generation technologies. It's time you were confident your data stays protected!



Our elite team of cybersecurity practitioners deliver solutions tailored to your business that minimize gaps, prevent vulnerabilities and optimize resources.


ICM Cyber

Meeting today's security challenges requires a multi-layered approach. At ICM Cyber we take pride in helping our customers achieve secure environments so their business can function properly. ICM Cyber partners with today's technology leaders to deliver robust real world solutions with a common sense approach.


World Wide Technologies

At WWT, we use a proven and innovative approach to help our customers discover, evaluate, architect and implement advanced technology lab testing in our Advanced Technology Center and deploy their solutions rapidly through our global integration centers. But what truly sets us apart is our extraordinary team of highly certified professionals, every one committed to our customers’ long-term goals and success.