EMEA expansion continues with one of South Africa’s largest distributors of technology
Cheyenne, Wyoming, 29 October 2019. BlackFog, Inc. today announced that they have signed a distribution agreement with Mustek Limited. to resell its data privacy and cybersecurity solution.
Mustek Limited, is one of the largest assemblers and distributors of personal computers and complementary ICT (Information Communications Technology) products in South Africa. Founded in 1987, its multi-national product portfolio includes: Acer, ASUS, Samsung, Lenovo, Brother, and Microsoft Volume Licensing, to name a few. Committed to offering new solutions and opportunities to enable growth for their partners, and to address the growing concerns around compliance and privacy, Mustek has decided to add BlackFog’s data privacy and cybersecurity solution to its portfolio.
“BlackFog is a welcome addition to our portfolio and it will offer unique value to our partners and their clients,” commented, Juan-Paul Gough – Enterprise Solutions Development Lead at Mustek. “Privacy is a major concern for organizations and consumers alike in this digital era and BlackFog has a unique approach to protecting it. Zero-day attacks are the black swans of the digital era and traditional antivirus solutions aren’t enough to protect against modern threats. BlackFog detects Fileless attacks in real-time, preventing attackers from removing or leaking any data and ultimately preventing attacks before they happen. Partners looking to add value to their customers will be able to leverage the BlackFog Enterprise platform to offer managed cyber security services.”
“We are very excited to partner with Mustek and to become one of their trusted brands. As one of the regions largest IT distributers we are confident that they are the right partner to help us continue our EMEA Expansion, said Dr. Darren Williams, CEO and Founder of BlackFog. We look forward to bringing BlackFog Privacy to their large and growing customer base in South Africa.”
About BlackFog
BlackFog is the leader in on device data privacy, data security and ransomware prevention. Our behavioral analysis and data exfiltration technology stops hackers before they even get started. Our cyberthreat prevention software prevents ransomware, spyware, malware, phishing, unauthorized data collection and profiling and mitigates the risks associated with data breaches and insider threats. BlackFog blocks threats across mobile and desktop endpoints, protecting organizations data and privacy, and strengthening regulatory compliance.
To learn more about BlackFog visit www.blackfog.com.
About Mustek
Mustek is one of the largest assemblers and distributors of Information Communication Technology products and complimentary solutions in South Africa. Mustek is the operational business division of the Mustek Limited Group (established in 1987), which also includes Rectron. By combining the best of local assembly capabilities of the Mecer brand with a multinational product portfolio via a broad range of tier one ICT brands, Mustek is focused on being the country’s ICT Supplier of Choice. Through the supply of configuration and customisation, tried and trusted best industry practices and competitive pricing, Mustek is positioned to service a wide range of technology needs.
For more information about Mustek and its proven track record of solution formulation and superior technical expertise, visit https://www.mustek.co.za
Share This Story, Choose Your Platform!
Related Posts
The Salesforce Breach Wave Of 2025: Google, Workday, And Salesloft
Analysis of the 2025 Salesforce breach wave at Google, Workday, and Salesloft, highlighting SaaS risk, identity abuse, and data exfiltration.
AI Endpoint Security: Smarter Protection for Smarter Threats
Find out why businesses should be considering AI endpoint security solutions and what benefits can these offer over legacy EDR tools.
Why Enterprise Endpoint Security Needs To Be Smarter, Faster And Scalable
Discover why large organizations need scalable, adaptive enterprise endpoint security solutions that protect diverse devices and environments.
EDR vs XDR: What’s The Difference, And Where Does ADX Fit In?
Understanding the difference between EDR vs XDR is essential when determining which endpoint security solutions are best for your business.
5 Steps To Effective Endpoint Management
Endpoint management plays a vital role in protecting businesses from inbound threats and data loss. Learn best practices to secure devices.
How Intrusion Prevention Systems Are Evolving with AI And Machine Learning
What should firms look for when considering a modern, AI-assisted intrusion prevention systems?