
EMEA expansion continues with one of South Africa’s largest distributors of technology
Cheyenne, Wyoming, 29 October 2019. BlackFog, Inc. today announced that they have signed a distribution agreement with Mustek Limited. to resell its data privacy and cybersecurity solution.
Mustek Limited, is one of the largest assemblers and distributors of personal computers and complementary ICT (Information Communications Technology) products in South Africa. Founded in 1987, its multi-national product portfolio includes: Acer, ASUS, Samsung, Lenovo, Brother, and Microsoft Volume Licensing, to name a few. Committed to offering new solutions and opportunities to enable growth for their partners, and to address the growing concerns around compliance and privacy, Mustek has decided to add BlackFog’s data privacy and cybersecurity solution to its portfolio.
“BlackFog is a welcome addition to our portfolio and it will offer unique value to our partners and their clients,” commented, Juan-Paul Gough – Enterprise Solutions Development Lead at Mustek. “Privacy is a major concern for organizations and consumers alike in this digital era and BlackFog has a unique approach to protecting it. Zero-day attacks are the black swans of the digital era and traditional antivirus solutions aren’t enough to protect against modern threats. BlackFog detects Fileless attacks in real-time, preventing attackers from removing or leaking any data and ultimately preventing attacks before they happen. Partners looking to add value to their customers will be able to leverage the BlackFog Enterprise platform to offer managed cyber security services.”
“We are very excited to partner with Mustek and to become one of their trusted brands. As one of the regions largest IT distributers we are confident that they are the right partner to help us continue our EMEA Expansion, said Dr. Darren Williams, CEO and Founder of BlackFog. We look forward to bringing BlackFog Privacy to their large and growing customer base in South Africa.”
About BlackFog
BlackFog is the leader in on device data privacy, data security and ransomware prevention. Our behavioral analysis and data exfiltration technology stops hackers before they even get started. Our cyberthreat prevention software prevents ransomware, spyware, malware, phishing, unauthorized data collection and profiling and mitigates the risks associated with data breaches and insider threats. BlackFog blocks threats across mobile and desktop endpoints, protecting organizations data and privacy, and strengthening regulatory compliance.
To learn more about BlackFog visit www.blackfog.com.
About Mustek
Mustek is one of the largest assemblers and distributors of Information Communication Technology products and complimentary solutions in South Africa. Mustek is the operational business division of the Mustek Limited Group (established in 1987), which also includes Rectron. By combining the best of local assembly capabilities of the Mecer brand with a multinational product portfolio via a broad range of tier one ICT brands, Mustek is focused on being the country’s ICT Supplier of Choice. Through the supply of configuration and customisation, tried and trusted best industry practices and competitive pricing, Mustek is positioned to service a wide range of technology needs.
For more information about Mustek and its proven track record of solution formulation and superior technical expertise, visit https://www.mustek.co.za
Related Posts
Microsegmentation: Strengthening Network Security Against Zero Day Exploits
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.
Patch Management: An Essential Part of Data Security
Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.
Layered Security – How a Defense-in-Depth Approach Guards Against Unknown Threats
Make sure your systems are fully protected from threats at every level by incorporating these six key layered security defense strategies.
Zero Trust Data Protection: Securing Your Data in a Perimeterless World
What should firms know about zero trust data protection and how can they ensure it is implemented effectively?
ZTNA vs VPN: Choosing the Right Secure Remote Access Solution
What are the pros and cons of ZTNA vs VPN remote access solutions and which should firms consider?
Zero Day Security Exploits: How They Work and How to Stay Safe
Learn about the risk posed by zero day security exploits and what firms can do to minimize their exposure to these issues.