Renewable energy provider raises USD $3.5M financing for Nigerian expansion

Renewable energy provider raises USD $3.5M financing for Nigerian expansion

Power-as-a-Service Leader Rensource Raises $3.5M financing for Nigerian expansion.

Rensource, a Lagos-based distributed energy provider, announced that it has raised $3.5 million USD in bridge financing to grow its power-as-a-service renewable energy business by expanding across Nigeria.

According to the company, the funds will be put towards growing the Rensource team, expanding Nigeria operations into Kano and Abuja, and widening its product base. In addition, this investment will allow Rensource to launch its B2B focused Powered by Rensource offering, a new service that aims to enable businesses throughout Nigeria to leverage Rensource’s infrastructure to pursue energy independence.

The round was led by Amaya Capital Partners. Other key investors included the Omidyar Network and CRE Venture Capital.

“Off-grid power is the future of the energy industry and probably the only way through which many people and small businesses will be able to access power for their everyday needs at an affordable price,” said Sundeep Bahanda of Amaya Capital Partners. “We are excited to support Rensource in our joint endeavours to help build the continent’s leading off-grid business and provide electricity to millions of people across Africa,” he added.

Rensource, founded in 2015, is a Nigerian provider of predictable energy on-demand in a region hindered by insufficient power infrastructure. According to the company, its tiered, subscription-based energy service offers clean, quiet, seamless power, freeing households and businesses from unreliable public energy providers and toxic diesel generators. The funding now positions Rensource for profitable growth in the Power-as-a-Service renewable energy market in West Africa.

“This investment further affirms the growing consensus that renewables-based distributed energy generation — taking power to the people — is the future of Nigeria’s power industry. Rensource is uniquely placed to lead this charge. We’re excited to welcome Amaya Capital and the Omidyar Network on this journey and are proud to be enabling Nigerians’ power independence,” says Anu Adasolum, General Manager of Rensource.

Nigerian households and businesses spend an estimated $14 billion per year generating their own power using energy from diesel generators is neither affordable nor sustainable. Mini-grids and home solar PV systems represent a $9.2 billion a year market opportunity, saving Nigerians $4.4 billion in energy costs annually. The country’s Rural Electrification Agency (REA) plans to rollout 1,200 mini-grids to serve 200,000 households and 50,000 businesses.

“Each investment we receive is an endorsement of our core belief that distributed power generation will be a critical element in solving the power problem in Nigeria,” says Bola Ogidan, Chief Revenue Officer at Rensource. “The social benefits and positive ramifications will be something to behold and we at Resource are proud to be playing our part in what could be a true energy revolution.”

Rensource previously raised a $1.1 million USD seed round also funded by CRE Venture Capital and Sissili Limited, among others.

By Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico

BBM partners with Digitata Insights to launch Invite2Win

BBM partners with Digitata Insights to launch Invite2Win

Matthew Talbot, CEO of Creative Media Works.

Creative Media Works, operating as BBM, has partnered with Digitata Insights, a digital transformation agency specialising in mobile gamification, to launch the Invite2Win airtime service within its BBM Discover menu and a Vodacom USSD game. The Invite2Win USSD game is accessible on the Vodacom gaming menu and is also part of Vodacom’s USSD gamification offering.

New and existing Vodacom subscribers who play the Invite2Win game are offered free airtime and a chance to win R1000 cash every month through BBM Discover.

Matthew Talbot, CEO of Creative Media Works, the company which operates and runs BBM Consumer globally, says: “This is a great initiative encouraging users to invite friends to download and enjoy the latest and improved version of BBM Messenger. We’ve added new features, content and services, but more importantly, through the Invite2Win service, we are addressing the need for airtime in South Africa.”

Talbot added that Invite2Win complements the other content and services in Discover such as Uber, Rewards, Girl Talk, Football365, HotelsCombined, News, Games, DiscoverTV, Stickers and Channels.

According to Digitata Insights, South Africa’s largest operator Vodacom, receives an average of 20 million visitors on their star dial menu every month. Invite2Win airtime offers users an opportunity to win R1000 cash and daily airtime prizes for new users strictly coming from playing the USSD trivia game who install BBM Messenger and register in Invite2Win.

If you are a Vodacom subscriber, to participate in the ‘Invite2Win airtime’ experience, dial *117*4863# from any Android or iOS device.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Cyber risk management: Top responsibilities of C-level employees in 2018

Cyber risk management: Top responsibilities of C-level employees in 2018

Cyber risk management: Top responsibilities of C-level employees in 2018.

Although most companies have invested in IT security solutions to protect their networks and data, these tend to focus on mitigating the most common threats like viruses and malware and fall short of addressing more sinister risks such as fraud, identity theft and espionage.

These are damaging threats that can put a company’s reputation and business continuity at risk and can have serious financial implications. It is only when IT security-related risks are considered as business risks that the relevance of addressing them with proactive, strategic and appropriate solutions really becomes apparent – and this has to come from the top.

“Cyber risks should be treated as business risks and should form part of a company’s overall risk management strategy. This has to be a top-down drive; from C-level employees, for whom the cost of a breach or leak is highest, to everyone else in the organisation that has access to information systems,” says Charl Ueckermann, CEO at AVeS Cyber Security.

Cybercrime is burgeoning rapidly, not only in volume but sophistication as well; while 70% of threats faced by enterprises are known, 30% are unknown, advanced threats that traditional signature-based security technologies alone cannot tackle.

Cybercriminals are also becoming far more discerning and are targeting their attacks. Though more targeted, they often employ basic methods to implement their attacks. These methods can include social engineering, stealing of employee credentials, imitating legitimate software or even using malware covered by a stolen certificate to infiltrate systems. Ransomware, a type of malware that encrypts data and either prevents or limits users from accessing their systems, is typically targeted at C-level employees as well as departments dealing with sensitive information, such as accounts and human resource departments. These types of advanced, targeted cyber incidents are becoming more prevalent – even in South Africa.

“With this in mind, it becomes quite clear that organisations need a multi-disciplinary approach that is aligned with their specific risk management requirements and includes the implementation of appropriate IT security solutions, ongoing monitoring, analysis of IT security intelligence, and employee education. Regardless of how expensive or robust the IT security technologies are, they will not be fully effective unless everybody throughout the enterprise, starting at the top, understands the risks and supports the IT security strategy,” says Ueckermann.

He offers this advice to C-level employees for managing IT security risks to their organisations:

  1. Understand that the threat landscape has changed and keeps on changing. With cyber security threats and the associated business risks increasing, treat IT security risks as business risks. Traditional, signature-based security technologies are not enough to address these risks; don’t bring a knife to a gun fight.
  2. Be pro-active and prepared to avoid reactive firefighting after a breach or leak. Consult with IT security experts to help identify potential risks and implement the most appropriate and effective solutions to support your risk management strategy.
  3. Understand that it is impossible to predict exactly how your systems might be attacked or threatened. You need an adaptive system with machine learning and pattern recognition capabilities, to deal with evolving threats.
  4. Aim for Machine / Man symbiosis; use computers for their strengths, but don’t neglect to leverage the intuition of your people. There are things a computer can do that even the smartest person in the world can’t, but there are things a child can do that a computer cannot.
  5. Get expert advice and support to understand, defend and deal with advanced threats like zero-day attacks.
  6. Conduct regular vulnerability assessments of your IT infrastructure. This will help you to uncover the loopholes in your organisation’s security architecture and avoid damage that could be caused by cyber-attacks.
  7. More than 80% of all cyber incidents are caused by human error.2 Make sure all employees are trained and are informed of risks that can occur. Companies lose money recovering from staff-related incidents, yet education and training programmes intended to prevent these problems are limited, and they usually fail to engender the desired behaviour and motivation. When employees are educated about the potential risks associated with clicking on links in emails, responding to phishing mails, connecting unsecured devices to company IT resources or sharing access credentials, they are less likely to put systems in danger.

“To put organisations at ease, there are various computer-based training products available that leverage modern learning techniques and address all levels of the organisational structure”, says Ueckermann.

“Every individual in the organisation using a computer is responsible for IT security, not just the IT department. Cybersecurity awareness and education are, therefore, fundamental to the effectiveness of your risk management strategy,” he concludes.

Edited By: Darryl Linington
Follow @DarrylLinington on Twitter
Follow on Twitter

Powered by WPeMatico

Facebook bans cyrptocurrency related ads

Facebook bans cyrptocurrency related ads

Facebook bans cyrptocurrency related ads.

On 31 January 2018, Facebook, in a post online, revealed that the platform will no longer be showing advertisements about crptocurrencies, Initial Coin Offerings (ICO) or any other related financial products.

In the statement Rob Leathern, Product Management Director at Facebook said, “Two of our core advertising principles outline our belief that ads should be safe, and that we build for people first. Misleading or deceptive ads have no place on Facebook.”

He added that the platform has now created a new policy that prohibits ads that promote financial products and services that are frequently associated with misleading or deceptive promotional practices, such as binary options, initial coin offerings and cryptocurrency.

Leathern explained that the company does not want people to fall victim to scams and deception through Facebook ads. He did, however, add that: “there are many companies who are advertising binary options, ICOs and cryptocurrencies that are not currently operating in good faith.”

The broad spectrum of the policy is intentional according to the company.

“We also understand that we may not catch every ad that should be removed under this new policy, and encourage our community to report content that violates our Advertising Policies. People can report any ad on Facebook by clicking on the upper right-hand corner of the ad. This policy is part of an ongoing effort to improve the integrity and security of our ads, and to make it harder for scammers to profit from a presence on Facebook,” concluded Leathern.

By Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico

Reunert expands broadband connectivity market with SkyWire acquisition

Reunert expands broadband connectivity market with SkyWire acquisition

Reunert expands broadband connectivity market with SkyWire acquisition.

Electronics and electrical engineering company, Reunert, has announced that it intends to fully acquire SkyWire Technologies. SkyWire, a wireless broadband service provider, predominantly serves business customers and has an extensive national network. The acquisition strengthens Reunert’s focus on building its portfolio of earlier life cycle businesses in growth markets. SkyWire will form part of Reunert’s ICT segment, which includes Nashua and ECN.

This acquisition complements the ICT segment’s expansion strategy to increase its traditional suite of products and services to include broadband connectivity. The segment currently delivers solutions to over 40,000 existing B2B customers. Adding SkyWire to the communications cluster of the business provides an excellent overlap with Nashua and ECN’s distribution network of 37 franchises and 320 dealers. By leveraging the Nashua and ECN brands and market positions, SkyWire will have a wider network for allowing the rapid deployment of broadband connections.

“SkyWire is a successful broadband provider that has displayed impressive growth over the past number of years. Their existing customer base and products will allow Reunert to enter the fixed wireless broadband market as a significant player,” says Alan Dickson, CEO of Reunert. “Our access to additional customers and distribution will allow SkyWire to add further scale to its business. SkyWire also has expansion plans underway into other African territories. Reunert will assist with these ambitions, ultimately contributing towards growing our revenue base outside of South Africa”.

SkyWire founding members, Mondi Hattingh and Jaco Visagie, will stay in the business. “The entire SkyWire team is very excited by the opportunities this deal brings to our business”, says Hattingh who is equally enthusiastic about the transaction. “Our services will immediately gain the benefit of one of the most successful ICT sales channels in the country and the company will become part of a major South African listed entity, which brings all the stability and skills a fast-growing business like ours requires at this stage of our life cycle”.

The SkyWire business, brand and channel will remain as an independent business unit within the Communications Cluster of Reunert’s ICT Segment. The transaction is subject to final conditions precedent and the necessary regulatory approvals. Reunert aims to have the transaction concluded by the end of February 2018, with the business operating as a full subsidiary.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Johannesburg IoT conference attracts leading speakers and guests

Johannesburg IoT conference attracts leading speakers and guests

IOTFA 2018 To Attract Top Class Speakers And Guests.

The second edition of IoT Forum Africa 2018 (#IOTFA2018), slated for the 14th and 15th of March 2018 in Johannesburg, South Africa, will bring together an array of thought leaders, visionaries and experts who will  share their knowledge of real-world IoT trends, challenges and solutions.

IoT Forum Africa 2018 will feature industry tracks with speakers discussing the potential impact of IoT in manufacturing, energy, finance, transportation, retail, security and mining.

Under the theme, “Powering a new era of operational transformation”, IT leaders and senior executives will have the chance to hear from over 30 expert speakers who will showcase the leading developments in IoT.

Testimonials on IOTFA 2017:
Skhumbuzo Mhlongo (BCX): What I liked mostly was to interact with some of the industry leaders and to look at some of the drivers of technology’s adoption. The whole session of interacting with other operators was actually quite refreshing because some of it gave you a view to where this thing is going. 

Jula Wedler (Altech): It was an excellent event, it was very focused so the kind of customers we got and the discussions that we had was so focused, there was not much in the way of time wasting. I wouldn’t say it was quantity but it was quality. It was very beneficial for us and definitely money well spent.

Sean Laval (Comsol Networks): We found the event very valuable. The quality of the speakers was very good, the panels were good. We also found that we engaged with the right customer base and we look forward to IoT Forum Africa 2018.

Key topics at this conference will include:

  • IOT strategies to unlock true business value
  • The Smart Citizen’s role in creating a Smart City
  • Realising positive outcomes and digital transformation with IoT
  • IoT and Blockchain Convergence – Benefits and Challenges
  • The Security of Things in a Connected World
  • How AI drives IoT to the next level
  • IoT data analytics for intelligent decision making
  • The next edition of IoT Forum Africa will feature tracks with participants discussing the potential impact of IoT in manufacturing, energy, finance, transportation, retail, security and mining.

Confirmed Speakers include:

  • Aki Anastasiou, Host of Technobyte on Radio 702 (conference host)
  • Yolisa Kani, Public Policy Head SA: Uber
  • Abdul Baba, Group IT Director at TBWA Africa
  • Xolani Hadebe, IT Director and CIO at University of Pretoria
  • Dr Gaurav Pradhan, CIO at Time Tunnel Consulting
  • Luyanda Ndlovu, CIO at Department of Public Service and Administration
  • George Kalebaila, Director, Telecoms & IoT – Africa at IDC
  • Liza (Richard) Tillman, Head of IT Operations at Sanlam
  • Dr. Ricky Swanepoel, Chief Technologist at Eskom
  • Ian Keller, Group CISO at Discovery Limited
  • Vimbai Muzofa, Head: Interbank & RTGS at Standard Bank Group

For more information visit 

Follow twitter updates on @iotforumafrica

Staff Writer

Powered by WPeMatico

Digitising the supply chain in an exponential world

Digitising the supply chain in an exponential world

Digitising the supply chain in an exponential world.

COOs and supply chain management are feeling the brunt of an accelerating business environment further complicated by increasing customer demands for efficiency, personalisation, and convenience. Slow manual processes based on inconsistent information across functional areas spell death for modern supply chain management, with an inability to adapt in real time to changing demands leading to subpar customer service and potential attrition.

To address these risks, companies are increasingly looking to digitise their supply chains by implementing a cloud-based digital platform that optimises traditional ERP processes while integrating new exponential technologies.

Cloud-based platforms that enable real-time decision making based on accurate big data – generated through traditional processes as well as the growing prevalence of sensors – and predictive analytics powered by machine learning is changing the way companies approach supply chain management. Accenture predicts that the SaaS for supply chain management market will reach US$4.4-billion in 2018, driven by a need to simplify and optimise today’s complex global supply chain networks.

The value proposition is clear: studies by the Boston Consulting Group find that leaders in digital supply chain management enjoy increases in product availability of up to 10%, more than 25% faster response times to changes in market demand, and 40%-110% higher operating margins.

The exponential technologies driving supply chain innovation
Big data matched with real-time predictive analytics is enabling large-scale scenario analysis to give COOs the power to conduct accurate demand forecasting, capacity planning, and advanced procurement with a focus on collaborative optimisation.

With the adoption of sensor technology in every facet of the supply chain and the availability of reliable all-time localisation through GPS, GSM and Galileo-based positioning gives COOs greater data regarding stock opening, temperature, humidity, and more, allowing greater optimisation of existing processes.

Automation through advanced machine learning algorithms that leverage process and sensor data is gradually leading to near-perfect accuracy in process decision making as human judgement is augmented and, in some cases, replaced. By automating supply chain procurement processes through best practice machine learning, COOs and supply chain managers can eliminate opportunities for error and ensure effective event and risk management based on expert systems.

However, the job of the COO and his supply chain management support to lead the organisation into this exponential future is complicated by the need to manage the implications of digital transformation while simultaneously innovating the underlying business model.

The digital transformation imperative
Digitising the supply chain enables companies to integrate, embed intelligence, and visualise all supply chain processes from supplier to customer. This opens the door to live inventory management through a redesigned data model that finally provides true transparency on inventory flows. Placing a digital core at the centre of all supply chain management processes further enables expansive “what-if” and scenario planning to identify opportunities for meeting potential market demand with high levels of service at low cost.

Manufacturing costs are also reduced as detailed constrained planning and scheduling enables agility within the supply chain and optimises the efficient use of capacity.

A traditional ERP simply cannot keep pace with the rate of change and the need to innovate and optimise quickly, accurately, and cost-effectively. Delivery commitments based on outdated data leading to cancelled or delayed orders; inaccurate order prioritisation resulting in unfulfilled strategic customer orders; and difficulties with addressing last-minute rescheduling by priority customers are only a few of the risks companies face when relying on an outdated technology platform for supply chain decision-making.

The business outcomes of digitising the supply chain
With exponential technologies such as IoT, big data, predictive analytics and machine learning integrated to the SAP S/4HANA digital platform, COOs and supply chain management can leverage rule-based allocation check in a single system to ensure the needs of strategic customers are always met. Up-to-date inventory management ensures realistic fulfilment commitments and real-time order confirmations, with advanced segmentation techniques driving business profitability in unprecedented ways.

The business outcomes can be transformative: reducing days of inventory by 10-12%, reducing revenue loss by 10-15%, cutting total logistics costs by 10-12%, and reducing supply chain planning costs by up to 5%. Critically, digitising the supply chain enables companies to run simpler and shift focus more toward innovation – both in terms of improving existing processes as well as developing entirely new business models and revenue streams.

But with a recent Forrester Business Technographic Survey showing only 27% of supply chain management professionals and 22% of logistics and distribution personnel using or planning to use big data analytics, the real question is: will COOs rise to the challenge of digitising their supply chain in time to adapt to an exponential world?

By Mehmood Khan, Chief Operating Officer at SAP Africa

Powered by WPeMatico

Social Media: The latest hunting ground for cyber criminals

Social Media: The latest hunting ground for cyber criminals

Social media the latest hunting ground of cyber criminals (image: ePublicist)

As social media continues to gain prominence amongst South African consumers, platforms like Instagram, Youtube, Facebook and Twitter have also become a platform where fraudsters attempt to catch unsuspecting consumers off guard.

Kovelin Naidoo, Chief Cyber Security Officer at FNB, says although social media scams in South Africa are not yet prevalent, compared to our global counterparts; the reality is that they do exist.

“Given that the popularity of social media is set to remain for the coming years, consumers are encouraged to constantly educate themselves and their loved ones about the latest methods that fraudsters use to get hold of their victims’ personal information,” added Naidoo.

The FNB Chief Cyber Security Officer highlighted the following tactics of fraudsters:

Blackmail – never share personal photos or videos on social media that portray you in a compromising position as scammers can use these against you by threatening to send them to close family members or upload them on public platforms.

Phishing – beware of fraudsters pretending to represent your bank on social media platforms. Your bank will never ask for your credit or cheque card, account number, online banking login details or password or One Time PIN (OTP) on social media platforms.

Help and favours – be on high alert when asked for special financial favours or urgent assistance by strangers, no matter how caring or persistent the individuals may seem.

Never share your banking details with strangers and think twice before sending money to someone you recently met online or haven’t met in person yet.

Dating and romance scams – consumers who use social media platforms to meet companions or their life partners should lookout for fraudsters that play on emotional triggers to scam people out of their hard earned cash.

Dating and romance scammers often lower your defences by appealing to your compassionate side in order to take advantage of you.

Identity theft – avoid sharing personal information, such as ID, passport, drivers licence, payslip, bank statement, municipal or account statements on social media.

Fraudsters can steal your information and use it illegally by impersonating you.

Money laundering – scammers often trick people through social media platforms by claiming to have large sums of cash that they need to deposit urgently through a foreign bank account.

Do not allow your account to be used by another person to deposit or transact on. This can put you in serious trouble with authorities as allowing proceeds of crime to be laundered through your bank account, knowingly or unknowingly, is a criminal offence.

Furthermore, never open a bank account in your name on behalf of a person you have met on social media platforms, irrespective of the circumstances.

“When all safety precautions are taken into account, social media remains one of the best platforms that consumers can use to keep up to date with the latest news and trends, interact and catch up with friends and family,” concludes Naidoo.

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico

Evolving fourth industrial revolution brings networking and management concerns and solutions

Evolving fourth industrial revolution brings networking and management concerns and solutions

Anton Jacobsz, MD at Networks Unlimited.

The global market for application performance management software is projected to reach USD5 billion by 2020, driven by the growing need to monitor the performance of applications in complex software-defined enterprises. The market is witnessing a phase of invigorated growth, and this is being led by: revolutionary developments in technologies, the growing need to gain better business visibility and improve operational efficiency, a focus on the use of customer-facing applications to enhance customer satisfaction, and innovations in the field of real-time monitoring and analytics.

Prepared – or not – for the fourth industrial revolution?
However, when we look at where the networking industry is heading, we see that many organisations and their teams aren’t prepared for a future that is being hailed as the fourth industrial revolution – generally understood as meaning the widespread usage of innovative ways for technology to meet manufacturing, with the end result being fundamental changes in the way that we work and live.

In such a future, the possibilities that can be brought about by billions of people being connected by mobile devices, with unprecedented processing power, storage capacity and access to knowledge, are unlimited. These possibilities will be further multiplied by emerging technology breakthroughs in fields such as artificial intelligence, robotics, the Internet of Things (IoT), autonomous vehicles, 3-D printing, nanotechnology, biotechnology, materials science, energy storage and quantum computing. Like the three industrial revolutions that preceded it (generally characterised as being the introduction of water and steam to assist with mass production; thereafter the use of electricity in the second industrial revolution, and electronics and IT in the third industrial revolution), the so-called fourth industrial revolution, which morphs digital possibilities with the physical world, has the potential to raise global income levels and improve the quality of life for populations around the world.

This is consistent with the first three industrial revolutions, which were characterised by their own disruptive forces as outlined above, which ultimately changed the very core of society as it was then known. To date, those who have gained the most from this early fourth industrial revolution have been consumers able to afford and access the digital world. In this changing world, technology has made possible new products and services that increase the efficiency and pleasure of our personal and working lives.

How to manage networking in the IoT world?
All around us, the IoT is taking connectivity to new levels. This presents enormous possibilities as well as the possibility of threat actors using IoT devices to breach cybersecurity in new ways. The rise of the IoT is shaping networking in unprecedented ways.

The infrastructure that supports the IoT will include a significant amount of traditional network gear. Deploying and managing this gear will make network automation a requirement. Networks Unlimited offers solutions that make it possible to identify, isolate and solve network problems before the network operations centre (NOC) even knows there is a problem. This is the kind of smart management that is needed for true IoT automation.
Some of the capabilities that will make reliable IoT infrastructure possible include the following:

  • Automate standard support routines: Networks Unlimited offers solutions that provide numerous recovery procedures that automatically address common faults without human intervention such as automatically rebooting a hung, or wedged, device to multiple types of configuration recovery. A robust automation framework is provided for end-users to modify pre-packaged or define sequential and conditional recovery procedures that align with their support practices.
  • Recover from failed configuration changes: An added “safety net” enables IT staff to make real-time changes to network elements without the risk of failed configurations impacting on operational performance.
  • Reboot hung equipment: The automated diagnosis framework can automatically detect a hung, or wedged, device and instantly cycle power to the unit, frequently detecting and resolving this common problem before traditional management tools even know it exists.
  • Troubleshoot WAN connection issues: The solution can automatically detect common WAN problems, including outages or flapping circuits, and provide an instant diagnosis with the supporting trending or configuration data to speed recovery, document outages, or facilitate carrier resolution.

Other solutions available through Network Solutions for networking and management include the following capabilities:

  • Switching
  • SFPs
  • WAN optimisation
  • Load balancing
  • Wi-Fi
  • Infrastructure performance management
  • Application/service performance management
  • Secure remote management

Let’s take a closer look at infrastructure performance management, application/ service performance management, and secure remote management.

Infrastructure performance management
Network Solutions has partnered with a vendor to provide the only network monitoring platform that is engineered for “Speed at Scale.” The patented architecture leverages distributed computing to scale infinitely and collect millions of objects to provide real-time reporting down to the second and help organisations prevent outages.

Application/ service performance management This solutions allows for the monitoring and analysing of network and application traffic flows, across service provider and enterprise networks, on-premise infrastructure and hybrid cloud environments, delivering a single view into the performance of all services across the network and data centre to quickly pinpoint and resolve problems.

Secure remote management Networks Unlimited offers a solution that allows for the managing of network infrastructure by operating from an out-of-band perspective, monitoring devices and taking automated actions directly over the console port, like an onsite technician plugging in a laptop. Working smarter in a smart, connected world

The Internet of Things (IoT) will change how future data centres are designed and managed and how they evolve, as massive volumes of devices stream data, constantly or periodically, to enterprises, government departments and agencies around the world. Infrastructure and Operations (I&O) should use an IoT architect who looks at the long-term strategy for both IoT and the data centre.

By Anton Jacobsz, managing director at Networks Unlimited

Powered by WPeMatico

MTN issues one-time-pin scam warning to customers

MTN issues one-time-pin scam warning to customers

MTN issues one-time-pin scam warning to customers (Image credit: via

South African telecommunications company, MTN, issued a statement warning customers about a surge in scams asking customers for their one-time-pin (OTP)

The statement in part read: “MTN wishes to advise its customers about yet another scam doing the rounds where customers are being called and asked for their one-time pin (OTP). Once the pin is obtained, the fraudsters are then able to buy data or airtime from the customer’s accounts, after which that data or airtime is transferred to other numbers. This activity is a scam and it is NOT part of any MTN promotion.”

MTN, in the statement, also reiterated that it will never contact a customer via text, email or telephonically, to request access to a one time pin, or to any other personal information.

According to the company, authentic promotions are backed up by advertising on a number of channels including through broadcast and print media, at our branded stores, on billboards, in the Y’ello Trader magazine, on the MTN website and through our social media platforms.

Jacqui O’Sullivan, Corporate Affairs Executive at MTN SA, speaking about the scams said, “Unfortunately, fraudsters are everywhere and we want to be sure all our customers are protected at all times, across our entire business. Our systems are designed to safeguard our customer’s information from crimes such as data theft, sim swap fraud, identity theft and others but we need all our customers to remain vigilant at all times.”

“MTN aims to protect customers from fraudulent transactions that often originate elsewhere as identity theft. Any business has to stay one step ahead of these criminals at all times and at MTN, we will continue to do all we can to best protect our valued customers”, concludes O’Sullivan

For anyone who thinks that they might have been a victim or to report suspicious activity, MTN gave the following numbers for customers to contact them on; 0831800, 0831809, 0831808.

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico