![]() Anthony Laing, General Manager of Networking at NEC XON New Global Networking Powerhouse is Born
NEC XON, Africa’s largest and most experienced Juniper Networks partner, has welcomed the completion of Hewlett Packard Enterprise’s (HPE) acquisition of Juniper Networks. [hpe.com] This strategic $14 billion deal brings together the best of enterprise networking—HPE’s Aruba and Juniper’s Mist—to create an unmatched AI-native, cloud-ready networking powerhouse. Grant Ferreira Regional Manager Security at NEC XON Ransomware attacks, phishing scams, and breaches are a daily reality for South African companies — whether you're a multinational or a mid-size business. The stakes are no longer just data loss, but full-scale operational paralysis.
By Ryno Le Roux, Cyber Operations Manager at NEC XON NEC XON, a leading pan-African systems integrator and cybersecurity innovator, has officially achieved Palo Alto Networks XMDR (Extended Managed Detection and Response) Partner Status in Europe, the Middle East and Africa (EMEA), joining an elite group of partners globally recognised for advanced threat detection, response capabilities, and strategic cyber defence.
This achievement validates NEC XON’s deep alignment with Palo Alto Networks’ Cortex XDR platform and its ability to provide proactive, scalable incident response services on behalf of Palo Alto Networks — a capability shared by only a select few providers worldwide. 18/6/2025 Disrupt First, Ask Questions LaterBy Ryno Le Roux, Cyber Operations Manager at NEC XON The Uncomfortable Truth About Incident Response
Attackers don’t wait for board approval. They slip through a mis-configured firewall at 02:00 on a Sunday or phish a distracted employee just before quarter-end. At that moment, every control you’ve bought is judged in milliseconds. That is why incident response (IR) isn’t a “nice to have” line item; it is the only thing standing between a bad day and a business-ending week. By Thabani Makhanya, Cyber Security Lead: Engineering at NEC XON In a hyper-connected business landscape, “more is better” no longer necessarily applies–especially when it comes to cybersecurity. In fact, the opposite may be true.
A recent Gartner survey reports that large enterprises now run, on average, 45 different cybersecurity tools. It sounds impressive—until you realise that this complex web of overlapping systems often creates more problems than it solves. Instead of strengthening digital defences, tool sprawl is quietly weakening them. By Arthur Taylor, Pre Sales Architect | NEC XON NEC XON, a pan-African digital systems integrator and newly certified Palo Alto Networks Diamond Partner, has unveiled its platform-led cybersecurity strategy designed to maximise return on security investment (ROI) for enterprise customers across Africa and beyond.
“Tool sprawl is one of the biggest drivers of wasted cyber-spend,” says Arthur Taylor, Cybersecurity Pre-Sales Architect at NEC XON. “When every vendor speaks a different language, security teams drown in dashboards and false positives. Palo Alto’s platformization approach gives our clients one integrated, high-fidelity view of risk—cutting noise, costs, and response times all at once.” NEC XON’s Elite Partner Status with Pure Storage Renewed By John Dewar General Manager Enterprise Technology Solutions NEC XON has been re-appointed as an Elite Partner by Pure Storage. The re-certification enables faster, more agile data solutions for regional businesses, with improved access to world-class flash storage solutions delivered by a partner with a deep understanding of local needs and proven technical expertise.
As organisations increasingly rely on data to drive performance, the partnership brings tangible benefits: faster implementation, stronger support, and early access to innovation. Elite Partner status also gives NEC XON direct lines to Pure Storage’s engineering and technical teams, ensuring complex challenges are resolved quickly and effectively. A new era of innovation and resilience By Michael de Neuilly Rice, Principal Security Architect at NEC XON AI’s (Artificial Intelligence) massive impact has been both positive and negative. It’s excellent at some office tasks and terrible at others. It has revolutionised graphic design while also flooding social media with misleading, fake images.
AI relies on massive amounts of (sometimes incorrect) data. When the data is unreliable, so is the AI output. Cybersecurity is no different—but companies must be ready to embrace AI or risk being left behind. 3/4/2025 NEC XON’s ISO 27001:2022 certification reinforces commitment to client information securityISO 27001:2022 certification: Reinforcing trust, security, and compliance. NEC XON has achieved ISO 27001:2022 certification. This globally recognised standard for information security management underscores the company’s commitment to protecting customer data, strengthening its security posture, and ensuring compliance with key regulatory frameworks.
By Armand Kruger, Head of Cybersecurity, NEC XON The ugly truth is, cyber threat actors are harnessing AI to look for ways into your network. According to the WEF Artificial Intelligence and Cybersecurity Report (2025) [reports.weforum.org] AI has democratised cyber threats. That means threat actors can automate even social engineering, run more extensive phishing campaigns and develop AI-driven malware with greater ease.
|
Archives
July 2025
Tags
All
|
Navigation |
Additional |
External Link |
11/7/2025
0 Comments