SOLUTION OFFERING

Our Services

IT ASSET MANAGEMENT

IT ASSET DISPOSAL

RADtech provides services to streamline the process of dispositioning IT assets in a safe, compliant, and ecologically responsible manner with value-added services such as collection, on-site inventory, data destruction reports, and certificates for auditing purposes. We offer fair market value for your redundant IT equipment.

EWASTE RECYCLING

On August 23, 2021, it was illegal in South Africa to dispose of all types of electronic waste, also known as WEEE, to a landfill. To comply with this new legislation, companies must partner with a certified E-waste recycling company. RADtech helps organisations make the most of their electronics by ensuring that they are recycled in an environmentally sound manner.

 

IT ASSET REFRESH

Improving the performance of aging IT equipment in these tough economic times is always challenging for organisations. RADtech offers IT Asset refresh solutions that would exceed your requirements by refurbishing your older-generation technology, such as laptops and desktops with Ram and Hard Drive upgrades, faulty components replaced, and re-imaging or installation of the necessary software. We can reduce your hardware budget by 54% and improve the sustainability of your IT infrastructure.

IT MANAGEMENT SOLUTIONS

Over the years IT departments have become siloed and complicated. Many organisations have discrepancies in their asset registers, which can indicate that they don’t have the correct information about their assets. We have tools that assist you in easily monitoring and reporting on the status of your assets. This system will allow you to improve the efficiency of your asset management.

IAITAM CERTIFICATION TRAINING

CHAMP

Certified Hardware Asset Management Professional

CAMP

Certified Asset Management Professional

CSAM

Certified Software Asset Manager

CAMSE

Certified Asset Management Security Expert

REFURBISHED IT EQUIPMENT

The goal of our company is to help the environment by doing what we can, and that’s why we refurbish IT equipment. We take pride in being able to recycle electronic waste in a way that is both eco-friendly and effective. We also don’t just recycle IT equipment, as we take pride in extending the life cycle of our products by refurbishing them. This ensures that our customers get the best possible value for their money.

When it comes to buying refurbished IT equipment, it is important to understand that the difference between a used and a refurbished model is that the latter is not owned by the original manufacturer. It is pre-owned hardware that has undergone extensive testing and inspection to ensure that it is still functional and that all previous data has been removed securely and completely.

Our extensive refurbishment process involves testing all the components of the device, such as the hard drive, RAM, and motherboard. It is done in compliance with the POPI Act and ensures that the device is working properly. We also offer full refurbishment for businesses and educational institutions.

Purchasing a refurbished computer can help minimise the impact of your company’s environmental activities. It can also help lower your costs and improve the efficiency of your business. The concept of the circular economy has replaced the traditional culture of throwing away and prevents it from being sent to landfill.

DATA SECURITY

ANTI-PHISHING SOLUTION

IRONSCALES is a cloud-based, API-based email security platform that continuously learns and remediates advanced threats before and after they reach your inbox. This solution protects organisations against CEO fraud, supply chain attacks, invoice fraud, and other non-signature based BEC attacks in real time.

  • Business Email Compromise (BEC)
  • CEO and Employee Impersonations
  • Spear Phishing and Credential Theft
  • Supply Chain Attacks
  • Internal Phishing

DOMAIN-BASED MESSAGE AUTHENTICATION, REPORTING, AND CONFORMANCE (DMARC)

The DMARC process is a security check that ensures that the email message that is sent from a legitimate source is sent to the inbox. It allows a company to control who gets the message and what happens to it after it is delivered. It also validates that the message is legitimate and that it has not been compromised. If the authentication process is successful, the message will be sent to the inbox.

DDI (DNS-DHCP-IPAM) SOLUTION

EfficientIP is a leading provider of network management and IP-based communication solutions. Thanks to global visibility our smart automation of DDI (DNS-DHCP-IPAM) enables IP-based communication, simplifies network management, and enhances operational efficiency and consistency control. We secure DNS services to safeguard data confidentiality, protect users and ensure application access in the cloud and on-premises.

  • Smart DDI

Unify and automate DNS, DHCP, and IP Address Management for 80% time-saving.

  • 360 DNS Security
    Detect threats – protect apps, users and data -Remediate Faster.
  • Virtualisation & Cloud
    Empower advanced orchestration & automation with easy ecosystem integration.
  • Network Automation
    Gain visibility and control with dynamic discovery & management automation of your networks.

SECURE DATA ERASURE

The BitRaser software is a cutting-edge solution that guarantees the permanent wiping of sensitive data from various types of storage devices, such as hard drives, SSDs, and laptops. It generates a certificate of destruction that helps organisations comply with regulations and laws. Additionally, it can help prevent data leakage when it’s time to discard or recycle old storage media.

  • Secure Erasure
    Securely erases sensitive data beyond recovery from HDDs and SSDs across multiple devices.
  • Certified Erasure
    Generates 100% tamper-proof certificate International Standard compliance Supports 24 International erasure standards Powerful Diagnostics & Testing Accurately diagnose health status of mobiles & hard drives to ascertain their functioning status
  • Cloud Integration
    Provides flexibility to create users, manage licenses & central repository of reports & certificates.
  • Centrally Managed Bulk Erasure
    Erases multiple devices over a local area network with a centralised console to manage.
  • Reports for Audit Trails
    Generates erasure reports for audit trails.
  • Configuration & Automation
    Automates the erasure process across IT assets with the ability to customise the erasure process.