Obscure appointed to distribute Proofpoint in South Africa

Issue 1 2021 News & Events

Proofpoint is sharpening its focus on the South African market through the appointment of Obscure Technologies as its main distributor in South Africa with effect from March 2021.


Rynier Schoeman.

Centurion-based Obscure Technologies is a firm of cybersecurity experts specialising in brokering best-of-breed security solutions in the local market. Having served as a distributor of Proofpoint solutions for the past year, Obscure Technologies has invested in strengthening its team’s skill set and certifications across the Proofpoint portfolio, and has appointed a new, dedicated business unit manager to serve as an extension of the Proofpoint workforce in the local region.

Rynier Schoeman, the new Proofpoint business unit manager, says Obscure Technologies has grown to a significant cybersecurity powerhouse on the strength of its high-level skills and focus on only market-leading solutions to address key local challenges.

As a highly experienced cybersecurity specialist, Schoeman believes Proofpoint ably meets the changing needs of local large enterprises. “With email being the main attack vector, and Africa among the regions most under attack in recent years, we see growing demand for enterprise grade, feature rich email security solutions, as well as security awareness and training,” he says. “Proofpoint answers that need and more, and integrates seamlessly with many of the other solutions in our portfolio. As a result, it is a good fit for our cybersecurity portfolio and is seeing growing demand in the South African enterprise market.”

Proofpoint takes a people-centric approach to protection, offering an integrated suite of cloud-based solutions to stop targeted threats, safeguard customers’ data, and make their users more resilient against cyberattacks. More than half of the Fortune 1000 companies rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media and the Web.

With Proofpoint’s security suite, organisations can:

• Stop email and cloud-based threats, including malware, credential phishing and business email compromise (BEC).

• Reduce successful phishing attacks and malware by empowering their people to spot and report unsafe email and by safeguarding their personal digital activity.

• Secure the digital channels by blocking impostor attacks and malicious content that use trusted and lookalike email and web domains, social media, the dark web and more.

• Protect your most sensitive data and comply with ever-evolving regulations – without the headaches and costs of legacy data protection tools.

• Collect, archive, supervise and monitor sensitive data in a compliant and legally defensible manner without the cost and hassle of traditional compliance tools.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Entries for the 2026 Southern Africa OSPAs now open
News & Events
Entries are now open through to 1 April 2026 for the Southern Africa Outstanding Security Performance Awards (OSPAs). This year, the awards are open to a broader range of countries in southern Africa than ever before.

Read more...
Grand theft telematics
News & Events
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.