Blue Turtle extends Imperva Partnership

Blue Turtle extends its Enterprise Security Solutions portfolio with Imperva’s market leading Security Product Suite. Their partnership helps address increased demand for cyber-security in South Africa.

Blue Turtle, has extended its partnership with Imperva, with the introduction of Imperva’s Cloud solutions meeting the need for security aimed at cloud applications.

The partnership provides Blue Turtle’s customers with market-leading cloud and on-premises security design to protect business critical data and applications. Imperva, recognised leader in Web Application Firewall’s and Database Security has extended these capabilities to Cloud and SaaS, including Microsoft 365; whilst introducing the new Skyfence CASB (Cloud Access Security Broker) to deliver an ‘all-round’ cloud security suite.

Enterprises around the world are battling with cybercriminal activities. Various studies have shown that cybercriminals have breached almost every major corporation and government department. For all the defenses deployed today, cybercriminals are not just getting through, they are able to stay within the network undetected longer than ever before.

The reality is that many organisations need to establish more holistic security programs that reduce risk while meeting business objectives. With traditional endpoint and network security no longer enough to prevent breaches protecting your data and applications is paramount. Whether in the cloud or on-premises, Imperva delivers cyber security which has the ability to effectively identify and mitigate threats to critical business assets, resulting in faster time to detection and response.

Comments Willem Barnard, IT Risk & Security Business Unit Manager at Blue Turtle,“Protecting our customers’ information requires us to be at the top of our game, as we’ve seen in recent months, business impact through cyber-threats is a reality and is here to stay.” “We are excited to be able to offer Imperva’s latest cyber-security technology to our customers bringing industry leading data and application security to Cloud and SaaS applications, file-systems and databases.”

Blue Turtle and Cybereason Announce Strategic Partnership to Meet Increased Demand for Endpoint Protection in South Africa

This partnership strengthens Blue Turtle’s IT Risk & Security Solutions by leveraging the Cybereason Military-Grade, Real-Time Detection and Response Platform. This partnership helps fuel increased demand for cyber based network security in Sub Saharan Africa.

Blue Turtle and Cybereason, are pleased to announce their strategic partnership. The partnership helps solidify Cybereasons’ growth in Sub Saharan Africa by providing Blue Turtle’s client base with Cybereason’s market-leading Military-Grade, Real-Time Endpoint Detection and Response (EDR) Platform.

The reality is that hackers are getting better at exploiting various organization’s IT environment. Cybereason offers a real-time attack detection and response platform that uses endpoint data to detect and remediate simple and complex threats. This world class technology will further assist in protection against advanced cyber threats, for instance cybercriminals have long considered the African region as opportune to commit their criminal acts.

Statistics from various sources indicate that Africa is very prone to cyber-related threats due to the high number of domains coupled with very weak network and information security. According to the Norton Cyber-Crime Report, “every second, 18 adults are victims of cybercrime, resulting in more than 1.5 million victims globally per day.”[1]

Cybereason provides unmatched visibility and detection of adversarial activity on enterprise endpoints. Silent Sensors, agents placed on all endpoints within an enterprise, continuously collect and transparently communicate to the Cybereason Malop Hunting Engine, a big data, behavioral analytics platform designed to reveal malicious operations, known as Malops.  Malops are intuitively presented on the Incident and Response Console.

“It is critical that organisations take a proactive, layered approach to protecting their most valuable assets – making endpoint detection and response the first thing organizations should focus on when prioritizing their cyber attack risk & security strategies,” said Willem Barnard, IT Risk & Security Business Unit Manager at Blue Turtle. “We are excited to have Cybereason as a partner, as their renowned technology will enable us to further capitalize on business opportunities which help our  clients to take advantage of Cybereasons’ global reach and security expertise, as well as their understanding of risk detection in delivering crucial protection against evolving threats.”

“Cybereason is thrilled to be increasing its presence in South Africa and our partnership with Blue Turtle further validates a demand corporations have for endpoint protection. Cybereason has developed an award-winning threat hunting platform that will help corporations and organizations across South Africa root out malicious activity and provide real time intelligence across the entire network, notifying them that they are under attack and then stopping it,” said Simon Sharp, vice president, EMEA, Cybereason.

[1] United Nations Policy Brief, Tackling the challenges of cybersecurity in Africa, NTIS/002/2014,


Blue Turtle acknowledges Nastel as a Strong Performer in the APM market space

Blue Turtle’s partnership with Nastel reinforces our view on Middleware Management covering transaction based end-user, application flow analytics and business process mapping, which further combines to provide a holistic situational, statistical, and predictive image of the middleware intergration layer

Nastel, leader in Application Performance Management (APM) was named a strong performer by Forrester in a recent APM Research Report.  Nastel, provides real-time APM and IT Operations Analytics for middleware and applications, specifically the IBM Websphere, MQ, Database environments. In the Forrester Wave™ Application Performance Management, (Q3 2016) Nastel achieved the highest score possible in APM Analytics criterion. It evaluates vendors across 28 distinct criteria, aggregated into three general groupings: current offering, strategy, and market presence.

Forrester notes in the report that, along with other key customer considerations, APM solutions compete on their ability to “not only get to the root cause of downtime and performance issues more quickly, but also anticipate these problems so I&O pros can resolve them before they become issues at all.”

This is still the number one concern, according to Charley Rich, VP-Product Management at Nastel. But he notes there are other major business drivers of Nastel’s product roadmap. “Our customers must be ready to handle the swell of digital transformation sweeping their organizations. So we’re expanding their capacity for seamless, end-to-end visibility and analytics across their enterprise assets, cloud services, microservices, mobile apps, and the IoT—all must be included in a holistic solution. The tangible business outcomes are more productivity, better business service reliability, real-time customer experience, knowledge, and explicit knowledge of how IT activities are tied to the 24/7 delivery of business services.”

As the usage model for analytics accelerates its shift from reactive to proactive, Nastel is expanding clients’ ability to take advantage of fast data—characterized as high-volume, time-sensitive streaming metrics and unstructured data. Rich says, “Use cases range from compliance, security, on-line order processing, mobile apps—the list is almost endless. If you can process and analyze massive amounts of short-lived data regardless of source, and link that ability to natural language query and visualization tools, then you have the foundation for identifying trends and taking corrective actions in real-time. Not an easy feat by any means, but absolutely necessary to enable an ever expanding set of digital business services.”

“In an era when business functions are more sophisticated, diverse, integrated and immediate than ever, analytical Application Performance Management plays an essential role for our clients and IT professionals,” says Andrew Parsons, Business Product Manager at Blue Turtle. “To properly manage today’s application environment, organizations must be able to analyze the entire application chain from end to end, understanding the dependencies between the links in the chain. It must also be able to focus on early detection of abnormalities, differentiating symptom from cause rather than simply reacting to an outage.” “We are confident in Nastel’s APM technology ability to combine these two factors providing the level of assurance, IT needs in its key mission: to reduce the frequency and duration of outages and we commend them on their continuous growth and award recognition.”


Four ways Software License Management Can Transform your Business

Software License Management (SLM) is often misunderstood as it refers to the processes and/or tools used to help you document and control the usage and distribution of your software. SLM also helps ensure the compliance of your software licences. “SLM concerns itself with tracking, monitoring, and managing where and how software products are able to run within an organization.” [1] Read more

Blue Turtle receives 2016 BMC Software Partner of the Year

Blue Turtle scoops BMC Software Partner of the Year Award   and continues to reinforce its position as the leading provider of BMC Software and services in the EMEA South region

Blue Turtle Technologies, has once again been awarded the  BMC Software Partner of the Year Award 2016 for the EMEA South Region. The award recognises Blue Turtle’s outstanding contribution to the BMC Software business, customer service, and ability to help customers realise results in managing and optimising IT services.

The BMC Software Partner Awards shine a spotlight on partners that have demonstrated excellence in delivering on customer needs and driving business results. This award recognizes Blue Turtle for significant growth in the adoption of BMC software solutions, excellent customer support, and solution delivery across Africa.

The awards were received by Geoff Van Den Bosch, Managing Director at Blue Turtle, “It’s great to be recognized, year on year, as the top-performing BMC partner. It’s an exciting time at Blue Turtle, with a focus on working with our customers on improving the effectiveness of their IT landscapes and the enablement of mobile, SaaS and Cloud services.  We place significant value on collaborating with BMC to deliver world-class solutions in enterprise service management to our customers”.

BMC Software, a global leader in enterprise service management, presented their annual partner awards at the BMC Engage Conference event, held in Las Vegas. Blue Turtle, a BMC Partner for over 10 years, delivers best-in-class solutions that help customer’s plan, operate, optimize & secure their IT landscape and services.

Blue Turtle commends Hewlett Packard as a 2016 CIO 100 Award Winner by Using Delphix Technology

Blue Turtle’s leading Data as a Service partner Delphix has aided Hewlett Packard in being named a recipient of the 2016 CIO 100. The 29th annual award program recognizes organizations around the world that exemplify the highest level of operational and strategic excellence in information technology.

Breakups are never easy – but what if you’re trying to split a $100 billion company into two independent leaders? Who manages the IT Infrastructure?

When HP was facing a corporate separation, it needed to divide 2,800 applications, 300,000 employees, 75,000 application interfaces and their network connectivity, 570 projects and 50,000 servers1. In the company’s 2014 Q4 earnings call, CEO Meg Whitman called this undertaking “a big and complicated separation — the biggest ever done. This is not a spin-off, but two Fortune 50 companies, both with about $57 billion in revenue.”

Under the leadership of CIO Scott Spradley, HPE enlisted a team of their top talent to tackle this herculean challenge – one that involved splitting 6 data centers2 – with the help of Delphix. Now, they’ve been named one of this year’s CIO 100 winners for their successful efforts. Read how CIO summarizes the project here.

Mahesh Shah, General Manager of M&As at HPE, said of this undertaking, “Infrastructure, data and security – those were the most critical elements and the most complex elements for us to go and separate into two companies.”

All three of those discrete challenges are areas in which Delphix excels. Although data virtualization had never before been used to support a corporate separation, much less one of this size, HPE leadership recognized conventional methods would not be fast enough to meet their aggressive deadline. They looked towards a relatively new technology for this massive, mission-critical project, and by the project’s conclusion, the HPE team had applied Delphix software through multiple stages, including data conversion, regression testing, business continuity, data archiving and legal hold.

HPE achieved four major benefits through its engagement with Delphix:

  1. A dramatic reduction in application downtime
  2. Retention of a complete copy of the applications, with 70% data compression
  3. Disaster recovery capabilities to “roll back” the applications in case of accidental data deletion
  4. Reduced infrastructure requirements of over 50%


HPE continued to amaze watchers-on and their internal team alike. Mr. Spradley explained, “Nobody ever thought that we would do design in a month, or that we would do build in a month, or that we would write 172,000 [System Integration Test] cases, that we would test 74,000 interfaces, that we would split up 50,000 production servers in the amount of time. You typically build 900 servers in a year, maybe 1000 for an IT organization. We built 4000 servers in six weeks.”

We’d like to congratulate HPE for this exciting win. This talented and hard working team was able to execute this split efficiently, in 9 months with only two hours of downtime. For a process that could have taken years, and with a minimum of sixteen costly hours of downtime, the time and cost savings are nothing short of spectacular.

We’re proud that Hewlett Packard’s efforts in using Delphix’s technology have been recognized at the CIO 100 Awards,” stated Tommy Erlank, Application & Data Management Business Manager at Blue Turtle. “Hewlett Packard, being selected for this award along with top global companies speaks volume about our chosen technology – as the CIO 100 awards continuously honor the innovative use of technology that delivers genuine business value. Delphix’s renowned technology offering successfully delivers full environments for development, testing, and reporting needs – at a fraction of physical costs and complexity and we are honoured to have it as an offering in the Southern African region.”

More information on this and other Delphix Use Cases in Southern Africa, can be found at or




[2] Source:

Blue Turtle announces partnership with Tranxition to deliver Windows 10 migrations

Blue Turtle partners with Tranxition to enable IT to quickly deliver flawless migrations and include support for integration with appliances and desktop management platforms

Blue Turtle announced its partnership with Tranxition, the leading provider of desktop migration solutions. The Tranxition Migration Manager  tool automatically captures, for an entire set of users, Microsoft Office application and Windows settings. It also supports Office 365 and automatically migrates user settings cross-Office and cross OS versions simultaneously, directly to Windows 10.

“The Migration Manager software saves organizations around the world real money. And it helps VARs and IT professional services groups keep more of it. More than $1.2 billion in migration costs have been slashed since 1998[1].” Tranxition ensures that all of its customers’ personal data and settings are moved from one location to the next with every migration. As a result, the pain typically associated with data migration disappears. The results users enjoy are both emotional and tangible, ranging from empowerment, reassurance, satisfaction and success to decreased costs and increased revenues. And this translates into far more productive organizations because they are able to focus more clearly on their business missions on both an individual and collective basis.

“Blue Turtle is always striving to exceed client expectations, with Windows 10 adoptions on the rise, our partnership with Tranxition opens doors for our customer base to take advantage of Tranxition’s Migration Manager’s product set,” says Avash Maharaj,  Infrastructure & Operations Business Manager, at Blue Turtle. “We are excited to have Tranxition as a partner, since the solution has proven to entirely deliver immediate value by enabling users and prospects to easily and reliably migrate user profiles to Windows 10.”

Blue Turtle can simplify the migration process with Tranxition Migration Manager which enables you to take what you already have in place and streamline for your Windows 10 deployment. Contact Blue Turtle to get started on your OS migration on or

[1] Migration Manager for Windows – whitepaper,, accessed May 2016


Blue Turtle and VMTurbo partner to bring Application Performance Control to the Southern Africa region

VMTurbo and Blue Turtle enable customers the ability to unlock the full value of  their infrastructure whether on premises or in the cloud

Blue Turtle announces the launch of  VMTurbo’s Application Performance Control system in South Africa. VMTurbo enables customers to guarantee Quality of Service for any application while maximizing resource utilization of on complex virtualised infrastructure.. VMTurbo is part of Blue Turtle’s  Infrastructure & Operations product portfolio driving cost reduction and operational efficiency for customers, maximising the value of their infrastructure.

Key priorities of CIOs today are data center consolidation, increased exploitation of virtualisation and adoption of cloud computing technologies. With all of these ensuring that applications perform at the level needed by business demands they get the resources they need from the underlying compute, storage and network supply.

IT organisations wishing to address these priorities as part of the implementation of a ‘Next-Generation’ Datacenter strategy will usually start by consolidating the servers and storage layers through virtualisation. However, as businesses rely on increasingly complicated applications managed in highly dynamic environments, the complexity of the modern data center confounds IT’s ability to guarantee application performance.

VMTurbo is the only solution that assures application performance for any workload running in any virtualized or cloud environment. VMTurbo continuously analyzes application demand and allocates infrastructure resources accordingly to prevent issues and alerts. Control Modules extend VMTurbo control further into and across the stack.

“Application Performance Control serves as one of the foundational building block of our Next Generation Datacentre strategies said Avash Maharaj, Infrastructure & Operations Business Manager at Blue Turtle. “Our partnership with VMTurbo will enable our customers to leverage the control VMTurbo provides not only to automatically assure performance and drive their environment into a healthy state, but accelerate the transformation they look to us to enable.”

“Through this partnership we are enhancing our EMEA go-to market and embracing the channel to leverage Blue Turtle’s extensive relationships within the South African business community to accelerate the adoption of Application Control in line with the cloud boom,” said Karl Barton, Director of EMEA Channel and Alliances at VMTurbo.  “Blue Turtle shares our vision of where IT is heading, understands the challenges to build today and tomorrow’s clouds, and has the complementary best-of-breed technologies for the Software Defined Data Center already in its portfolio.”


Blue Turtle Strengthens Security Portfolio with SentinelOne’s Next Generation Endpoint Protection

First Next Generation Endpoint Protection to be launched in South Africa, combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks

Blue Turtle Technologies, leaders in solutions for optimization and management of IT systems, today announced it has selected SentinelOne’s next-generation endpoint protection platform as the latest addition to its IT Security portfolio.  The partnership means that Blue Turtle will be the first provider of a next generation endpoint security solution of this kind in South Africa.

SentinelOne provides an advanced solution which protects organizations from becoming victims of advanced malware and exploit-based attacks.   Unlike signature-based security products that rely on static analysis, SentinelOne’s Dynamic Behaviour Tracking (DBT) engine closely monitors each newly-created process on a machine through its lifecycle, identifying malicious patterns and eliminating threats in real-time. This approach defends against advanced cyber attacks and insider threats that use stealthy evasion techniques, which can bypass traditional security methods.

Large enterprises like Neflix have shared their plans to “dump legacy anti-virus” and replace it with new, more advanced solutions from SentinelOne which is one of the only next-generation endpoint protection companies that has been certified by AV-Test to be a true replacement to AV.

Comments Martyn Healy, Marketing Director at Blue Turtle Technologies:

“SentinelOne’s solution is a significant addition to our comprehensive suite of security products and further strengthens the protection that we can offer customers as cyber attacks become harder to detect.  As we’ve seen in recent months, the volume of malware and ransomware attacks has grown substantially, so it’s more important than ever that we provide customers with the most advanced solutions to protect them from these threats, including zero day variants. SentinelOne’s solution stood out to us as providing an innovative and dynamic new approach, combining sophisticated machine learning with real-time threat intelligence to ensure customers have the best possible endpoint protection.”

Comments Magali Bohn, Head of Worldwide Channel Sales at SentinelOne

“We’re delighted to partner with Blue Turtle Technologies and to be expanding our global footprint by launching in a new region, which marks a significant milestone in our growth. Organizations have some very real challenges in this new era of malware and our solution is designed to help them keep pace with these and to protect what is often seen as the ‘soft’ target by cyber criminals: their endpoints.”

In the new digital age, anyone can fall prey to cyber crime

This year, South African business will continue to embrace digital transformation. From network-connected smart TVs and photocopiers to air-cons in the boardroom for greater convenience, and the wider adoption of cloud, employees are able to work anytime and anywhere, using smartphones, tablets and even smart watches.

And we can expect cyber criminals to slap their keyboards with joy for the opportunities the growing ‘digital business’ brings.

Well-reported cases show that even large and well-resourced organisations fall victim to cyber attacks, and they’ve suffered data theft, interruption of services or reputational damage as a result. In parallel, security budgets have increased faster than any other, and most companies have board-level visibility and backing for security. Despite the increased investment and business backing, chief information security officers (CISOs) are facing a security challenge greater than any seen in the past 10 years.

Why is this?

For many years, digital security has operated on the principle that you can keep attackers out. Our defence systems attempt to do this by guarding the perimeter of the network, with tools such as firewalls, anti-virus programs and patching. However, it’s clear that this current approach is outdated and ineffective against today’s advanced cyber threats. Sophisticated cyber attackers are capable of ‘bypassing’ the perimeter, and insiders are, by definition, already operating within the firewall. Breaches are a reality within our organisations, whether we know it or not!

We must also accept that cyber security is not just a technical challenge. Human ingenuity and creativity has made it extremely difficult to second-guess how an attack might present itself, or understand in advance which employee or insider poses the greatest risk to your organisation. This new era of cyber threats calls for technologies that can deal with subtlety and uncertainty, and empower individuals to take informed decisions that will tangibly minimise risk, as well as take action in real-time (actionable intelligence).

Why change?

Legacy security defences are also over-reliant on signatures and rules, which by definition can only stop pre-identified threats. As attack methodologies continue to evolve at speed, rules are continually outdated and outmanoeuvred. Would-be attackers may make fractional changes to their binary appearance within a network to evade a signature scan, socially coerce a user into clicking a malware packaged in an attachment to an e-mail, or use other readily available methods to subvert existing security systems.

The insider, an employee, is most likely using authorised access to applications to steal data or execute transactions for personal gain. They may have similar objectives to the criminal, but they will be approaching the objective in a different manner. If we accept the new reality of cybe rcrime and consider this against current SecOps’ modus operandi and the associated cost, we need to ask if we’re getting a return on investment. Are the operating investments delivering measureable improvements in our security posture? These are definite reasons for a change in strategy, technology and execution.

Next-generation digital security

There are several key requirements for effective cyber-threat management – these include comprehensive capture of activity and traffic across users, systems and networks; real-time detection and analysis of anomalous behaviour and malware; advanced visualisation and alerting of threats; and automated remediation and recovery of breaches.

The technologies that come together to deliver the functionality have similar characteristics in that they exploit major advances in machine learning, mathematics and big data in their solutions. No sign of a signature, no rule to be written, no trawling of millions of events, and no waiting for a patch!

So, what makes the emerging security technologies so different? Take a look at Darktrace, one of the leaders in this field. Darktrace’s unique technology is powered by advanced machine learning, allowing it to self-learn what is normal for a company’s network environment, so that it can then determine if any behaviour is abnormal – the business ‘pattern of life’. This allows it to detect outliers to these learned patterns, as they emerge, which may represent a serious threat – cyber attacks of a nature that may not have been observed before, the unknown unknowns. Darktrace does this through the use of advanced mathematical models to establish an evolving understanding of every device, user and network, and stay ahead of developing advanced persistent threats (APTs), insider attacks and other live-threat scenarios.

Enterprise-wide threat visibility is key, and this is mirrored by the need for capabilities that take ‘action’ on intelligence. We need to protect the enterprise’s assets (servers, applications, client devices, etc) that are of criminal interest. Consider the challenge of end-point security – that never-ending cycle of patching and anti-virus updates – and that SentinelOne, an innovative start-up, is changing the end-point game using machine learning to deliver protection against targeted attacks, advanced threats, and zero-day attacks. SentinelOne’s dynamic execution inspection detects advanced threats, provides automated mitigation, and generates real-time forensics.

It’s not only that the sophistication of cyber attackers has developed out of all recognition, but the changing IT landscape also compounds this problem. Just consider cloud, a hot topic in South Africa at the moment. Cloud is now a part of our lives, so why not apply innovation in this space, too?

The use of machine learning and big data for cyber threats is almost mainstream, enabling next-generation SecOps. Looking forward, we should see software-defined security, decoy and deception, and micro-segmentation techniques adding significantly to our defence capabilities.

With next-generation technologies, a company’s CISO will regain the advantage that comes with visibility, early warnings and automated responses and remediation. So in the event of a compromise, the organisation is confident of the capabilities to act before a real crisis occurs.

To learn more about a suitable approach to managing your cyber threat, contact Blue Turtle for a consultation at +27 (0) 11 206 5600 or