Neels Steyn
Certified ManageEngine Engineer
Established back in 1999, ITR Technology (short for Individually Tailored Relevant Technology) has held the exclusive distributorship for ManageEngine Software in Southern Africa ever since.
What started off as a company with 4 employees, we are now proud to boast a dedicated team of over 40 dynamic professionals who possess advanced technical expertise and a deep commitment to prioritising our customers. Each member of our team brings a unique set of skills and experiences to the table, ensuring that we continue to provide the best solutions.
Over the past few years, ManageEngine has consistently recognised ITR Technology for achieving outstanding growth and maintaining a high standard of customer support. Our extensive product portfolio comprises more than 120 toolsets, and we have catered to a diverse array of industries, delivering software solutions, training, and services.
ITR Technology boasts a robust reseller network and has established partnerships with some of the most prominent ICT companies in Southern Africa. We view our resellers and customers as collaborators, underpinning our strong belief in the principle that “your success is our success.”
With a demonstrated history of achievements, an innate understanding of our clients’ needs, and a focus on software relevance, we offer cost-effective and flexible pricing structures that ensure ITR Technology customers gain access to valuable software solutions that foster IT transformation and enhance efficiency.
Certified ManageEngine Engineer
Certified ManageEngine Engineer
Certified ManageEngine Engineer
Certified ManageEngine Engineer
Director
Certified ManageEngine Engineer
Regional Account Manager: Gauteng
Support Supervisor
Sales Administrator
Head of Operations
Certified ManageEngine Engineer
Operational Team Member | Channel
Solutions Architect
Operational Team Member
Strategic Analyst
Regional Account Manager: Outlying
Certified ManageEngine Engineer
Solutions Architect
Certified ManageEngine Engineer
Data Analyst
Solutions Architect
Retentions Specialist
Head of Support
Customer Success Manager
Content Marketing Co-Ordinator
Sales Administrator
Regional Account Manager: Gauteng
Creative Marketing Co-Ordinator
Marketing Assistant
Channel Manager
Certified ManageEngine Engineer
Certified ManageEngine Engineer
CEO
Head of Finance
Retentions Specialist
With the proliferation of the Internet of Things (IoT), we’re going to see exponential growth in the use of passwords over the next few years. This e-book explains why passwords are far from dying out...
While the choice of remote working is on the rise in South Africa, others have been forced to work from home (WFH) as part of a collective movement to flatten the COVID-19 curve. COVID-19 has...
The majority of companies are moving towards a work-from-home model in an effort to reduce costs and improve operational agility. However, along with these advantages, a remote workforce brings up numerous security concerns. Download this...
Until now, a majority of enterprises and their employees have been safely protected by their office network’s robust security infrastructure. However, things have drastically changed with the COVID-19 pandemic, and enterprises have been forced to...
In today’s interconnected world, where cyber threats loom large and digital security is paramount, the role of women in shaping a secure digital future has never been more crucial. From pioneering groundbreaking technologies to advocating...
Network administrators are the heroes of the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure...
User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like a high volume of logon failures. Tracking the active and idle time spent by...
The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe.
Keep in touch! By providing us with your details below, you agree to receive the latest product information, updates, and upcoming events from and about ITR Technology.
Leave your name and number and we’ll get back to you.
"*" indicates required fields