Your browser version is outdated. We recommend that you update your browser to the latest version.



The activities of Core Networks started when the company was founded in December 1992, as a privately owned partnership providing network solutions in the PWV area. With the vast growing industry our services became essential in the corporate industries.  During August 1996 a shift in the market led us to focus on high-end networking and WAN technology.  High End switching was added to the profile, but now not as a services company but as a Value adding distributor.  In time other networking solutions was added as well as and suite of products allowing Core to offer an end to end Networking line of products.  Channel support further strengthens our portfolio, our team have been supporting IT products since the launch of the first computers in SA, and we have extensive experience in the IT space.

In December 2019 Core Networks was acquired by Epsidon and now operate as a division of Epsidon Technology holdings.  Core Networks will maintain the high professional service level expected and needed by corporate and any other clients.


Key vendor relationships



Infinet Wireless




Advanced Optics



Fortinet delivers high-performance network security solutions that protect your network, users, and data from continually evolving threats. Our broad portfolio of top-rated solutions and centralized management enables security consolidation and delivers a simplified, end-to-end security infrastructure

FortiGate Next-Generation Firewall (NGFW):

Fortinet Next-generation firewalls filter network traffic to protect an organization from external threats. Maintaining features of stateful firewalls such as packet filtering, VPN support, network monitoring, and IP mapping features, NGFWs also possess deeper inspection capabilities that give them a superior ability to identify attacks, malware, and other threats. Fortinet Next-generation firewalls provide organizations with application control, intrusion prevention, and advanced visibility across the network. As the threat landscape continues to develop rapidly, traditional firewalls fall further behind and put your organization at risk. Fortinet NGFWs not only block malware, but also include paths for future updates, giving them the flexibility to evolve with the landscape and keep the network secure as new threats arise.

Fortinet Secure SD-WAN

WAN Edge Transformation with Security-Driven Networking

As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to SD-WAN. SD-WAN is a software-defined wide-area network architecture. SD-WAN solutions transform an organization’s capabilities by leveraging the corporate WAN as well as multi-cloud connectivity to deliver high-speed application performance at the WAN Edge of branch sites. SD-WAN provides a centralized control mechanism that can determine and route the ideal path for traffic—MPLS, 3G/4G/5G, or broadband—ensuring organizations can quickly and easily access business-critical cloud applications. But SD-WAN solutions don’t provide in-built security which is critical for direct internet access. Secure SD-WAN enables organizations to enable NGFW with SD-WAN in simplified offering.

Fortinet received second consecutive NSS Labs “Recommended” rating in the SD-WAN Group Test. Fortinet Secure SD-WAN delivered lowest Total Cost of Ownership (TCO) per Mbps among all eight vendors.

FortiSwitch Secure Ethernet Switching

Fortinet’s Secure, Simple, Scalable Ethernet Solutions. Legacy Ethernet LANs face many challenges including exponential growth in devices and applications, increased throughput demands from wireless LANs, and complex security implementations. Rather than asking how to secure traditional Ethernet LANs, Fortinet takes a security centric approach offering Ethernet as an extension of the security infrastructure through FortiSwitch and FortiLink. FortiSwitch offers a broad portfolio of secure, simple, and scalable Ethernet switches ideal for Secure SD-Branch and applications ranging from desktop to data center.

Fortinet Wireless Management

Protection where your networks are most vulnerable - The Edge

FortiGate Integrated Controller

  • Single pane-of-glass for network security and wireless access
  • Tight integration with Fortinet's Security Fabric
  • No extra licenses necessary

Cloud AP Management

  • Hosted cloud solution available anywhere anytime
  • Scalable to the size of your network

Dedicated Controller

  • Dedicated hardware to manage your wireless
  • Perfect for dense, complex and large scale deployments

FortiExtender: Secure LTE Wireless WAN Extender

Providing 3G/4G Connectivity for Reliable Broadband to the Internet

Establishing and maintaining Internet connectivity can be a critical requirement for business execution.  To provide a secondary WAN connection, the FortiExtender appliance uses LTE connectivity with the cellular phone infrastructure to provide broadband speeds that can be used in a failover or load-balancing configuration.  And for those locations without wired broadband options, FortiExtender can provide the primary Internet connection.


Security Fabric Analytics & Automation

The digital attack surface is expanding at a rapid rate, making it increasingly difficult to protect against advanced threats. According to a recent Ponemon study, nearly 80% of organizations are introducing digital innovation faster than their ability to secure it against cyberattacks. In addition, the challenges of complex and fragmented infrastructures continue to enable a rise in cyber events and data breaches. Assorted point security products in use at some enterprises typically operate in silos, obscuring network and security operations teams from having clear and consistent insight into what is happening across the organization.

An integrated security architecture with analytics and automation capabilities can address and dramatically improve visibility and automation. As part of the Fortinet Security Fabric, FortiAnalyzer provides security fabric analytics and automation to provide better detection and response against cyber risks.


Automation-Driven Network Management

The rapid influx of digital transformation (DX) technologies has made networks and network security much more complex and vulnerable. While malicious cyberattacks remain a serious problem, a recent Ponemon study shows that more than half of all breaches last year came from benign sources that could have been prevented. A security strategy that prioritizes automation-driven network operations can help. As part of the Fortinet Security Fabric, FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches.


Cloud Security Analytics and Posture Management

Organizations are embracing multiple public cloud platforms, resulting in increased complexity of management which impacts security and risk. Additionally, the built-in security tools that come with various cloud platforms are unique to each, compounding the challenge of consistently managing risk across all clouds in a multi-cloud world. This challenge renders security operations time consuming and ineffective. As the attack surface expands, organizations need to protect from not only from risks of configuration and management of the application elements themselves, but also from risks originating via cloud application programming interfaces (APIs) and UIs.

FortiCWP offers security administrators and DevOps teams the ability to evaluate their cloud configuration security posture, detect potential threats originating from misconfiguration of cloud resources, analyse traffic across cloud resources (in and out of the cloud), and evaluate cloud configuration against best practices. It enables the ability to manage risk throughout multi-cloud infrastructures, provides regulatory compliance reporting, and integrates remediation into the cloud infrastructure lifecycle automation framework.

FortiADC: Application Delivery Controller

Application Delivery Without Limits

With bandwidth demand growing faster than budgets, and with cyberattacks constantly on the rise, it can be challenging to securely and efficiently deliver applications at the speed users expect. Fortinet Application Delivery Controller (FortiADC) optimizes the availability, user experience, and application security of enterprise applications. FortiADC provides application availability using Layer 4/Layer 7 load balancing, data center resiliency, application optimization, and a web application firewall (WAF) to protect web applications from the OWASP Top 10 and many other threats.

Fabric Connectors

Deep Multi-Vendor Integration for Automated Security and Simplified Management

Fortinet Fabric Connectors deliver turnkey, open, and deep integration into partner technologies and platforms in multi-vendor ecosystems, enabling security automation and simplified management. By integrating with customers’ multi-vendor ecosystems, Fortinet Fabric Connectors synchronize security with dynamic operational changes, automate security tasks, support DevOps processes and time-to-market needs, while ensuring coverage of the entire attack surface from Internet of Things (IoT) devices to the cloud. Developed by Fortinet, the connectors leverage the open Security Fabric architecture and interfaces to make it possible to activate integration with complex solutions with as little as a single click.

FortiWeb: Web Application Firewall and API Protection

Machine Learning Enabled Protection for Business-Critical Applications

FortiWeb, Fortinet’s Web Application Firewall, protects your business-critical web applications from attacks that target known and unknown vulnerabilities.

The attack surface of your web applications evolves rapidly, changing every time you deploy new features, update existing ones, or expose new web APIs. You need a solution that can keep up.  FortiWeb is that solution.

FortiWeb takes a comprehensive approach to protecting Web applications, including IP reputation, DDoS protection, protocol validation, application attack signatures, bot mitigation, and more to defend your application against a wide range of threats, including the OWASP Top 10.  But we don’t stop there.

FortiWeb machine learning automatically builds and maintains a model of normal user behaviour and uses that model to identify benign and malicious application traffic without the time-consuming manual application-learning required by most WAFs. 

Email Security: Secure Email Gateway (SEG) Solutions

Stop advanced email threats and prevent data loss

Email remains the most critical communications tool for business. Unfortunately, that also makes email the top threat vector, with the volume and sophistication of attacks ever-increasing. At the same time, customers are increasingly moving to cloud email providers, like Microsoft 365 and Google G-Suite, and are struggling to secure their email traffic. The built-in, native security tools available in these platforms are by themselves insufficient to guard against attacks, protect valuable data, and ensure compliance objectives are met. FortiMail, Fortinet’s secure email gateway solution, provides a comprehensive, multi-layered approach to address all inbound and outbound email traffic. Fortinet is a trusted vendor and offers the industry’s broadest portfolio of security solutions,—including identity management, advanced threat/zero-day protections and security-driven networking—with its Security Fabric.

FortiCASB: Cloud Access Security Broker (CASB)

Visibility and Control for SaaS Applications

Organizations are increasingly adopting Software-as-a-Service (SaaS) applications for the agility and savings they offer, but find that they don't provide the required visibility and control. FortiCASB is a cloud-native Cloud Access Security Broker (CASB) subscription service that is designed to provide visibility, compliance, data security, and threat protection for cloud-based services being used by an organization.


Powerful Security Information and Event Management (SIEM)

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility.  Effective security requires visibility – all the devices, all the infrastructure in real time – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create.

Security management only gets more complex. Endpoints, IoT, Infrastructure, Security Tools, Applications, VM’s and Cloud – the number of things you need to secure and monitor grows constantly. FortiSIEM – Fortinet’s Multivendor Security Incident and Events Management solution brings it all together. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a Business Services view, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur.


Streamline SOC Efficiencies and Accelerate Incident Response

As the digital attack surface expands, security teams must also expand their defence capabilities. Yet, adding more security monitoring tools is not always the answer. Additional monitoring tools mean more alerts for security teams to investigate and more context switching in the investigation process, among other issues. This creates a number of challenges for security teams, including alert fatigue, a lack of qualified security personnel to manage new tools, and slower response times.

Integrated into the Fortinet Security Fabric, FortiSOAR security orchestration, automation and response (SOAR) remedies some of the biggest challenges facing cybersecurity teams today. Allowing security operation centre (SOC) teams to create a custom automated framework that pulls together all of their organization's tools unifies operations, eliminating alert fatigue and reducing context switching. This allows enterprises to not only adapt, but also optimize their security process.


FortiSandbox: Zero-day Threat Protection

An AI-powered, top-rated, integrated sandbox

Cyber criminals are increasingly leveraging automation and artificial intelligence (AI) as part of their cyberattacks, heightening the risk of a security incident or a data breach. In turn, some CISOs are adopting sophisticated solutions such as AI-powered sandboxing as an essential component of their security strategy. AI-based sandboxing helps combat previously unknown threats such as ransomware, crypto-malware, and many others.

In addition to the sophistication of threats, organizations are grappling with protecting growing attack surfaces are becoming more dynamic due to the rise of Internet-of-Things (IoT) and cloud-based services. Coupled with the shortage of qualified cybersecurity talent, organizations are turning to centralized and integrated sandboxing across various security controls to automate breach protection.


Deception-based Breach Protection
Deceive, Expose and Eliminate External and Internal Threats

According to Verizon’s 2019 Data Breach Investigation Report, two-thirds of breaches found were from external actors while the remaining one-third involved internal actors. Unfortunately, today’s reactive security solutions are narrowly focused in either protecting external or internal threats but not both.

FortiDeceptor is based on deception technology that complements an organization’s existing breach protection strategy, designed to deceive, expose and eliminate attacks originating from either external or internal sources before any real damage occurs.


Access the web securely with browser isolation

FortiIsolator, Fortinet’s browser isolation platform, adds an additional advanced threat protection capability to the Fortinet Security Fabric and protects critical business data from sophisticated threats out on the web. Content and files from the web are accessed in a remote container and then risk-free content is rendered to users. 

Sophisticated threats on the web multiply by the day. It’s nearly impossible to stay current about what threats reside on which pages, and what objects are good or malicious. It can be intimidating to keep up with the proliferation of advanced attacks.

FortiIsolator allows organizations to keep their most critical, high-value targets secure from the onslaught of threats. It allows users to browse the web in an isolated environment, which renders safe content in a remote container. FortiIsolator is a completely remote environment that does not require an install on a user’s computer or device. 

FortiAI: Virtual Security AnalystTM

AI-powered Sub-second Threat Investigation

There is no question that cyberattacks and threats—ransomware, trojans, cryptomining, worms, etc.—are here to stay, but they are also becoming increasingly sophisticated and dangerous. Cybercriminals are eagerly adopting new innovations such as artificial intelligence (AI) and automation via AI fuzzing, self-learning swarm-based attacks, and expanded Malware-as-a-Service capabilities. Meanwhile, overburdened security operations teams are stuck with traditional security resources and investigation procedures to combat the increasing volume of advanced polymorphic, known, and unknown threats.

AI is paving the future for cybersecurity solutions that can stay ahead of evolving threats. Fortinet FortiAI, powered by Deep Neural Networks (DNN), is the industry’s most sophisticated AI security solution. FortiAI is specifically designed to alleviate the tedious manual threat investigation of security alerts by identifying and classifying threats and malware outbreaks in sub-seconds.


Detect and prevent insider threat with user and entity behavior analytics (UEBA)

30 percent of data breaches involve organization insiders acting negligently or maliciously. Insiders pose a unique threat to organizations because they have access to proprietary systems and often are able to bypass security measures creating a security blind spot to the risk and security teams.

Fortinet’s User and Entity Behaviour Analytics (UEBA) technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight automatically identifies non-compliant, suspicious, or anomalous behaviour and rapidly alerts any compromised user accounts. This proactive approach to threat detection delivers an additional layer of protection and visibility, whether users are on or off the corporate network.


Next-Generation Endpoint Protection

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture.


Advanced, automated endpoint protection, detection, and response

Advanced attacks can take just minutes, if not seconds, to compromise the endpoints. First-generation endpoint detection and response (EDR) tools simply cannot keep pace. They require manual triage and responses that are not only too slow for fast moving threats but they also generate a huge volume of indicators that burden already overstretched security teams. Further, legacy EDR tools drive up the cost of security operations and can slow processes, negatively impacting business.

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks. FortiEDR helps organizations stop breaches in real-time automatically and efficiently, without overwhelming security teams with a slew of false alarms or disrupting business operations. 

 FortiNAC: Network Access Control

Security for networks with IoT

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.


Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.

 Identity and Access Management Product Details

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Our FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including single sign on services, certificate management, and guest management. FortiToken further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens. The combination of FortiAuthenticator and FortiToken offers a robust response to the challenges today's businesses face in the verification of user and device identity.

Unified Communications

Simplify and secure business communications with integrated voice and conferencing features

Digital innovation is rapidly changing the way employees communicate. As IT infrastructure evolves, teams are finding that legacy voice and phone systems are not only difficult to maintain, but often operate in silos across teams which increases business inefficiencies. Further, these systems often do not keep up with shifting employee needs. One recent report shows that 73% of companies will have distributed teams by 2028—driving the need for integrated, secure communications systems that span mobile devices. Fortinet Unified Communications provides solutions that meet the need of every business with: FortiVoice IP communications, FortiFone conferencing and desk phones, and FortiCall calling plans.

Infinet Wireless


InfiNet Wireless's solutions provide Ethernet extensions (i.e. LAN-to-LAN) via an affordable, dedicated, point-to-point connection operating at bandwidths of 10, 100 and 1000Mbps, between two locations.  In their most advanced configurations, InfiNet Wireless's solutions are able to provide a complete infrastructure that  that enable organisations of all sizes to connect all of their remote sites to the headquarters or even with each other (i.e. ‘any to any’ connections), thereby allowing the simultaneous transmission of multi-protocol, voice, video, and data across the network,products include Infilink, Infinet PTP, Infinet PTMP, Infilink Lite, Infilink, Infilink XG,InfiMAN, Info Monitor.



EnGenius Wireless Network supports the industry’s most comprehensive product line for enterprise WLANs. It combines the best elements of wireless and wired networking to deliver secure, scalable, high-performance WLANs with a low total cost of ownership.  EnGenius has created many new business opportunities for regional partners with new products and development. It supports the industry’s most comprehensive product line for enterprise WLANs, combining the best elements of wireless and wired networking to deliver secure, scalable, high performance WLANs with low total cost of ownership. Products include WiFI controllers, Enstation,Enstation5, Controller Switches EWS2910p, EWS5912FP, EWS7928, EWS355, EWS360, EWS860,EWS370 and many more.



TRENDnet's expansive product portfolio includes Wireless, Wired, Surveillance, Connectivity, and Peripheral device categories. An  The TRENDnet brand is consistently recognized for exceptional quality, superior performance, and responsive support.  Product Range includes Wireless, Switches, PoE, Powerline, Surveillance, Fiber, Industrial, USB, KVM.



Kemp offers ADC Application Delivery Controllers.  Kemp Loadmasters Lmx-1, Lmx-3, LMX-15, LMX-25, LMX-40, LMX-40M. Range include. Hardware LoadMaster, Load BalancerHardware, Appliances for application delivery.  Virtual LoadMaster, Load Balancer Virtual appliances for application delivery, Cloud-native LoadMaster,  Load Balancer Virtual appliances for public cloud applications, ECS Connection Manager optimized for Dell EMC ECS deployments


Advanced Optics


Advanced optics are an extensive range of optical products, we own the brand and offer full support and lifetime warranty on all products.



Core Networks has differentiated itself from the competitors in a number of ways:

  • A cohesive approach to delivering networking solutions to the channel.

  • An ability to fully understand the customers needs and deploy solutions quickly using refined template methodologies and the principles of strong project management.

  • Products represented is not shared between product manager, each product has own product manager and team to facilitate brand building growth and cross selling.

  • Core Networks are visionaries in IT service and product provision and only provide the fastest and most acclaimed products in the world.

  • Core Networks  is a full-service value adding supplier with depth and breadth of skills and practical expertise across the organization.

  • We take the problems of our clients to heart and do not compromise quality of service for anything.



CORE Networks have been consciously, building a culture based on the following set of core values:-

Market driven

Our customer base is not just our main purpose but rather the only reason for our existence.


We support people who take ownership of their work environment.

Quality and value

Quality and value is demonstrated through professionalism in everything we do.


Our leaders create and are the heartbeat of the organization.  Leadership determines the drive, commitment, passion and power of the organization.


We collectively pull in the same direction through active participation and ownership.

Performance driven

People and results count.  We are aggressive in our goals and objectives.

Honesty and integrity

Core Networks value honesty and integrity and don’t deal with anyone that involves themselves in dishonest trades.  We invite our customers and any competitor to evaluate us at all times.