Supporting businesses since 2003. Passionate about service.
Read MoreWith over 21 years of experience in IT support and email systems integration, Databias has helped many South African businesses set up professional email and web hosting.
The corporate email industry has in the past been largely dominated by Microsoft and it's Exchange messaging platform. Exchange became available to the general public almost a decade ago thanks to a change in licensing which enabled technical service providers to license Exchange on a per mailbox basis. Databias reliably operated it's Hosted Exchange platform for 7 years, supporting hundreds of companies and thousands of mailboxes. We've learnt that customer service is the key to being a successful Micrsoft reseller.
In 2011 Microsoft again introduced another change in the email market with the launch of the 365 platform, which offers Microsoft's products to companies and the general public on a pay as you go basis. We've learnt that giving customers tools to manage their digital assets is another key to becoming a successful reseller.
Fanatical local support and customised, value added software
Company Information
Physical Address
30 Tamboti Drive, Simbithi Eco Estate, Ballito, South Africa
Registration Details
Databias cc.
CK: 2003/030930/23
VAT: 4770206078
Contact Person
Jessica Faircliff
Please use the contact page to get in touch with us.
Telephone
+27 28 312 4799
We're hiring
Think you want to be part of an emerging South African startup? Are you passionate about helping people with their technology problems? Get in touch with us today and we'll see if you are that person we've been looking for.
Our latest news
Undersea cables damaged
Please note that four of the nine undersea internet cables that provide internet services to South Africa are currently damaged. This has been affecting numerous services including email delivery. Please be patient whilst this is resolved.
Latest self-help article
Modus operandi for hackers
Hackers email legitimate looking mails (phishing) that usually have some form of urgency, and include a link. The user clicks on the link, the web page they are taken to looks like Microsoft, for example, and the user then enters their credentials to log in, thereby giving their username and password to the hacker.