Cyber security risk management comprises the full range of activities undertaken to protect IT and data from unauthorized access and other cyber threats, to maintain awareness of cyber threats, to detect anomalies and incidents adversely affecting IT and data, and to mitigate the impact of, respond to, and recover from incidents.

We provide Cyber and IT Security with secure assessments of corporate network vulnerabilities & controlled penetration testing (pentest) through social engineering & exploits. We offer the most comprehensive range of services, products and solutions in South Africa and surrounding countries to suit your exact IT Security requirements.

Key Services & Methods

SaaS (Security as a Service)
  • Scheduled vulnerability scanning.
  • 24/7/365 Monitoring.
  • Management of security vulnerabilities.
  • Scheduled penetration testing.
  • Threat assessments.
  • Policy and Compliance allignment.
  • Threat Detection.
Key Targets of Focus
  • Social Engineering
  • Password Cracking
  • Infrastructure Vulnerabilities
  • Software Exploits
  • Wireless Hacking
  • Buffer Overflow
  • Web Application Hacking
  • Malicious Code
  • Denial Of Service
  • Remote Attacks
  • Network Hacking
  • Database Vulnerabilities
  • Man In The Middle
  • Malware
What We Offer
  • IT Security Management & Monitoring
  • Controlled Penetration Testing
  • Social Vulnerability Testing
  • Protective & Preventative Solutions
  • Software Testing
  • Equipment Testing
  • Secure Infrastructure
  • Disaster Recovery Solutions
  • PCI & Policy Compliance Assessments
  • POPI & GDPR Compliance Assessments
  • ISO/IEC 27001:2013 Assessments
Our Approach
  • External Penetration Testing (Open or Blind)
  • Internal Penetration Testing
  • Social Vulnerabilities and Exploits (Blind)
  • Implementation of Policies and Procedures

Products & Solutions

Asset View

Discover assets and use dynamic tags to keep your assets automatically organized.

Cloud Agent

Stay updated with network security by deploying agents on your hosts.

Vulnerability Management

Map and scan your network, prioritize your critical vulnerabilities and fix them.

Continuous Monitoring

Set up monitoring and alerting of new security risks

Policy Compliance

Define and monitor IT security standards aligned with regulations.

PCI Compliance
Achieve compliance with the PCI Data Security Standard (DSS).
Web Application Scanning

Identify and manage web application security risks.

Malware Detection

Identify and manage web site malware risks.

Threat Protection

Add threat intelligence feed to your existing AssetView

BIG-IP Platform

A blend of software and hardware that’s a load balancer and a full proxy. It gives you the ability to control the traffic that passes through your network.

BIG-IQ Centralized Management

A platform that manages your devices and the services they deliver.

Email Security

Safeguard your company and employees against data leaks, malware, spam and advanced threats

Business Continuity

Deliver always-on email without the expense and headache

Security Transformation Services

Drive security transformation without introducing new risk

Building the right security strategy that accelerates new IT trends, addresses skills shortages, and staying ahead of rapidly changing techniques is critical to a creating a more proactive and mature security environment. IBM® Security can help you design an integrated framework with security management solutions, systems integration and managed services to protect the enterprise.
Security Operations and Incident Response

The future of security is cognitive

As humans, we respond to situations using a lifetime of experience and learning. In today's world the volume of data increases every second and threats continue to transform and grow, weakening your ability to respond to attacks. Now, with cognitive capabilities, we have a real opportunity to let machines do what they best and empower people to focus on what they do best—act to protect your enterprise. Welcome to the future of security, an adaptive security architecture that helps you orchestrate your defenses with an integrated, immune system approach.
iWorkflow

Enables orchestration across multiple devices.

WebSafe and MobileSafe

Protects your customers with client-side application security.

Herculon

A multi-platform, integrated security suite, backed by 24/7 access to our security experts, protects against the constantly evolving threats leveled at your apps.

RSA NetWitness® Suite

Prevent business disruption, safeguard intellectual property and protect shareholder value with RSA NetWitness Suite.

RSA® Fraud & Risk Intelligence Suite

Protect customers from advanced cybercrime threats on the web and via mobile channels with industry-leading fraud prevention solutions from RSA.

  • Detect and prevent fraud in real time.
  • Protect assets, customers and brand value.
  • Secure transactions across the web and mobile devices.
  • Track emerging threats, fraud trends and new fraud management strategies.
RSA Archer® Suite
  • Address the most critical domains of business risk and evolve your GRC program with a full suite of multi-disciplinary risk management solutions and a single, configurable, integrated software platform. RSA Archer can help you mature your organization's GRC program with solutions built on industry standards and best practices.

RSA SecurID® Suite

RSA SecurID Suite goes beyond traditional identity and access management, using identity insights, threat intelligence and business context to provide secure access to all of your users, across all of your applications, from the ground to the cloud. It brings together multi-factor authentication, risk-based access management, identity governance and user lifecycle management in one powerful suite of solutions.

Network Security Services

The security threats that face organizations are ever-changing and the solutions for combating these threats should be as well. WatchGuard offers the widest variety of network security services ranging from standard IPS, URL filtering, Gateway AV, application control, and antispam to services for combating advanced threats such as file sandboxing, data loss prevention, and more.

Network Security Appliances

Whether you have a single location, a small chain of restaurants, or thousands of retail locations around the world, WatchGuard has an appliance right for your environment. We offer a full portfolio of Firebox solutions ranging from physical tabletop and 1U rack-mounted models to virtualized and cloud-based offerings.

Wireless Security Hardware

WatchGuard offers a variety of solutions for introducing secure, fast, and easy-to-manage Wi-Fi into your business. From wireless-enabled Firebox appliances to cloud-ready, feature-rich access points, we’ve got you covered. Focused on security, WatchGuard also offers dedicated WIPS sensors for enhancing the safety of existing Wi-Fi deployments.

Management & Visibility

In addition to delivering enterprise-grade security, WatchGuard is dedicated to eliminating the barriers to adopting and fully utilizing that security. The key to this is through tight integration, centralized management, and actionable visibility. Whether you are implementing a Firebox, hundreds of Fireboxes, or a Wi-Fi network, our management and visibility platforms make sure that deployment is quick, ongoing management is easy, and information is actionable.

Archiving, Risk & Compliance

Meet regulatory and legal challenges to reduce cost and risk

Employee Productivity & Mobility

Security controls, access to corporate data, and email continuity – from any device, at any time

Risk Management and Data Protection

Take the path to security protection

As business transactions are pushed outside company walls, the traditional security perimeter around the data center is dissolving. Security risk management in a cloud or mobile environment is now a primary concern of CISOs. IBM® Security can help you achieve security threat management with risk-based intelligence, integration and the industry’s largest SaaS portfolio.