As an organisation we understand the threat landscape of cyber-attacks in the world today. As part of this understanding we do realise that we cannot do this alone.

As a strategic benefit to both our customers and ourselves, we create alliances with partners that are leaders in the Cybersecurity Landscape worldwide.

These partnerships provide solutions we can offer our customers that include unique methodologies and tools through which potential risks can be identified in a practical cost-effective manner.

An integral part of our offering is the expertise and technologies that assist our customers with securing their networks, systems and information.

Governance and Compliance forms part of the offering.

Cyber Defense Operations Center (CDOC)

We provide the end-to-end scope of cybersecurity services to ensure that we cover the major functions:

  • Monitor customer networks 24/7/365
  • Analyse and evaluate system resilience using cyber-attack simulations
  • Analyse cyber-attack trends, share information and knowledge
  • Utilize advance techniques to develop sophisticated security technology
  • Improve technological understanding of security management and staff by education
  • Preserve the inspect evidence through advanced digital analysis

CDOC Services

Endpoint Security

Server Platforms

Applications and Databases

Security

  • Endpoint Security
  • Whole disk encryption
  • Data Loss Prevention
  • Endpoints
  • Advanced Threat detection
  • Critical System Protection
  • Mobile devices
  • Mobile Security
  • Mobile Device Encryption
  • Mobile Data Loss Prevention
  • Mobile Authentication

Endpoint management

  • Patch management
  • Software management
  • Remote deployment/management
  • Application and Device Control
  • Mobile device management
  • Mobile Application management

Assessments and services

  • Malware assessment
  • Vulnerability Assessment
  • Endpoint Security Health
  • Compromise assessment

Security

  • Data Center Security for VM
  • Data Center Security Services
  • Control Compliance Suite for Servers
  • DLP Storage
  • Storage Encryption
  • Endpoint Management
  • Patch Management
  • Software Management
  • Real Time Monitoring
  • Assessments and Services
  • Controls Assessment

 

Security

  • Vulnerability Management for Databases
  • Virtual Patching for Databases
  • Database Activity Monitoring
  • Control Compliance Suite for Databases and Applications Management
  • Application Metering
  • Assessments and Services
  • Controls Assessment

 

OODA Operational and Security Measure Life Cycle

Observe – Surveillance and detection of warning signs and anomalies

Orientate – Situational assessment through visibility and other means

Decision – Decision making on measures and other related issues

Action – Quick implementation of measures

Cybersecurity Values