Cyber security shield with keyhole and circuit pattern symbolising data protection and network security

Attackers automate. Your defence should, too.

Cut risk without killing speed: automate detection, response and reporting — and prove it with monthly KPIs and real SLAs.

Stop the top threats

Ransomware, BEC, account takeover and exfiltration — shut down with EDR isolation, safe-links, DMARC alignment and least-privilege ZTNA.

Make it measurable

Track MTTR, blocked events, patch compliance, phishing risk and identity posture. Get monthly actions — miss the SLA and service credits apply.

Keep people fast

Per-app access, path QoS and smart caching keep users flying — fewer roadblocks, less shadow IT and safer, snappier workdays.

End-to-end Cyber Security that actually lowers risk

Stack built for South African businesses: next-gen network security, identity-first controls, modern endpoint defence and 24/7 SOC playbooks.

NGFW · IPS/IDS · Secure DNS

  • App-aware rules, TLS inspection, geo/IP reputation & curated threat feeds
  • Segmentation (staff/guest/IoT/OT) using VLAN & VPN fabric
  • URL/DNS filtering for malware, phishing, C2 & typosquatting

Endpoint Security (EDR/XDR)

  • Behavioural detections, rollback, isolation & ring-based patching
  • Windows/Mac/Linux + MDM; USB/device control & posture checks
  • Threat hunting, IOC sweeps & attack-surface reduction

Email Security & DMARC

  • SPF/DKIM/DMARC with brand impersonation & look-alike domain blocking
  • Attachment/URL sandboxing, BEC/VIP protection & spoof controls
  • Archiving, journaling, retention & legal hold

Identity, SSO & Conditional Access

  • Entra ID / Google Identity SSO with phishing-resistant MFA
  • Risk- & device-based access, JIT elevation, PIM/PAM approvals
  • Audit trails for compliance & investigations

ZTNA & SASE

  • Per-app access (no flat network exposure)
  • SWG + CASB controls, cloud DLP & SaaS visibility
  • One policy for office, branch, home & mobile

Vulnerability & Patch Management

  • Continuous scanning with exploitability & asset-criticality scoring
  • Ring deployments, maintenance windows & safe deferrals
  • Exception workflow with business owner sign-off

SIEM/SOC & Incident Response

  • Log ingestion, correlation rules, UEBA & automated playbooks
  • 24/7 triage → contain → eradicate → recover
  • Post-incident review, evidence handling & lessons learned

DLP, CASB & Data Protection

  • Content & context policies (PII, source code, finance)
  • OAuth app controls, token audits & session policies
  • Immutable backups with quarterly restore tests

Awareness, Policies & Audits

  • Phishing simulations, micro-training & culture metrics
  • POPIA policy pack, ISO/NIST mappings & risk register
  • Supplier & shadow-IT discovery; joiner-mover-leaver hygiene

Harden Microsoft 365 & Google Workspace — identity-first, breach-ready

Lock down mail, files and identities with proven controls across M365 (Entra/Defender) and Google Workspace — without slowing users.

M365 (Entra · Defender)

  • Defender for Office safe-links/attachments, priority accounts & impersonation protection
  • Conditional Access: device compliance, named locations, sign-in risk & session controls
  • SharePoint/OneDrive hygiene, external sharing guardrails & sensitivity labels

Google Workspace

  • Advanced phishing/malware, account protection & context-aware access
  • Drive DLP & classification, OAuth app restrictions & token reviews
  • Gmail routing, quarantine workflows & S/MIME options

Identity & SSO

  • FIDO2/passkeys, number-matching MFA & step-up authentication
  • PIM/PAM with JIT elevation, break-glass accounts & emergency access
  • Access reviews, group lifecycle & orphaned resource cleanup

Secure IoT & Light OT — segment, enforce, stay online

Contain device risk without breaking operations. Segment by intent, enforce least-privilege egress and get eyes on unmanaged edges.

Micro-segmentation

Isolate CCTV, printers, POS, handhelds and sensors with VLANs/VPN fabric and explicit egress rules.

Allow-list & posture

Known-good protocols/ports, device fingerprints and rapid quarantine on anomalous behaviour.

Edge visibility

Flow analytics and threat intel for “unmanaged” devices to shrink blind spots and dwell time.

Reference architecture — layered, identity-first, proven

Three clean layers that scale: secure the edge, enforce identity-aware access, and automate response with real telemetry.

Access edge

NGFW/IPS, Secure DNS, SD-WAN edges and Wi-Fi with identity-based access, plus ZTNA clients for roaming users.

Identity & apps

SSO with phishing-resistant MFA, per-app policies, device-compliance signals and SaaS session control via CASB.

Telemetry & response

SIEM/SOC ingests firewall, EDR, IdP and SaaS logs; playbooks isolate endpoints, revoke tokens, block domains and rotate secrets.

Cyber Security Onboarding — go-live in 30 days, with zero drama

A proven, four-step rollout that fixes risks first, ships policies safely, and lands measurable protection fast.

  1. Week 0

    Kickoff & quick wins

    • Project kickoff, RACI and comms paths.
    • Asset & identity discovery (AD/Entra, endpoints, mail, DNS).
    • Urgent remediations: revoke risky tokens, block known bad domains, patch critical CVEs.
  2. Week 1

    Policy & pilot

    • Policies & runbooks finalised (MFA, ZTNA, EDR, email, DNS).
    • Lab validation; change windows agreed.
    • Pilot ring rollout with rollback plan signed off.
  3. Weeks 2–3

    Rollout rings

    • Phased deployment: EDR/XDR, MFA/SSO, ZTNA, Secure DNS, email security.
    • Awareness launch: bite-sized tips & simulated phish.
    • Health checks & telemetry baselines per site.
  4. Week 4

    Operate & improve

    • 24/7 monitoring active; KPIs & MTTR baseline locked.
    • CAB cadence; monthly reports & exec summary.
    • Handover pack: diagrams, access, runbooks, escalation matrix.

Security RACI — exactly who owns what, no finger-pointing

A crisp accountability matrix so projects move faster, audits pass first time, and escalations stay clean.

Ownership matrix for security responsibilities
CapabilityWe ownYou ownShared
NGFW/IPS, DNS, ZTNAPolicy, monitoring, change controlBusiness exceptionsPlanned change windows
EDR/XDR & patchingPolicy, isolation, ring planningApp compatibility testingMaintenance windows
Identity & SSO/MFAConditional Access, reviewsRole design, approvalsJoiner–mover–leaver
Email security & DMARCRouting, sandboxing, enforcementBrand/legal DNS recordsException handling

Security coverage that actually stops attacks — all from one provider

From the edge to the inbox: policy, protection and 24/7 monitoring with measurable SLAs.

Firewall / NGFW

Deep visibility, geo/IP and reputation policies, IDS/IPS and app-aware rules. Managed upgrades, change control and auditable records.

Wireless

AP health, client analytics and policy-separated SSIDs for staff, guest and IoT. Rogue AP and misuse alerts included.

Email security

Sandboxing, safe-links and anti-spoofing with DMARC/DKIM. Optional encryption and retention/DLP for compliance.

Web security (SWG)

Category controls, TLS inspection and safe search that stays fast. Auditable browsing reports for reviews and audits.

Encryption

Device, file/folder and mail encryption with recovery keys, key rotation policies and compliance-ready reporting.

Mobile (MDM/UEM)

Secure enrolment, posture checks, app controls and remote wipe across iOS, Android and Windows.

Server & cloud

Harden on-prem and cloud with CIS baselines, patch cadence, least-privilege access and verified backups.

Endpoint (EDR/XDR)

Behavioural detection, isolation and rollback with SOC playbooks to contain, eradicate and recover fast.

What we measure — and improve every month

Exposure

Top vulns by exploitability, asset criticality & time-to-patch; identity hygiene & risky tokens.

  • CVE backlog
  • TTP
  • Risky tokens

Controls

EDR coverage, DNS/URL blocks, MFA adoption, Conditional Access match rate, ZTNA usage vs VPN.

  • EDR %
  • MFA %
  • CA hits

Outcomes

Mean time to detect/respond, incident counts & severities, training click-through trending the right way.

  • MTTD
  • MTTR
  • Incidents ↓

Service Level Agreement (SLA)

Uptime

99.9–99.95% (service dependent). Credits on breach.

Response

15–30 min P1, ≤60 min P2. 24/7 acknowledgement.

Restore

≤4 hrs P1 (workaround/failover first). P2 in business day.

Reporting

Monthly KPIs, posture score, CAB actions & credits (if any).

Works with your stack

Tie security into the tools you already run — identity, email, endpoints, firewalls and logs.

Identity & SaaS

Microsoft Entra ID, Google Workspace, Okta, Azure AD B2B/B2C, Microsoft 365/SharePoint, Google Drive, Salesforce, Slack, Zoom, Teams.

  • Entra ID
  • Google
  • Okta
  • Teams
  • Slack

Security

Microsoft Defender suite, CrowdStrike / Carbon Black / SentinelOne EDR, Fortinet / Palo Alto / Check Point firewalls, Cloudflare & secure DNS providers.

  • Defender
  • CrowdStrike
  • Palo Alto
  • Fortinet
  • Cloudflare

Observability

Syslog, Microsoft 365 / Google audit logs, endpoint telemetry, SD-WAN flow analytics, SIEM ingestion (Azure, Splunk-style).

  • Syslog
  • Azure
  • Splunk
  • Flow
  • O365/Google

Security plans built for SA businesses — from R299/user

Simple tiers that cover the real attack paths. Add sites and users without surprises.

Essentials

Best for 20–100 users · single site

  • NGFW/IPS, Secure DNS, EDR with isolation
  • MFA/SSO baseline, email security + DMARC
  • Monthly report · business-hours change control

From R299 / user / month (min. commit)

Enterprise

High-risk data · complex estates

  • Everything in Business + DLP/CASB, SOAR playbooks, PIM/PAM
  • Advanced audit packs & attack-surface reduction
  • Quarterly tabletop & executive risk reviews

Custom / user & site-based

Add-ons

Phishing simulations & awareness · Shadow-IT discovery · App pen testing · Email archiving.

What’s included

Runbooks, 24/7 monitoring, monthly KPIs, CAB cadence & clear SLAs. Service credits on measured breach.

Flexible terms

Per-user pricing with site minimums. Scale up or down as the business changes.

Additional Business Services — Connectivity, SD-WAN & Voice

Keep branches online and teams connected with carrier-grade Internet, smart WAN and modern telephony — backed by SLAs.

Business Fibre (FTTB / DIA)

Symmetrical bandwidth, low jitter and static IP for VoIP, SaaS, CCTV and POS. 1:1 contention with assured uptime.

Explore Business Fibre

Business Wireless (Microwave)

Rapid deployment where trenching stalls. Carrier-grade LOS links and resilient last-mile for business-critical sites.

Explore Business Wireless

Business LTE / 5G

Day-one connectivity and SD-WAN failover. Private APN and static IP options for secure branch access.

Explore Business LTE

SD-WAN & Managed WAN

Application-aware routing, link bonding & healing, zero-touch rollout and measured performance with local support.

See SD-WAN

Voice & Cloud PBX

VoIP, SIP trunks, Teams integration, call recording and number porting — designed for crystal-clear calls.

Explore Voice

Cyber Security — Frequently Asked Questions

Short, practical answers for South African businesses. Built to win rich results.

What is cyber security for a South African business?

It’s how you protect identities, devices, networks and data from attacks — with policies, controls and 24/7 monitoring.

In practice: MFA/SSO, EDR/XDR, NGFW/IPS, email/DMARC, Secure DNS, ZTNA/SASE, backups and an on-call SOC with response targets.

EDR vs XDR — what’s the difference?

EDR protects endpoints; XDR joins signals from endpoints, identity, email and network for better detections.

We deploy EDR/XDR, isolate infected hosts, roll back changes and correlate alerts in the SOC for faster MTTR.

ZTNA vs VPN — which should we use?

ZTNA grants access to specific apps after user/device checks; VPN exposes a whole network.

Most teams move to ZTNA for least-privilege access and better user experience, keeping VPN for legacy needs.

What is DMARC and why do we need it?

DMARC stops spoofing by enforcing SPF/DKIM alignment and gives you reporting on abuse.

We implement SPF/DKIM/DMARC with safe-links/sandboxing to cut phishing and brand impersonation.

Does this help with POPIA/ISO/NIST?

Yes — controls map to POPIA principles and ISO/NIST frameworks, with evidence and reports.

We provide audit-ready logs, access reviews, backup tests and policies that match your risk profile.

Can you actually stop ransomware?

We reduce risk with EDR/XDR, email filtering, DNS blocking and least-privilege access.

If it lands, we isolate hosts, revoke tokens, block C2, restore from immutable backups, and do post-incident review.

How much does business cyber security cost in SA?

Plans start at R299 per user per month with site minimums.

Pricing scales by controls (e.g., ZTNA/SASE, SIEM, DLP) and user count. Get an exact quote on our contact page.

How long does implementation take?

Discovery to go-live is typically weeks — not quarters.

We begin with quick wins (tokens, phishing blocks, patches), then ring-deploy EDR/MFA/ZTNA/DNS under change control.

Do we really need a 24/7 SOC?

If you have Internet-facing systems, yes — attacks don’t keep office hours.

Our SA SOC/NOC provides 24/7 triage and SLA-backed response/restore with service credits on breach.

Is MFA still worth it if users hate it?

Yes — MFA stops most account takeovers, especially with phishing-resistant methods.

We use passkeys/number matching and Conditional Access to keep friction low but risk-aware.

Do you handle backup and disaster recovery?

Yes — immutable backups, tested restores and documented RPO/RTO runbooks.

We run quarterly recovery tests and report evidence for compliance.

Where do you support on-site?

Nationwide remote, with rapid on-site in major metros.

Johannesburg, Pretoria, Midrand, Cape Town, Durban, Gqeberha, Bloemfontein and surrounds.

Slash Cyber Risk — Without Slowing Your Business

We’ll assess your estate, fix the quick wins and run the rest under clear SLAs.