Cyber Security

As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.

Network Security

• Intrusion prevention/detect systems (IPS & IDS)
• Firewall/unified threat management systems (UTMs)
• Network access control (NAC)
• Email, web & DNS security layer

Group 1308

Cybersecurity Consulting Services

• Penetration Testing & vulnerability Mgt
• Social engineering simulation
• Cybersecurity awareness program

Endpoint Security & Vulnerability Mgt

• Mobile device management (MDM)
• Assets Management, configuration and vulnerability
management & patch mgt • Advance Endpoint protection

Application security

• Static AST (SAST)technology
• Dynamic AST (DAST)technology
• Web application firewall

IAM & PAM

• Identity & Access Management (IAM)
• Privileged Access Management (PAM)

Security Monitoring & Analytics

• Security Information Event Mgt "STEM"
• User and Entity Behavior Analytics
• SOAR- Security orchestration, automation & response