Information Technical Security Services

We provides a wide range of high level technical security services across many security domains.  Our people have extensive long term, large scale experiences with all of our service offerings.

What is Cyber Security ?

Cyber-crime is any criminal act dealing with computers, networks and smartphones. Additionally, cyber-crime also includes traditional crimes conducted through the Internet. In South Africa, cyber-crime has an economic impact equal to 0.14% of the national Gross Domestic Product (GDP) – about R5. 8 billion a year.”

Is to make you aware of your adversary’s abilities and facilitate mitigation before business losses occur.

It is well known that once an intruder has “inside access” to your systems and network(s), the level of damage and theft is exponential in nature.

Cybercrime and web security is unfortunately a global epidemic and something that can affect any business in the future. As a website owner, and just like anything else you might own, the responsibility to protect your web property is your own.

How easy is your system to crack?

Do you have a business critical or high risk application you need increased assurance on? Need to up-skill internal development teams to produce more secure code? We undertake static or dynamic code analysis on your application. Our experienced testers have skills in popular development languages, and have worked upon and deconstructed data warehousing platforms, banking systems, medical devices, and administrative corporate applications.

Frequently Code Reviews are incorporated into Penetration Testing activities, to provide a strong understanding of your systems security posture.

Penetration & Vulnerabilities Test

Our purpose is to make you aware of your adversary’s abilities and facilitate mitigation before business losses occur. It is well known that once an intruder has “inside access” to your systems and network(s), the level of damage and theft is exponential in nature.

Penetration Testing

How easy is it to compromise your system, or ‘get hacked’?

Vulnerability and Penetration Testing activities are a key technical assurance activity for higher risk systems. This testing helps to validate developmental, procedural and technical controls are implemented and working as expected.

We provide leading testers to undertake both lightweight vulnerability testing, and in-depth Penetration testing, while translating the technical risks into business terms for professional engagement with the relevant business units. If you have concerns about physical access, we can also provide red teaming capabilities, where we utilise physical access and social engineering skills to reach the target. This combined with penetration testing activities will provide an end to end view of your security posture. Penetration testing is a highly skilled and resource specific undertaking. Acknowledging that the results of a Penetration test are heavily dependent upon the methodology, and the skills of the individual penetration tester, we do  provides the best testing in the market.

Information Gathering

Information gathering can be a slow frustrating exercise, depending on the person or company that is targeted. Even if it is possible to get a lot of data in a short period of time. We make use of more that one program to scan and crawl for data and where needed use custom Python, Ruby and PHP scrips.

Physical Access

Physical penetration testing determines the vulnerabilities present in your organization’s physical security controls.

Social Engineering

Social engineering testing will determine if your people are susceptible to being tricked into revealing information

Information Gathering

Intelligence Gathering is performing reconnaissance against a target to gather as much information as possible

Remote Access

External network penetration testing scans your organization’s systems for potential security holes from the outside


How Safe is your network

The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness. The most important lesson from the weakness, was that relying on any one security feature is risky. “You shouldn’t be trusting one single point of failure for all your security. Don’t rely on just your wifi, use a VPN or secure connection for anything important.”

Network Security Zoning

As part of organizational risk reduction strategies, We can work with you to understand your environment and develop a zone and trust based network security model. This control provides a common, simple, template based approach you can quickly deploy systems into. This applies consistently for on-premise and cloud based hosting arrangement. These network security models are vendor independent, and help ensure resources and effort are only expected on higher importance platforms.  Our consultants have designed and worked in the deployment and utilization of internal Network Segmentation.

Need an Accessment

Onsite Accessment

A vulnerability assessment provides organizations with the knowledge to understand threats to their environment.


A third party offers an unbiased, realistic measure of your security and provides expert remediation to help mitigate risk