Subscribe
About

Achieving enhanced cyber security with multi-modal approach

As more people have adopted a work from home (WFH) or hybrid work business lifestyle, the importance of safer internet transacting takes centre stage.

CICT (an Elvey Group company and part of the Hudaco Group of companies) takes a multi-modal approach to cyber security, which entails a dynamic link between certified, skilled and competent personnel, and leading solutions and products. 

The CICT team comprises highly-experienced network engineers, helpdesk and Security Operation Centre (SOC) support technicians, systems developers, pre-sales engineers and product specialists. Communication and collaboration between the individual team members results in a comprehensive tailor-made end-to-end customer experience.

Similarly, a strong and synergistic relationship with its OEM suppliers ensures enhanced cyber security for its clients and their customers.

Services include:

  • Nerve centre and helpdesk – the digital hub and core of the company’s processes and technology that monitors, remotely manages, supports and regulates its own as well as clients’ networks.
  • Network infrastructure – implementation and support, including design and rollout of clients’ networking requirements.
  • IT maintenance and support – onsite and SOC technicians that perform routine on-site maintenance and a 24/7 remote support service through the nerve centre and helpdesk.
  • Network and infrastructure auditing – accurate network and infrastructure audited information.
  • Cloud computing – cloud infrastructure at all the major data centres throughout South Africa as well as the provision of Microsoft Azure dynamic infrastructure services.

Stay safe with CICT’s firewalls and network audits

Network and data security is critically important for businesses and requires the highest levels of protection against the increased risk of being exposed to cyber hacking and ransomware. CICT’s superior firewall and security knowledge is employed to protect client data and network integrity. In addition, a 24-hour technical support team is available to ensure businesses are fully safeguarded against cyber criminals.

Full network and compliance audits

CICT works together with customer teams to develop a solution that suits their specific needs when they need a full network and compliance audit. CICT provides audits for:

  • IT security compliance.
  • Internal and external penetration tests.
  • IT risk assessments.
  • Firewall security and compliance.
  • Microsoft compliance audits.
  • Domain controller security compliance.
  • DMARK compliancy testing, recommendations and setup.
  • SOC as a service.
  • Managed threat response.
  • Cyber security insurance.

Multi-modal approach to cybersecurity

Managed threat response with Sophos

The Sophos 24/7 threat hunting, detection and response solution offers:

  • A team of elite threat hunters and response experts who make targeted actions on your behalf to neutralise threats.
  • Modern technology and expert-led analysis to provide all-round threat coverage:
  • Intercept X with EDR monitors for threats.
  • Machine learning prioritises suspicious activities.
  • Confirmed malicious activities are automatically terminated.
  • Human analysts investigate suspicious events.
  • Threat hunts are conducted to find new threats.
  • Response experts take action to neutralise threats.

Internal Email Protect

Mimecast Internal Email Protect applies best-practice security inspections to internal and outbound email traffic, allowing organisations to monitor, detect and remediate security threats that originate from within their email systems. It will:

  • Provide comprehensive protection from threats originating from internal and outbound email.
  • Detect lateral movement of attacks via email from one internal user to another.
  • Identify and prevent threats or sensitive data from leaving an organisation.
  • Automate the detection and removal of internal emails that are determined to contain threats.
  • Simplify administration with a single console across Mimecast’s entire email security solution.
  • Increase employees’ security awareness by notifying them when malicious emails are found.

Offsite DR managed backups

Cloud-managed backups enable secure, automated disk-to-disk backup and recovery of critical information stored on servers or corporate devices. These include:

  • Virtual backups. Dedicated backup implementations and backup solutions ensure that client businesses always have the protection in place to ensure ongoing business operation.
  • On-premises backups. This includes tape, disk or replication backup options. This service forms part of monthly maintenance structures to ensure a business’s data is always secure.
  • Hosted (cloud) backup solutions. Off-site backup allows backing up data to a remote server or to media that is transported off site. During cloud (online) backup, a copy of the data is sent over a network to an off-site server. A third-party cloud service provider typically hosts that server, but an enterprise can also own it.

Workforce security and management software

DTEX Systems helps hundreds of organisations worldwide better understand their workforce, protect their data, and make human-centric operational investments. Its Workforce Cyber Intelligence platform brings together UEBA, endpoint DLP, digital forensics, employee monitoring and insider threat management in one scalable, cloud-native platform.

Smart, secure data backup

Redstor’s aim is to enable MSPs to discover, manage and protect all customer data in the simplest, smartest and safest way through a single app.

The company provides:

  • Malware detection.
  • Tiered data storage.
  • Data tagging.
  • InstantData.

For more information, contact CICT, +27 (0) 10 590 6177, info@commercialict.co.za www.commercialict.co.za

Share

Elvey Group

Marketing and Corporate Affairs

Elvey Group Head Office,

27 Greenstone Place, Greenstone Hill, Edenvale 1609

Editorial contacts