We remove IT security from the critical path in respect of business process implementation and improvement
Integrate with existing security products which results in investment protection</li></ul>Section 2<br />12:44:10<br />
Co Source Model<br />Security Policy Management<br />Our solution is implemented against an existing security policy or against the Chameleon Policy which is inline with the PCI DSS requirements.<br />Section 2<br />12:44:10<br />
PCI Compliance<br />For companies that transact, store or process credit card information our system measures, as a default, for PCI compliance.<br />We have skills in the company with PCI auditing experience and can implement processes and roadmaps that will assist companies to achieve PCI compliance cost effectively.<br />Section 2<br />12:44:10<br />
Modular Security Appliance<br />Security appliance that resides in your environment and enables us to deliver our security offering in a modular fashion.<br />Assessments are conducted using 4 different threat engines and providing approximately 25 000 different vulnerability checks, more than 4 times our nearest competitors. <br />Section 2<br />12:44:21<br />
C180<br />Security appliance that resides in your environment and enables us to deliver our SOC service in secure and reliable fashion<br />Log file collection are conducted using product agnostic technology. Network and Server / Desktop systems are fully supported regardless of the installed Operating System.<br />Section 2<br />12:44:21<br />
International Publications<br />World Comp and IEEE accepted publications<br />We have been invited to publish and present two international academic papers at WORLDCOMP ‘08 and ’09 held in the United States.<br />World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP). WORLDCOMP is the largest annual gathering of researchers in computer science, computer engineering and applied computing. It assembles a spectrum of affiliated research conferences, workshops, and symposiums into a coordinated research meeting held in a common place at a common time. This model facilitates communication among researchers in different fields of computer science and computer engineering.<br />IEEE Published article can be found at:<br />http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4696131<br />Section 4<br />12:44:43<br />
References<br /><ul><li>Zurich Insurance South Africa
South African Post Bank</li></ul>Section 4<br />12:44:45<br />
Culture<br /><ul><li>Our philosophy in respect of consultants is to measure them in respect of customer satisfaction and we implement incentive schemes based on agreed criteria.
Being a PTY company, we are not governed by the same financial performance criteria as a listed entity and therefore are able to reinvest profit in growing the company.
Being a service consultative based organization with staff bonus schemes and equity participation opportunities we have been able to attract and retain key personnel in this country who otherwise would be tempted to look abroad.
Our differentiation in the market will always be the quality of our staff and we therefore we invest heavily in education, awareness programs and training.</li></ul>Section 4<br />12:44:46<br />