LED BY VETERAN CYBER SECURITY EXPERTS WITH PRACTICAL EXPERIENCE FROM DESIGN, DEVELOPMENT,
DEPLOYMENT AND MAINTENANCE OF SECURITY SOLUTIONS
To simplify cyber security management while not comprimising the security.
This is achieved through helping our clients understand their cyber security challenges, working with them on addressing the issues and helping them fufil the protection that they need.
Cyber security management takes into account 3 key pillars - People, Process and Technology.
Techonology Solutions need to be as simple as possible with clear information leading to actionable decisions, while not overloading users with endless data and graphs. Every environment is different, and solutions should be deployed based on the organisational needs, without forcing them to adapt to the rigidities of the solution.
Kenneth has more than 12 years of experience in security management and cyber security, and has proven track record for delivering the highest standards of work. His expertise lies from analysing of the situation to identifying security needs, and full security and governance development of policies and frameworks. He used to head complex multi-party operations that demanded the highest level of security, his strong ability ensured that all the security concerns had been addressed with desired mission outcome achieved.
Kenneth is also an expert in network security and analytics technologies, having led technology R&D, solutions deployment and architectural design and implementation of cyber security projects in his career.
John is a veteran in cyber security technologies with more than 15 years of experience under his belt. Respected as one of the top experts in his domain, John has always been called upon and has consistently delivered solutions for some of the toughest challenges in cyber security. He is known for his expertise in identifying the key issues, working out practical solutions to deliver top-quality cyber security solutions, and the specialised expert for advisory on the security aspects of different types of technologies.
John also specialises in network security, OS hardening, mobile devices and applications security, telecommunications equipment as well as architectural design, review and implementation of cyber security solutions.