LED BY VETERAN CYBER SECURITY EXPERTS WITH PRACTICAL EXPERIENCE FROM DESIGN, DEVELOPMENT,
DEPLOYMENT AND MAINTENANCE OF SECURITY SOLUTIONS
To simplify cyber security management while not compromising the security.
This is achieved through helping our clients understand the cyber security challenges faced, working with them to address the issues and fulfilling the protection that they need.
Cyber security management takes into account 3 key pillars - People, Process and Technology.
Technology Solutions need to be as simple as possible with clear information leading to actionable decisions, while not overloading users with endless data and graphs. Every environment is different, and solutions should be deployed based on the organisational needs without forcing them to adapt to the rigidities of the solution.
CEO. Co-Founder
Kenneth has more than years of experience in security management and cyber security, and has a proven track record for delivering the highest standards of work. His expertise lies from analysing the situation to identifying security needs, and full security and governance development of policies and frameworks. He used to head complex multi-party operations that demanded the highest level of security, his strong ability ensured that all the security concerns had been addressed with desired mission outcome achieved.
Kenneth is also an expert in network security and analytics technologies, having led technology R&D, solutions deployment and architectural design and implementation of cyber security projects in his career.
CTO. Co-Founder
John is a veteran in cyber security technologies with more than years of experience under his belt. Respected as one of the top experts in his domain, John has always been called upon and has consistently delivered solutions for some of the toughest challenges in cyber security. He is known as the specialised expert for advisory on the security aspects of different types of technologies, and for his expertise in identifying the key issues and working out practical solutions to deliver top-quality cyber security solutions.
John also specialises in network security, OS hardening, mobile devices and applications security, telecommunications equipment as well as architectural design, review and implementation of cyber security solutions.