Cyber Security

Cyber security is, quite simply, about understanding and mitigating risk. It can be a huge enabler for organisations and is key to modern business efficiency.  The cyber threat has evolved rapidly over the years and new legislations have also increased the need for organisations to protect against attacks or breaches.

Vast experience in the cyber security market, building services that reduce risk to customers and enable organisations to flourish

Our expert approach to cyber security is first to understand our customers’ current position, then collaborate with them to build policies and procedures to make security a business enabler. We help our customers ensure development of their organisation is achieved while making cyber security a central guiding principle for better business.

Our market-leading team of experts can consult and design bespoke security systems for every type of customer, covering both on premise and cloud landscapes. The breadth and depth of our combined expertise allows us to deliver a robust end-to-end service from project inception to network security installation through to completion. Our portfolio of partners and technologies, combined with our unrivalled knowledge of the ever-evolving Networking and Security market, ensures that your organisation will benefit from innovative solutions fit for both the challenges presented by today’s environment and scale to meet future demands

Security Solutions

Our specialists help organisations navigate the complex and fast-paced IT security market, offering a full roster of security solutions to help mitigate risk. We cover the traditional areas of Firewall, Email Security, Web Security, Security Information and Event Management, Data Leak Prevention, Cyber Threat Prevention, Identity Management, Authentication, End Point Security, as well as numerous other solutions.

Managed Security Services

Fully managed security services with 24/7 support, enabling customers to focus their IT department on managing core systems. We understand that our customers may not have the capacity or experience to manage new or existing security services. ES security services are fully managed and supported 24/7, so customers have total peace-of-mind and can focus their energies elsewhere.

Cyber Security Assessment

Information and cyber security is a strategic imperative for organisations of all sizes. Our security assessment and testing services help customers to understand:

  • how cyber secure they are
  • what vulnerabilities and risks exist in their current security posture
  • what steps they need to take to become more cyber resilient.

Privileged Access Management (PAM)

Centrify is redefining the legacy approach to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes a root of trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise.  For more information about Centrify, visit www.centrify.com.

Fortinet Managed Firewall Service

ES takes on the day-to-day management of your organisation’s FortiGate firewalls. Our 24/7, remote firewall service monitors your devices around-the-clock, provides updates, technical support with direct escalation to Fortinet as needed, applies security best practice, and reduces the overall burden on your in-house security team. The service includes:

SA-Based Operations Centre

ES provides 24/7 support from a South African based operations centre. Our expert engineers have high levels of certification, giving you access to top-tier technical resource. Our Service Level Agreements (SLAs) offer an industry-leading response and resolution time.

Unlimited firewall policy changes

Under a standard SLA you can request as many changes as your organisation needs, without any extra charge. This means you’ll have exactly what you need without worrying about expense.

Full device management

We monitor requested and required changes to ensure any action is managed to vendor best practice on your devices. We also take a proactive and pre-emptive approach to monitoring, enabling maximum uptime, as well as advising on the most suitable licensing schemes.

Hardware Replacement

We provide a managed end-to-end service to ensure that your problems are resolved efficiently. Our process kicks in when a problem is reported, and the team works to deliver a solution and bring you back online as quickly as possible. Our SLA offers an industry-leading hardware fix to ensure uptime is maximised.

 

Secure SD-WAN

As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers business application steering, cost savings, and performance for Software-as-a-Service (SaaS) applications, as well as unified communication services. However, SD-WAN has its own shortcomings—especially when it comes to security with direct internet access. Fortinet FortiGate Secure SD-WAN includes best-of-breed next-generation firewall (NGFW) security, SD-WAN, advanced routing, and WAN optimization capabilities, delivering a security-driven networking WAN edge transformation in a unified offering.

Reduce Complexity
Improved Application Experience
Cost Savings
Simple Management
Simplify WAN Edge services with one unified solution that delivers routing, security, WAN optimization, and SD-WAN consolidation services.
Simplify WAN Edge services with one unified Bolster cloud application performance by prioritizing business-critical applications and providing at the branch.solution that delivers routing, security, WAN optimization, and SD-WAN consolidation services.
Reduce operating expenses by migrating from MPLS and utilizing multi-broadband such as Ethernet. DSL, and LTE
Single-pane-of-glass management with zero-touch deployment for the entire WAN Edge simplifies deployment of SD-WAN and security.
Click here to understand what SD-WAN is and why it is critical to empowering today’s businesses.

Sepio

ES has recently been appointed as a Platinum Partner of Sepio Systems who have established a new cyber defence domain. HAC-1 is the only solution of its kind in the world today. Large South African Banking institutions are long standing satisfied clients among other global clients across all segments.

Rogue Devices (USB HID-emulating devices or Layer 1 Network Implants) for example allow cybercriminals to evade detection by operating under the radar of existing security controls such as XDR, DLP, NAC, EPS, IDS, or IoT network security.

By going deeper than any other security solution, HAC-1 uses Physical Layer information to calculate a digital fingerprint of all IT, OT, IoT and IIoT assets – managed or unmanaged – no device goes undetected.

HAC-1 accurately identifies devices and their associated risk posture based on multiple Physical Layer parameters and a unique machine learning algorithm to provide visibility like never before – traffic monitoring can only tell you so much. HAC-1’s ultimate visibility means unmanaged switches, passive taps and out-bound devices no longer fly under the radar.

The solution continuously monitors all hardware assets to account for any anomalies, issuing an alert when there are any changes to a device’s risk posture.

Please click on each of the below 2-minute videos below for more insight:

Get in touch.

 We understand the demands on IT departments to continually develop and deliver a security strategy that meets current and future needs in an ever-changing landscape.

FREE CYBER THREAT ASSESSMENT

CONTACT US