SecurityHQ to enhance crucial security operations in southern Africa

SMART Cybersecurity Handbook 2022 Information Security


Feras Tappuni, CEO, SecurityHQ

SecurityHQ, the leading provider in Managed Security Services, has taken the decision to establish a presence in southern Africa and thereby offer the next level in cybersecurity to regional organisations.

Why southern Africa?

In the global context, southern Africa is considerably isolated and consequently it may be more attractive for cyber criminals to target organisations here. Lately, several serious attacks on both government and corporate industries with dire consequences have highlighted concern for the levels of vulnerability. The Covid-19 pandemic has been a major contributing factor to an unprecedented number of reported incidents.

In short, the critical infrastructure of many countries in this region could be at risk. By making services available, including managed detection and response (MDR), endpoint detection and response (EDR), firewall management, vulnerability management, penetration testing and many more, SecurityHQ plans to become the cybersecurity leader in this region, to support businesses and improve technologies currently in place.

“Whilst we have some great cybersecurity specialists in this region there is a skills shortage, due in part to the global demand for these sought-after resources and the accelerated growth rate of technology. We are truly stretched to comprehensively avert attacks, as evidenced by some of the recent high profile breaches. SecurityHQ’s managed security services provider (MSSP) model offers a world-class alternative as a service, with the most current technologies and over 260 security engineers to call upon,” explains Rob Griggs and John Taylor, from SecurityHQ based in Lonehill, Johannesburg.

How an MSSP will benefit business

In order to protect themselves from attacks, companies within the region must put in place the right security measures in order to safeguard their people, their data and their future business.

SecurityHQ’s Services are designed to rapidly identify and limit the impact of security incidents, via 24/7/365 threat monitoring, detection and targeted response.

Benefits of SecurityHQ’s MSSP:

• Using its MSSP delivers the necessary level of cybersecurity at a fraction of the cost that it would be for customers to build in-house SOCs themselves;

• Available 24/7 and run by expert engineers and analysts, from six SOCs around the world;

• Ensure that you are legally compliant, help mitigate threats and reduce costly disaster repairs if attacked.

• Have experts supporting your technology foundations, so that businesses can keep on growing, without the constant worry that security will cause its collapse.

“In the last 12 months, we have seen a tenfold increase in enquiries from the African continent, particularly from the financial services sector. The strange thing is that we always talk in geographical terms, but cyber has no boundaries. The same issues would affect a bank in Africa as it would in New York. SecurityHQ has made a commitment to expand its presence in the continent of Africa, to service such customers. As such, we will be increasing our local capabilities and staff count and people will see a rapid increase in developments going forward,” states Feras Tappuni, CEO, SecurityHQ.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.