Ongoing cybersecurity with a click

Issue 2 2022 Editor's Choice, Information Security, Security Services & Risk Management

Cybersecurity is top of mind today with news of ransomware, hacks, data theft and more constantly popping up on almost every media site. The need to cybersecure one’s organisation and personal IT systems is therefore obvious, but there are many products and services available, making it hard for non-experts to make good cyber decisions.

Magix has launched an online service to take much of the effort out of cybersecurity assessments and management with Pretect, an online service. It is designed as a subscription-based web app, with different services available depending on the user’s requirements, Pretect provides ongoing, automated assessments of your cybersecurity posture, supported by solutions from the top brands in the market as well as a team of experts available to assist customers 24 x 7. In addition, Pretect provides incident detection and response for your most vulnerable channels such as email and file systems.

“Pretect is a collection of services available from one dashboard that makes it easy to set up and monitor your IT infrastructure automatically in the background, whether you are an enterprise or a small business,” explains Hedley Hurwitz, MD of Magix. “We have made the decision-making process simpler, the availability of expert advice only a click away and we have lowered the costs for ongoing assessments while making use of the most respected solutions available today seamlessly integrated into the service.”

Prior to launching publicly, Pretect provided its service to a few companies to ensure the system delivered. The results have shown that it delivers as promised with companies such as Nashua, Clientele and Grindrod Bank using the system. It currently monitors over 1 million IP addresses daily. A limited free trial is also available for those interested in testing the applicability of the service to their companies.

Services available

Pretect is launching with six basic services available, depending on the plan selected.

Vulnerability assessments: These general vulnerability tests will determine how many vulnerabilities your company’s network and internal/external infrastructure may have, how severe they are and what steps can be followed to remediate them – by applying patches etc.

Penetration tests: Run by ethical hackers from Magix, these exercises try to enter your IT systems undetected and launch a contained exploit (i.e., doing no harm except proving that someone could hack into your systems).

Web and mobile application assessment: As almost all software moves to the cloud and web-based access, this service tests the applications your company uses or builds, to see what vulnerabilities they contain, how severe they are and what steps can be followed to close the gaps.

Managed detection and response: This service monitors your systems and data is automatically analysed by the latest software and can also be passed onto Magix experts for further analysis. All threats, incidents and activities are documented to ensure accurate monitoring and remediation.

Firewall assessment: Often companies think that installing a firewall is enough to protect them. This service tests the company’s firewall/s to determine if it is configured correctly for optimal protection.

Security awareness campaigns: Humans are the weakest link in cybersecurity and this service conducts security awareness testing on the organisations’ employees, scores the organisation’s overall cybersecurity awareness and provides individualised training to those who need it.

Instead of running cybersecurity assessments once per year, or as is often the case, after an incident has caused havoc in a company, Pretect services run regularly and provide a real-time dashboard giving you insights into your security posture, with the ability to drill down into specific areas. And as noted above, experienced cybersecurity experts are available 24 x 7 to assist customers.

For more information, go to


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

From the editor's desk: Securing your secure access
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2024. In this issue, we cover various issues relevant to this industry, from digital to ...

Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

International access manufacturer sets up shop in SA
Technews Publishing Access Control & Identity Management News & Events Products & Solutions
The South African security market can always use some good news, and this year, STid has obliged by formally entering the South African market, setting up its main office in the Boomgate Experience Centre in Roodepoort, Johannesburg.

What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

AI-driven identity verification for access control
C3 Shared Services Editor's Choice
Facial authentication solutions combine advanced AI and 3D sensing technologies with ease of use to create a frictionless, touchless experience. The deployment of this technology in an access control system keeps users and administration moving.

Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Cloud-based access control systems
Technews Publishing Salto Systems Africa Access Control & Identity Management
Cloud-based access control systems are finding greater acceptance in international organisations than in SA; SMART Security Solutions asked SALTO Systems for its take on the benefits of cloud.

Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.