EOH introduces managed Security-as-a-Service

July 2018 News & Events, Information Security, Security Services & Risk Management

In today’s digital cloud era, organisations are actively pursuing the agility they need to stay ahead of competitors, leveraging new technologies to drive digital transformation. However, this is resulting in a new set of challenges, most notably how to ensure the security of increasingly distributed networks and an ever-increasing number of applications and endpoints.

Through its Technology Solutions (TS) division, EOH has introduced a solution to modern security concerns through a managed Security-as-a-Service suite of offerings. Mitigating 90% of cybersecurity threats straightaway, EOH TS provides a new approach to cybersecurity that offers a more strategic, efficient and cost-effective approach to securing a business from end to end.

“Transforming IT from a reactive business division focused on service delivery, to one capable of fuelling business growth, rests on the ‘as-a-Service’ model. This on-demand approach has changed the way businesses operate, offering solutions that enable proactive innovation, and security should be no different,” says Stuart Trainer, business unit director for information security at EOH’s Technology Solutions division.

“Security should be as responsive as all other mission-critical functions. For many organisations, it has become an extremely complex machine made up of many moving parts, leaving security teams sinking under the volume of all of the boxes they have to tick. Our solution is simple and responsive, integrating vulnerability management into the broader security management framework.”

Delivered by certified security engineers to solve real business security problems and meet regulatory requirements with auditable processes, EOH’s managed Security-as-a-Service offering helps organisations reduce the attack surface to the smallest possible footprint. Enabling a proactive security posture by eliminating vulnerabilities before they can be exploited, this solution reduces the complexity and effort associated with vulnerability management.

Trainer adds that security should not be viewed in isolation, and that EOH has included Backup-as-a-Service and Disaster Recovery-as-a-Service in its offering. Providing high-speed, verified backup, disaster recovery and data loss avoidance, these services are available for any app, any data, and on any cloud.

“Our certified specialists deliver a managed Security-as-a-Service portfolio that moves the complex tasks of information and network security from being a capital expenditure to a manageable monthly expense, while ensuring that all compliance obligations are met. As technology continues to be redefined – and to redefine how businesses operate – security must be an integral part of all facilities and services. Our approach engineers solutions specific to the client environment, tailored to meet their challenges.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.