classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


New cybersecurity service launched
October 2011, Cyber Security, Security Services & Risk Management

Infoprotect aims to provide small- to medium-sized businesses with a comprehensive security service.

A newcomer to the cybersecurity market, Infoprotect, was launched to fill the gap in the mid-range cyber security market. The company’s goal is to be a service provider that fulfils all its client’s security needs, allowing the customer to do what it does best – focus on its core business.

Brad Fraser, director and founder of Infoprotect, says that most SMBs are aware of the need to secure their IT infrastructure, but cannot afford to have fulltime skills devoted to this task. Many are also of the opinion that as long as they have one of the branded antivirus packages installed, they will be fine as they are protected.

“While a necessity, the threat to business has grown far beyond the capabilities of your average antivirus package,” Fraser says. “Cyber security is not a one-size-fits-all solution; it is about securing all forms of data against unauthorised access, while also allowing easy, yet secure access to authorised users.

“In addition to the threats from viruses, Trojans and other forms of malware, business today also needs to be aware of the threat from within. Securing your end points, such as mobile devices and USB ports has become a crucial component of your business’s security posture.”

A recent IOL article highlighted that while traditional crime statistics were coming down, white-collar crime was increasing as a result of the tough economic situation in the country, and around the world. Business leaders therefore need to heed the warning and take precautions to protect their companies from fraud whether in the form of financial losses or the theft of intellectual property (IP).

Additionally, with new legislation in South Africa determining how data should be managed, many SMBs will find themselves inadvertently breaking the law if they do not implement the correct governance processes to protect customer information as well as securely delete information they are no longer entitled to keep.

Infoprotect’s goal is to include solutions to all these issues in its service and offer a full cyber-security service to customers, both onsite and via hosted services, helping them define their security posture, identify areas of vulnerability, resolve those issues and leave the client secure and empowered to focus on their business.

The company does not sell a product, but builds solutions and services around each client’s requirements. One of the security brands it has standardised on is the Symantec security suite, as it leads the Gartner security magic quadrant and is a world leader in the field of data protection, securing information while ensuring it is available to those who need it.

The areas in which Infoprotect will operate include:

Data security and protection solutions:

* Endpoint protection.

* E-mail protection.

* Offsite backup/archiving and recovery, and

* Encryption.

It will also offer value-added services including:

* Auditing.

* Monitoring and reporting.

* Implementation and configuration.

Fraser says Infoprotect already has the in-house consulting and technical skills, as well as data centre facilities (through Computer Storage Services) to meet its clients’ requirements. The company is focused on developing long-term relationships by allowing clients to get on with their businesses without worrying about their data security.

For more information contact Infoprotect, +27 (0)82 321 3690, brad@infoprotect.co.za, www.infoprotect.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Access control remains a priority
    January 2016, Hi-Tech Security Solutions, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management, Education (Industry)
    Hi-Tech Security Solutions examines the security needs for the tertiary education market in South Africa.
  • IoT, game-changing, but risky
    January 2016, Access Control & Identity Management, Cyber Security
    The Internet of Things (IoT) is making its way into the surveillance industry, bringing with it security benefits and unforeseen risks.
  • Hyper-convergence and security
    January 2016, Cyber Security, IT infrastructure in security
    Hyper-convergence is taking the security industry by storm as it provides integrators and installers with more computing resources at a lower cost, that are also easier to manage.
  • Security predictions for 2016
    January 2016, This Week's Editor's Pick, Cyber Security
    Doros Hadjizenonos, country manager of Check Point South Africa, gives his security predictions for the coming year. But by anticipating the next wave of threats, businesses can stay on top of the evolving tactics and exploits that criminals will use.
  • New entry-level security standards
    January 2016, This Week's Editor's Pick, Security Services & Risk Management, Associations
    New global campaign aims to increase TAPA-certified facilities and trucking operations to tackle rising cargo crime.
  • AIMSS eGuard incorporates LoRa
    January 2016, Betatrac Telematic Solutions, Products, Asset Management, EAS, RFID, Security Services & Risk Management
    The AIMSS platform has now been further enhanced by the addition of LoRa technology into the eGuard guarding solution.
  • Employee verification
    January 2016, iFacts, Products, Security Services & Risk Management
    The consequences of public and private sector fraud and corruption include: financial loss, a deep level of mistrust from South African citizens, a decrease in global investment opportunities and long-term reputational damage.
  • Protecting the Wiegand protocol from attack
    November 2015, Access Control & Identity Management, Cyber Security
    In these attacks, a credential’s identifier is cloned, or captured, and is then retransmitted via a small electronic device to grant unauthorised access to an office or other facility.
  • Start with risk, not technology
    November 2015, Access Control & Identity Management, Security Services & Risk Management
    This article looks to avoid the usual technological rhetoric approach and provide end users with a list of performance-based requirements that will leave the responsibility of providing the correct access solution with the system provider.
  • Leveraging ERP investment with WFM
    November 2015, AWM360 Data Systems, Access Control & Identity Management, Cyber Security
    Many companies have an enterprise resource planning (ERP) system in place but fail to leverage its potential for saving them manpower costs and boosting produc­tivity.
  • The new security perimeter
    November 2015, Access Control & Identity Management, Cyber Security
    CA Southern Africa’s Security B.U. manager, Michael Horn, expands on the new security perimeter and how ID and access management ensure the business environment is protected against outside intruders.
  • Electronic signatures in the digital economy
    November 2015, Access Control & Identity Management, Security Services & Risk Management
    Traditional methods of signing documents are also costly, environmentally unfriendly, and expose the organisation to the risks of fraud and identity theft.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.