classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


New cybersecurity service launched
October 2011, Information Security, Security Services & Risk Management

Infoprotect aims to provide small- to medium-sized businesses with a comprehensive security service.

A newcomer to the cybersecurity market, Infoprotect, was launched to fill the gap in the mid-range cyber security market. The company’s goal is to be a service provider that fulfils all its client’s security needs, allowing the customer to do what it does best – focus on its core business.

Brad Fraser, director and founder of Infoprotect, says that most SMBs are aware of the need to secure their IT infrastructure, but cannot afford to have fulltime skills devoted to this task. Many are also of the opinion that as long as they have one of the branded antivirus packages installed, they will be fine as they are protected.

“While a necessity, the threat to business has grown far beyond the capabilities of your average antivirus package,” Fraser says. “Cyber security is not a one-size-fits-all solution; it is about securing all forms of data against unauthorised access, while also allowing easy, yet secure access to authorised users.

“In addition to the threats from viruses, Trojans and other forms of malware, business today also needs to be aware of the threat from within. Securing your end points, such as mobile devices and USB ports has become a crucial component of your business’s security posture.”

A recent IOL article highlighted that while traditional crime statistics were coming down, white-collar crime was increasing as a result of the tough economic situation in the country, and around the world. Business leaders therefore need to heed the warning and take precautions to protect their companies from fraud whether in the form of financial losses or the theft of intellectual property (IP).

Additionally, with new legislation in South Africa determining how data should be managed, many SMBs will find themselves inadvertently breaking the law if they do not implement the correct governance processes to protect customer information as well as securely delete information they are no longer entitled to keep.

Infoprotect’s goal is to include solutions to all these issues in its service and offer a full cyber-security service to customers, both onsite and via hosted services, helping them define their security posture, identify areas of vulnerability, resolve those issues and leave the client secure and empowered to focus on their business.

The company does not sell a product, but builds solutions and services around each client’s requirements. One of the security brands it has standardised on is the Symantec security suite, as it leads the Gartner security magic quadrant and is a world leader in the field of data protection, securing information while ensuring it is available to those who need it.

The areas in which Infoprotect will operate include:

Data security and protection solutions:

* Endpoint protection.

* E-mail protection.

* Offsite backup/archiving and recovery, and

* Encryption.

It will also offer value-added services including:

* Auditing.

* Monitoring and reporting.

* Implementation and configuration.

Fraser says Infoprotect already has the in-house consulting and technical skills, as well as data centre facilities (through Computer Storage Services) to meet its clients’ requirements. The company is focused on developing long-term relationships by allowing clients to get on with their businesses without worrying about their data security.

For more information contact Infoprotect, +27 (0)82 321 3690, brad@infoprotect.co.za, www.infoprotect.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The increasing pace of technology advancement
    June 2015, News, Information Security
    The trouble with thinking about technology advancements is that the rate of past progress does not predict the rate of future progress.
  • Huawei holds Safe City Africa Summit in Cape Town
    June 2015, IT infrastructure in security, Enterprise Solutions, Security Services & Risk Management, Remote Monitoring
    Huawei held its Safe City Africa Summit in Cape Town in April as a platform for more than 400 industry members to share insights, development trends and global success stories on public safety in cities.
  • BMW SA develops intelligent Risk Control Centre
    June 2015, Security Services & Risk Management
    The BMW plant in Rosslyn is responsible for building the luxurious BMW 3-Series sedans for sale in South Africa and abroad. The security division of BMW SA is responsible for ensuring the security of the property as well as its associates.
  • Layered approach to prevent watering hole attacks
    June 2015, Information Security
    A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks.
  • Mobile content security and enterprise collaboration boosted
    June 2015, Enterprise Solutions, Information Security
    BlackBerry announced that it has entered into a definitive agreement to acquire WatchDox to further enhance its mobile security and give enterprises control over their files even after data leaves the corporate network.
  • Driving PSIM through true SOA
    June 2015, CCTV, Surveillance, Information Security
    In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time.
  • Is VUCA the end of strategy and leadership?
    May 2015, Security Services & Risk Management
    In the current era of volatility, unpredictability, complexity and ambiguity, managers need to adapt the way to navigate.
  • RFID expands its security credentials
    May 2015, Asset Management, EAS, RFID, News, Enterprise Solutions, Security Services & Risk Management
    Many people believe RFID is a limited technology with its best days behind it. Swift is a South African company that has developed a host of innovative solutions integrating RFID, specifically Active RFID and sensor technologies.
  • How eavesdropping resistant is your organisation?
    May 2015, Security Services & Risk Management
    South African businesses must accept that as they attempt to be more competitive in the global markets, that their products, processes, information and trade secrets may come under threat from competitors.
  • Stopping the leak
    May 2015, Information Security
    The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.
  • Cyber risks severely underrated
    May 2015, Information Security, Enterprise Solutions
    South Africa is the fifth most targeted country in the world in terms of cybercrime attacks, while informal consensus within the private sector places SA third behind Russia and China.
  • Detection and response
    May 2015, Information Security
    Recent large-scale attacks move focus from blocking and detecting attacks, to detecting and responding to attacks. Gartner says by 2018, 40% of large organisations will have formal plans to address aggressive cyber-security business disruption attacks.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.