classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


New cybersecurity service launched
October 2011, Cyber Security, Security Services & Risk Management

Infoprotect aims to provide small- to medium-sized businesses with a comprehensive security service.

A newcomer to the cybersecurity market, Infoprotect, was launched to fill the gap in the mid-range cyber security market. The company’s goal is to be a service provider that fulfils all its client’s security needs, allowing the customer to do what it does best – focus on its core business.

Brad Fraser, director and founder of Infoprotect, says that most SMBs are aware of the need to secure their IT infrastructure, but cannot afford to have fulltime skills devoted to this task. Many are also of the opinion that as long as they have one of the branded antivirus packages installed, they will be fine as they are protected.

“While a necessity, the threat to business has grown far beyond the capabilities of your average antivirus package,” Fraser says. “Cyber security is not a one-size-fits-all solution; it is about securing all forms of data against unauthorised access, while also allowing easy, yet secure access to authorised users.

“In addition to the threats from viruses, Trojans and other forms of malware, business today also needs to be aware of the threat from within. Securing your end points, such as mobile devices and USB ports has become a crucial component of your business’s security posture.”

A recent IOL article highlighted that while traditional crime statistics were coming down, white-collar crime was increasing as a result of the tough economic situation in the country, and around the world. Business leaders therefore need to heed the warning and take precautions to protect their companies from fraud whether in the form of financial losses or the theft of intellectual property (IP).

Additionally, with new legislation in South Africa determining how data should be managed, many SMBs will find themselves inadvertently breaking the law if they do not implement the correct governance processes to protect customer information as well as securely delete information they are no longer entitled to keep.

Infoprotect’s goal is to include solutions to all these issues in its service and offer a full cyber-security service to customers, both onsite and via hosted services, helping them define their security posture, identify areas of vulnerability, resolve those issues and leave the client secure and empowered to focus on their business.

The company does not sell a product, but builds solutions and services around each client’s requirements. One of the security brands it has standardised on is the Symantec security suite, as it leads the Gartner security magic quadrant and is a world leader in the field of data protection, securing information while ensuring it is available to those who need it.

The areas in which Infoprotect will operate include:

Data security and protection solutions:

* Endpoint protection.

* E-mail protection.

* Offsite backup/archiving and recovery, and

* Encryption.

It will also offer value-added services including:

* Auditing.

* Monitoring and reporting.

* Implementation and configuration.

Fraser says Infoprotect already has the in-house consulting and technical skills, as well as data centre facilities (through Computer Storage Services) to meet its clients’ requirements. The company is focused on developing long-term relationships by allowing clients to get on with their businesses without worrying about their data security.

For more information contact Infoprotect, +27 (0)82 321 3690, brad@infoprotect.co.za, www.infoprotect.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • SLA considerations
    May 2016, Camsecure, CCTV, Surveillance & Remote Monitoring, News, Integrated Solutions, Security Services & Risk Management, This Week's Editor's Pick
    A maintenance plan, governed by an effective, well-planned service-level agreement is critical to the success of a surveillance project.
  • Securing your security systems
    May 2016, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Today’s cyber criminals are easily able to exploit unprotected surveillance cameras and other hardware to break into an organisation’s network.
  • City surveillance: 20 years later
    May 2016, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure in security, Security Services & Risk Management, This Week's Editor's Pick
    Twenty years down the line and having completed many city surveillance systems and expansions thereof, we find ourselves questioning the technical, operational, legal and maintenance methodologies followed in southern Africa.
  • Video management integral to building management
    May 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Security Services & Risk Management
    The Smart Buildings concept is becoming a reality, which creates an opportunity for video management systems to become visual building intelligence hubs.
  • Weighing up the benefits of offsite monitoring
    May 2016, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Remote versus onsite surveillance monitoring? How do you decide which is best for your company?
  • Is your CCTV system secure from cyber attack?
    May 2016, CCTV, Surveillance & Remote Monitoring, Cyber Security, This Week's Editor's Pick
    Visual surveillance is more integral to society than ever before, helping organisations to safeguard their most valuable assets. However, the DVR systems traditionally employed in CCTV networks can make those very organisations vulnerable.
  • Beating the economic cutbacks
    May 2016, Security Services & Risk Management
    Off balance sheet finance for businesses in South Africa looking for alternative routes of financing their investments.
  • A multi-pronged approach to security
    May 2016, This Week's Editor's Pick, Security Services & Risk Management, Mining (Industry)
    More mines are beginning to see security as an investment rather than simply a cost centre.
  • Cutting building management costs
    May 2016, Security Services & Risk Management
    Effective well-utilised building management systems (BMS) provide the core management tool required by facilities’ security, asset and SHE managers.
  • Substance abuse is a security issue
    May 2016, ALCO-Safe, Mining (Industry), Security Services & Risk Management
    Employees entering the mining workplace while under the influence of alcohol or drugs not only pose a health and safety risk, they are typically less productive than their sober colleagues.
  • Cyber threats faced by the financial sector
    May 2016, This Week's Editor's Pick, Cyber Security
    MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.
  • Hook, line and sinker
    May 2016, Galix Networking, This Week's Editor's Pick, Cyber Security
    If whaling is the new phishing, here’s how to protect your organisation’s big phish.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.