Local cyber is global

Issue 4 2021 Information Security

Performanta is a cybersecurity company launched in South Africa in 2010. The company was initially focused on technology sales in the cybersecurity market – specifically data leak prevention (DLP), before moving into the managed services space where it is now operational in countries across the globe, employing around 150 people.

Co-founder, Attie Booyens, says that while the company has expanded its reach beyond South Africa’s shores, to the extent of receiving a 'significant investment' from the UK’s Beech Tree Private Equity firm and retaining many large international clients, it still retains its skills base and many customers within the country.

Martin Springer, Performanta’s COO adds that the company realised that technology is not the solution to the ever-increasing cyber threats the world faces. For this reason, the company today takes a more consultative approach to understanding the people, process and technology risks clients face. In this way it covers the full cybersecurity spectrum through a managed services approach. These cloud-based services allow the business to deal with issues anywhere in the world in real-time.

Understanding the risks and how cybercriminals implement their attacks allows the company to prepare customers for a proactive security posture against these threats. It also operates two security operations centres (SOCs) where its personnel manage their clients’ infrastructures in real-time, 24 x 7, making use of the latest technology available on the market as well as its own software designed specifically to integrate and collate data and provide real-time insights.

Key to the SOCs are the various integrations the company has developed into a host of cybersecurity products and solutions, which allows it to monitor and manage customers’ security from a central, integrated point. And while its goal is to understand clients’ risks and prepare them through its consulting services, while ensuring they are able to withstand the numerous threats companies are faced with via its SOCs and technical integrations, it also runs an incident response team which is geared to react to emergencies and get its clients up and running as quickly as possible.

Naturally, cybersecurity today includes areas that were traditionally separate departments, such as governance and compliance, and the company’s consulting incorporates these in its drive to deliver a complete service. And this does not all have to be done by people.

Booyens says that while the company is developing a solution that integrates all the security information software and hardware provided into a single dashboard, it is also focused on automation. While people will always be necessary in this complex industry, automating many of the background processes and procedures will speed up the process and leave people free to focus on more important tasks. “Skilled people are still the fine art of cybersecurity,” notes Springer.

The story of Performanta is that of a group of highly skilled individuals in South Africa that have taken their skills and capitalised on them to grow an international company with offices in South Africa, Europe, Australia and the USA. Moreover, given the critical need for cybersecurity globally, the company’s integrated, cloud-based dashboard delivers intelligence that goes beyond products and brands, offering real-time protection to clients that runs unseen until it is needed which will find it a receptive market well into the future. (Hi-Tech Security Solutions will follow up with an overview of the company’s latest product in the next issue.)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.