Ongoing cybersecurity with a click

Issue 2 2022 Editor's Choice, Information Security, Security Services & Risk Management

Cybersecurity is top of mind today with news of ransomware, hacks, data theft and more constantly popping up on almost every media site. The need to cybersecure one’s organisation and personal IT systems is therefore obvious, but there are many products and services available, making it hard for non-experts to make good cyber decisions.

Magix has launched an online service to take much of the effort out of cybersecurity assessments and management with Pretect, an online service. It is designed as a subscription-based web app, with different services available depending on the user’s requirements, Pretect provides ongoing, automated assessments of your cybersecurity posture, supported by solutions from the top brands in the market as well as a team of experts available to assist customers 24 x 7. In addition, Pretect provides incident detection and response for your most vulnerable channels such as email and file systems.

“Pretect is a collection of services available from one dashboard that makes it easy to set up and monitor your IT infrastructure automatically in the background, whether you are an enterprise or a small business,” explains Hedley Hurwitz, MD of Magix. “We have made the decision-making process simpler, the availability of expert advice only a click away and we have lowered the costs for ongoing assessments while making use of the most respected solutions available today seamlessly integrated into the service.”

Prior to launching publicly, Pretect provided its service to a few companies to ensure the system delivered. The results have shown that it delivers as promised with companies such as Nashua, Clientele and Grindrod Bank using the system. It currently monitors over 1 million IP addresses daily. A limited free trial is also available for those interested in testing the applicability of the service to their companies.

Services available

Pretect is launching with six basic services available, depending on the plan selected.

Vulnerability assessments: These general vulnerability tests will determine how many vulnerabilities your company’s network and internal/external infrastructure may have, how severe they are and what steps can be followed to remediate them – by applying patches etc.

Penetration tests: Run by ethical hackers from Magix, these exercises try to enter your IT systems undetected and launch a contained exploit (i.e., doing no harm except proving that someone could hack into your systems).

Web and mobile application assessment: As almost all software moves to the cloud and web-based access, this service tests the applications your company uses or builds, to see what vulnerabilities they contain, how severe they are and what steps can be followed to close the gaps.

Managed detection and response: This service monitors your systems and data is automatically analysed by the latest software and can also be passed onto Magix experts for further analysis. All threats, incidents and activities are documented to ensure accurate monitoring and remediation.

Firewall assessment: Often companies think that installing a firewall is enough to protect them. This service tests the company’s firewall/s to determine if it is configured correctly for optimal protection.

Security awareness campaigns: Humans are the weakest link in cybersecurity and this service conducts security awareness testing on the organisations’ employees, scores the organisation’s overall cybersecurity awareness and provides individualised training to those who need it.

Instead of running cybersecurity assessments once per year, or as is often the case, after an incident has caused havoc in a company, Pretect services run regularly and provide a real-time dashboard giving you insights into your security posture, with the ability to drill down into specific areas. And as noted above, experienced cybersecurity experts are available 24 x 7 to assist customers.

For more information, go to www.pretect24x7.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...