From first contact to continuous protection
A streamlined process designed for South African SMEs
Our Three-Step Approach
Simple, structured, and proven to work
Assess
Comprehensive evaluation of your security posture, systems, and compliance requirements. We identify gaps and create a prioritized remediation plan.
- Security audit
- Insurance compliance check
- Risk assessment
- Business impact analysis
Fix
Implementation of security controls and remediation of identified gaps. We handle the heavy lifting to get you compliant quickly.
- Policy creation
- System hardening
- Access controls
- Security implementation
Assure
Continuous monitoring, support, and optimization. We keep you secure and compliant with ongoing protection and updates.
- 24/7 monitoring
- Regular updates
- Threat detection
- Compliance maintenance
Your Onboarding Journey
Three weeks to a more secure business
Assessment & Planning
Initial consultation, security assessment, and remediation planning. We understand your business and create a tailored roadmap.
Implementation
Deployment of security controls, policy setup, and system configuration. Your team receives training and documentation.
Validation & Launch
Final testing, compliance verification, and monitoring activation. You're now protected with ongoing support.
Continuous Protection
24/7 monitoring, regular updates, quarterly reviews, and dedicated support to keep you secure.
Week-by-Week Breakdown
A detailed look at what happens during each phase of your onboarding
Assessment
Kick-off meeting
Initial meeting with your team to understand your business
Security audit
Comprehensive evaluation of your current security posture
Risk assessment
System inventory, risk scoring, and gap analysis
Compliance check
Insurance and regulatory compliance evaluation
Roadmap delivery
Prioritised remediation plan tailored to your business
Implementation
Policy creation
Security policies drafted, reviewed, and approved
System hardening
Configuration and hardening of your systems and devices
Access controls
Role-based access and identity management setup
Staff training
Security awareness sessions for your team
Monitoring setup
Platform deployment, tuning, and alert configuration
Validation
Compliance verification
Final checks against insurance and regulatory requirements
System testing
End-to-end testing and validation of all controls
Documentation
Finalised policies, procedures, and compliance evidence
Monitoring activation
24/7 monitoring goes live with real-time alerting
Handover & launch
Formal handover with ongoing support engagement
What You'll Have After Onboarding
Complete documentation, trained team, and continuous protection
Security Policies
Comprehensive written policies for password management, access control, incident response, and more
Trained Team
Your staff trained in security best practices and new tools and procedures
Compliance Documentation
Ready-to-share evidence of compliance for insurance applications and audits
Active Monitoring
24/7 security monitoring and threat detection protecting your systems
Incident Response Plan
Detailed procedures for responding to and recovering from security incidents
Ongoing Support
Dedicated support team ready to help with security questions and updates