Controlled penetration testing. Executive-ready reports. Actionable remediation that actually works.
Manual, expert-led security testing that goes far beyond automated scanners. Every engagement is scoped precisely, executed methodically, and delivered with clarity. Click any service to open a full deep-dive.
We think like attackers, operate like operators, and report like executives.
Our penetration tests simulate real adversary techniques across web applications, internal networks, external perimeters, cloud infrastructure, and APIs. We don't run a scanner and call it a pentest — every finding is manually validated, chained, and contextualised for your business. You get proof of impact, not just a list of CVEs.
An attacker identifies a forgotten dev subdomain with a debug endpoint enabled. They use it to enumerate internal API routes, find a JWT with a static secret, forge admin tokens, and exfiltrate 40,000 patient records — all within 72 hours of initial access. This subdomain existed for 11 months before anyone noticed. We find these.
Executive Summary Report
Board-ready: risk posture, key findings, business impact
Full Technical Report
Every finding: proof-of-concept, CVSS, exploitability, fix instructions
Developer Remediation Guide
Step-by-step fix instructions, code-level examples where applicable
Live Debrief Session
Expert walkthrough of every critical finding with your team
Full Retest Included
We verify every fix is genuine — not just patched on paper
A systematic, broad scan of your entire attack surface — every weakness catalogued and ranked.
Unlike a pentest, a vulnerability assessment is about breadth over depth — mapping every security weakness across your networks, servers, applications, and cloud services. Prioritised by real-world exploitability (not just CVSS), this is the foundation of a strong security programme and a prerequisite for most compliance frameworks.
A critical unpatched vulnerability in a legacy VPN appliance sits undetected for 9 months. Automated threat actors exploit it to gain initial access, establish persistence, and quietly harvest credentials before triggering ransomware. A quarterly VA catches this before the window opens — estimated damage avoided: R12M+.
Comprehensive Scan Report
Full inventory of all identified vulnerabilities
Risk-Ranked Vulnerability List
CVSS scores with real-world business context applied
Expert Remediation Guidance
Prioritised next steps for every critical and high finding
Tailored for dental practices, clinics, and medical SMEs protecting patient data.
Healthcare is the #1 most targeted industry for cyber attacks. Patient data is worth 25x more than financial data on the dark web — and the regulatory consequences of a breach are severe. We understand HIPAA, POPIA, and the specific threat landscape facing medical practices, telehealth platforms, EHR systems, and dental software.
A single phishing email compromises a receptionist account at a dental practice. The attacker pivots to the imaging server — which was on the same flat network — encrypts all patient X-rays, and demands a R500K ransom. Backups were on a network share accessible from the compromised account. Practice is down for 3 weeks. Total cost: R1.8M. We prevent this.
HIPAA/POPIA Gap Analysis
Control mapping, gaps identified, penalties quantified
Compliance Roadmap
Prioritised remediation plan with estimated effort and cost
Patient Data Protection Plan
Specific guidance for PHI security, backups, and access control
Know exactly where you stand against ISO 27001, POPIA, GDPR, HIPAA, and NIST.
We map your current security controls against target frameworks, identify every gap, and produce a structured roadmap to close them. Our audits aren't just checkbox exercises — we translate compliance requirements into practical, implementable controls that actually reduce your risk posture.
A South African SME processes customer financial data without a documented information officer, no data breach notification policy, and retention periods exceeding POPIA guidelines. Following a routine data leak, the Information Regulator opens an investigation. Potential fine: R10M. A POPIA audit 6 months earlier would have cost under R20K and prevented this entirely.
Framework Gap Analysis
Control-by-control mapping against your target standard
Compliance Roadmap
Phased remediation plan with realistic timelines and ownership
Policy Templates
Draft policies for the gaps identified in your audit
When it's happening right now — or after the smoke clears — we help you take back control.
Whether you've detected a breach, suspect an intrusion, or are recovering from ransomware — we provide forensic investigation, containment guidance, and hardening that prevents recurrence. We're also available for proactive IR planning before incidents occur, helping you build playbooks and response capabilities that mean you're never starting from zero.
A law firm discovers ransomware at 2am. With no IR plan, they spend 6 hours deciding who to call and what to shut down — during which the attacker exfiltrates an additional 20GB of client files. The unstructured response extends downtime from 3 days to 3 weeks. Organisations with tested IR plans contain breaches 74% faster and spend 58% less on recovery.
Forensic Investigation Report
Timeline of attack, root cause, evidence documentation
Containment & Eradication Plan
Clear actions to remove the threat and prevent re-entry
IR Playbooks (proactive)
Scenario-specific response procedures for your team
Three live tools that show you exactly what attackers already see — before you spend a rand on anything.
12 critical security controls. 90 seconds. Instant executive-grade breach exposure score across identity, backup, endpoint, and detection domains. See where you're most exposed right now.
START ASSESSMENTEnter your domain. We run live DNS lookups, certificate transparency scans, Shodan port data, and RDAP WHOIS — and generate the exact intelligence file an attacker compiles before targeting you.
COMPILE MY DOSSIERSelect your industry and company size. Watch the financial damage tick up in real time — modelled on IBM Cost of Data Breach 2024 data. Puts R89M in visceral, ticking perspective.
START THE CLOCKA proven 4-phase process built around how real attackers operate. No spray-and-pray. No bloated CVE lists. Just clear, actionable intelligence that leads to genuine risk reduction.
We map your full attack surface and build a threat model before touching a single system. Passive OSINT, DNS enumeration, certificate transparency, Shodan — the same starting point a real attacker uses. You approve scope. We begin.
Ethical, targeted testing simulating real adversary behaviour. No automated spray-and-pray. Every attack vector is manually tested, chained, and validated by a human expert. We find what scanners miss — including logic flaws, misconfigurations, and business-layer vulnerabilities.
Clear risk ratings, compliance impact, and business context — not just a CVE list. Every finding includes CVSS score, real-world exploitability rating, proof-of-concept evidence, and remediation instructions your developers can implement without a translator.
We guide the fix, then verify it. Retesting is included in every engagement to confirm every vulnerability is genuinely closed — not just patched on paper. You receive a final certification report suitable for auditors, clients, and insurers. Close the loop, not just the ticket.
Sector-specific threat knowledge. We know the regulations, the common attack paths, and the specific systems used in your industry — not generic security advice.
HIPAA-focused assessments for patient data, imaging systems, and practice management software.
Clinics, telehealth platforms, and EHR system security against the #1 targeted sector.
Client confidentiality, privileged communications, and ransomware resilience for law firms.
SaaS platforms, fintech, and API-driven products secured pre- and post-launch for investor readiness.
PCI DSS compliance, fraud prevention, and transaction security for financial operators.
OT/IT convergence, SCADA security, and supply chain risk in connected industrial environments.
Public sector compliance, critical infrastructure protection, and citizen data security.
Consulting, accounting, and advisory firms handling sensitive client and commercial data.
Real engagements. Real outcomes. Names and identifying details anonymised under NDA.
A 12-location dental group came to us after a failed compliance audit. We discovered unpatched dental imaging software with 3 critical CVEs, PHI exposed in misconfigured cloud storage accessible without authentication, and missing MFA on every admin account across all locations. Estimated regulatory fine exposure: R4.2M.
Our remediation roadmap was prioritised by risk and implemented in phases over 6 weeks. We guided the patching cycle, locked down storage permissions, and designed a new access control architecture before retest verification.
A startup building a patient portal hired us one month before their planned launch. We found SQL injection in the appointment booking API allowing full database read access, weak session management enabling session fixation attacks against active patients, and an exposed admin panel indexed by Google.
We provided developer-level remediation instructions for each finding. Working alongside their engineering team, all critical and high findings were resolved within 18 days. Launch proceeded on schedule with full sign-off.
We simulated a full ransomware attack chain against their environment. Achieved domain admin in 4 hours via Kerberoasting due to weak service account passwords and a flat, unsegmented network. Backup systems were reachable from any compromised workstation — they would have been encrypted simultaneously with production data.
We designed a segmented network architecture, implemented offline backup rotation, enforced service account password policies, and ran a tabletop IR exercise with partners and senior associates. A full retest 60 days later confirmed all attack paths were closed.
No surprise invoices. No scope creep fees. Every engagement includes a full retest and certification report.
All pricing in South African Rand (ZAR). Custom enterprise scoping available — contact us. View full pricing details →
Confidential consultation. No commitment. We'll tell you exactly what we'd test and what we'd expect to find — before you spend a rand.
> threat.level=UNKNOWN → schedule.consultation() → threat.level=MANAGED
We respond within 24 hours · All inquiries strictly confidential · Under NDA from first contact