Voice & Collaboration
With flexibility comes great responsibility. Let us help you work remotely with guaranteed security using our cloud protection services
The cloud is many things: agile, scalable, and a tool to drive efficiency. However, without it being secure, you won’t be able to use it to its full potential. While implementing basic cloud solutions is easy, not many managed service providers give you the means to protect your organisation against cyberattacks, phishing, malware, data corruption, and more.
But here at Liquid C2, your protection is our number one priority. When running an enterprise, you need to have complete trust that your data is in good hands; it cannot be accessed by unauthorised personnel and has a backup. And, this is where Liquid C2 comes in.
Our team of IT specialists brings several decades of cumulative experience to the table. This enables us to provide you with the most robust cloud protection tools offered in all of Africa. That’s why you will not face cybersecurity-related issues and still have your employees work remotely from anywhere, at any time, using any device so that innovation never has to stop.
True commitment means not having to worry about things that might go wrong. Ensure that’s the case for your staff with our protection tools to safeguard your networks and information. All our cybersecurity solutions are user-friendly, easy to adopt, and seamlessly merged with your other Microsoft applications, so let’s get started ASAP.
Consists of technical and non-technical advisory services by highly certified and experienced consultants
A wide range of security product solutions from long time and well-known vendors
The tiers of assistance with day-to-day security operations
Cost effective SOC-as-a-Platform (SOCaaP) services and Enterprise SOC services
The first of the two pillars are helping our customers to establish all that is needed to establish an Information Security Management System (ISMS) that is appropriate and aligned to their business and information technology strategy and objectives. In doing so we ensure that all information security aspects needed are addressed as is required. The aspects covered in our approach are information security governance, risk, compliance, people, process, and technology. All these aspects are continuously reviewed and improved as customer environments evolve and is exposed to ever increasing threats.
The second of the two pillars are to assist our customers with the selection, implementation and management of the appropriate security controls needed to enable the objectives of the ISMS; and is referred to as a Cyber Security Resilience Framework. The Cyber Security Resilience Framework encompass security controls to enable the identification, protection, detection, response and recovery, testing, situational awareness as well as learning and evolving needed for end-to-end resilience.
LIT has been delivering Cyber Security services to customers for over a decade, but the difference in what we offer is that we have now established an experienced and highly skilled Cyber Security competency that focuses only on Cyber Security, with some of the leading expertise in South Africa appointed over the last six months in 2021.
This is underlined by some with more than twenty-five years’ experience in leading positions in Cyber Security, as well as a long list of industry-leading certifications including but not limited to CISSP, CISA, CRISC, CISM, CEH, OSCP, OSWP, ISO/IEC 27001 Lead Auditor, CIPM, ISO/IEC 27005 Risk Manager.
Our Security Consulting Services (SCS) consist of technical and non-technical advisory services that are executed by highly certified and experienced consultants.
The technical consulting services team do manual penetration testing of external network perimeter services, public-facing web applications, wireless and internal networks, as well as automated pen-testing, breach and attack (BAS) simulations, red and blue team exercises; and further technical assessments such as firewall and rule reviews, configuration baseline checks, investigations and analysis and more.
The non-technical consulting services team assist and deliver security strategies, roadmaps, architectures and more. They are also doing a variety of best practice assessments and assist with the implementation thereof, e.g. ISO 27001, NIST Cybersecurity Framework (CSF), IOSCO Cybersecurity Guideline, and the SWIFT Customer Security Program (CSP). The team also assist with Data Privacy assessments, policy and processes, and the implementations thereof.
LIT provides a wide range of security product solutions from long time and well-known vendors such as Microsoft, Cisco, Fortinet, Netskope, Trend and more; as well as evolving and disrupting vendor solutions from vendors such as Ridge Security, Comodo, Bullwall, QS Solutions, Cyber Risk Aware, and CyRiskco. These vendor product solutions are sold to our customers or used by us to enable our managed security or consulting services.
Our security product portfolio provides for network, endpoint and mobile, server, data, cloud, Internet of Things (IOT) and Operational Technology (OT), as well as supporting security infrastructures such as Security Incident and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solutions and services.
Our Professional Security Services (PSS) team is highly skilled and experienced to deploy, configure, optimise, and test the latest on offer from these vendors. Examples here are where some of our specialists did a micro network segmentation and zero trust project based on the latest from Cisco’s security portfolio, complex Unified Threat Management (UTM) migrations from one vendor to another, and more. Our PSS team are also assisting those customers who are simply not able to implement and configure their solutions themselves and requires expert assistance to maximise their security control investments.
Unified Threat Management provides an all-in-one coverage for common security needs.
The only behaviour-driven security awareness platform that delivers training in real time.
Enabling organisations to outsource threat detection and incident response.
Connect securely and eliminate perimeter-based legacy solutions.
Powered by Acronis, Liquid Cloud Backup comes combined with anti-ransomware technologies, so you get the protection you need without any downtime.
Liquid C2’s DDoS Secure provides you and your business world-class protection against DDoS attacks from cyber criminals; preventing damage to earnings and reputation
Network protection like no other. Our Liquid Secure Remote Access protects you from unnecessary intrusions and cyber threats so that remote work can continue seamlessly.
Even in the case of a major IT outage, your work shouldn’t stop. But, with Azure backup and disaster recovery solutions offered by Liquid C2, productivity will prevail.
Our managed security services (MSS) team assist customers with day-to-day security operations. We offer managed security support for those with their own teams but in need for support, or a choice of completely outsourced managed security services with an option between bronze, silver, and gold levels.
The focus of these services is on ensuring that the security controls are correctly configured, active and effectively protecting our customers environments, and done as per agreed service level agreements (SLA’s). Our MSS includes the typical network perimeter and endpoint requirements that most customers require, but also caters for solutions such as Microsoft Office 365 and Azure where customers migrated to the cloud and not in a position to manage security for those environments.
We also offer evolving MSS services such as continues risk validation, Secure Access Service Edge (SASE) and more.
Our SOC services are closely integrated with our MSS offering. It consists of cost effective SOC-as-a-Platform (SOCaaP) services co-managed by LIT’s own team and Enterprise SOC services delivered by a two of our alliance partners.
The SOCaaP services are enabled via a Managed Detection and Response (MDR) solution and our Enterprise SOC services are enabled by leading Security Incident and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solutions.
MDR, SIEM and SOAR platform administration, event analysis, incident management and incident response, threat hunting, threat intelligence and actionable reporting are all part of our SOC services, while value-add services such as pen testing, vulnerability management by our MSS and SCS teams and more can be provided and aligned per customer requirement.