Be proactive about Cybercrime

Cyber Security Products and Solutions

Detect and stop threats better with our cybersecurity products. Don’t be an easy target for crime. Request a vulnerability or Active Directory assessment today.

Nettprotect

Nettprotect gives you continuous insight into your global security with visibility across all your IT assets, wherever they reside.

UserSure

The BUI Password Breach Tool is configured out-of-box to meet the NIST SP 800-63 guidelines.

RESCAN

Our Active Directory Audit Tool provides scheduled easy to read audit reports using Microsoft Cloud.

POPIACheck

POPIACheck allows the organisation to rapidly perform POPIA assessments and generate corrective actions for improving your compliance in accordance to the POPI Act of South Africa.

Be Proactive About Cybercrime Response And Prevention?

Vulnerability assessments usually offer a brief snapshot of what your vulnerability exposure is. The problem however, is that vulnerability assessments are never a complete picture, they only present a partial view into your exposure.

Most businesses react to a security breach which puts the threat actors in control. Businesses should be proactive and test their network security control regularly to reduce the risks and costs of a cyber breach.

Visit the Nettprotect Website
We offer a managed service to take care of your vulnerability and assessment requirements by continuously enhancing the security posture of your business through vulnerability detection & management. Information Security is no longer the ‘ignore it, maybe it will go away’ conversation that it used to be.
This offering includes the following deliverables
  • External Penetration Testing – Simulate an attacker originating from the internet.
  • Internal Penetration Testing – Simulate an attacker that has established access to the internet network.
  • Wireless Penetration Testing – Attempt to compromise the environment through wireless technologies.
  • Application Penetration Testing – Perform attacks against web applications or other applications to identify vulnerabilities.

Real-time audit reports to help an administrator identify change events

If you’re monitoring your Microsoft Azure and on-premises IT assets with a reporting solution like OMS, then you’ve got a powerful tool at your disposal. The RESCAN service provides scheduled easy to read audit reports using data already being collected by Microsoft Cloud and on-premise infrastructure tools.

RESCAN Reports can deliver real-time audit reports to help an administrator identify change events that are being logged in the Microsoft Cloud and on-premise infrastructure.

Visit the Active Directory Website
BUI RESCAN Reports are conveniently emailed to selected personnel in your organisation based on a schedule that works best for you. All reports are delivered in an easy read format.
This offering includes the following deliverables
  • User Logon Reports
  • Local Logon-Logoff Reports
  • User Management Reports
  • Group Management Reports
  • Computer Management Reports GPO Management Reports
  • OU Management Reports and Domain Policy Changes Reports

How Our Technology Can Help

The BUI Password Breach Tool (PBT) uses a comprehensive layered approach to analyse a password, ensuring it meets the requirements of your security policy. PBT uses a mixture of a rules engine, custom blacklist, heuristic scanning and the BUI Cloud Password Breach Database of over 500 million compromised passwords to provide complete detection of unsuitable passwords.

The agent runs on each Active Directory Domain Controller, intercepting and analysing password changes as they happen, no matter where they originate from. There is no need to install software on any workstations making for a fast and low-risk deployment.

Visit the BUI Password Beach Website
Deploy Password Breach Tool onto your existing Active Directory Domain Controller(s) to immediately and seamlessly comply with all of the NIST requirements. There is no need to install extra software on workstations and all password change attempts, both accepted and declined, are logged centrally for auditing and reporting purposes.
This offering includes the following deliverables
  • Cloud Password Breach Database of 500 million + breached passwords
  • Comply with NIST SP 800-63B, GDPR and other regulatory requirements
  • Remove complex and ever changing password requirements
  • No desktop software required
  • Negate password dictionary and brute force attacks
  • Granular AD Group Policy based password complexity controls
  • Intelligent heuristics scanning
  • Custom blacklists

Quantify your progress towards POPIA compliance across 4 key paradigms: Policy & Strategy, Lifecycle & Process, Security and People

POPIACheck allows the organisation to rapidly perform POPIA assessments and generate corrective actions for improving your compliance in accordance to the POPI Act of South Africa.

How does it work?

  • Answer 36 POPIA assesessment questions using multiple-choice answers
  • Assessments outputs provide roll-up dashboards and reports
  • All results are presented in an easy-to-view dashboard with RAG dials
Identify key risks and areas to address the organisation’s needs to achieve POPIA compliance. POPIACheck provides a dashboard summary for all
completed assessments, Drill down to see underlying problem areas and prioritized corrective actions.
This offering includes the following deliverables and benefits
  • POPIACheck provides a dashboard summary for all completed assessments
  • Drill down to see underlying problem areas and prioritised corrective actions
  • Use our simple, one button reporting option for export to PDF
  • Build a roadmap towards a successful POPIA compliant business