We Secure

With flexibility comes great responsibility.
Let us help you work remotely with guaranteed security using our cloud protection services

Security nightmares keeping you awake at night?
We'll C2 it.

Build Cloud Resilience with our Security Solutions

Cloud services that increase productivity and keep all your business data safe yet accessible

The cloud is many things: agile, scalable, and a tool to drive efficiency. However, without it being secure, you won’t be able to use it to its full potential. While implementing basic cloud solutions is easy, not many managed service providers give you the means to protect your organisation against cyberattacks, phishing, malware, data corruption, and more.

But here at Liquid C2, your protection is our number one priority. When running an enterprise, you need to have complete trust that your data is in good hands; it cannot be accessed by unauthorised personnel and has a backup. And, this is where Liquid C2 comes in.

Our team of IT specialists brings several decades of cumulative experience to the table. This enables us to provide you with the most robust cloud protection tools offered in all of Africa. That’s why you will not face cybersecurity-related issues and still have your employees work remotely from anywhere, at any time, using any device so that innovation never has to stop.

True commitment means not having to worry about things that might go wrong. Ensure that’s the case for your staff with our protection tools to safeguard your networks and information. All our cybersecurity solutions are user-friendly, easy to adopt, and seamlessly merged with your other Microsoft applications, so let’s get started ASAP.

Security Consulting Services

Consists of technical and non-technical advisory services by highly certified and experienced consultants

Learn more

Product Solutions & Services

A wide range of security product solutions from long time and well-known vendors

Learn more

Managed Security Services

The tiers of assistance with day-to-day security operations

Learn more

Security Operation Centre

Cost effective SOC-as-a-Platform (SOCaaP) services and Enterprise SOC services

Learn more

Our cyber security principals

LIT provides end-to-end Cyber Security solutions and services to our customers enabled via a best practice approach which consists of two pillars.

1. Information Security Management System

The first of the two pillars are helping our customers to establish all that is needed to establish an Information Security Management System (ISMS) that is appropriate and aligned to their business and information technology strategy and objectives. In doing so we ensure that all information security aspects needed are addressed as is required. The aspects covered in our approach are information security governance, risk, compliance, people, process, and technology. All these aspects are continuously reviewed and improved as customer environments evolve and is exposed to ever increasing threats.

2. Cyber Security Resilience Framework

The second of the two pillars are to assist our customers with the selection, implementation and management of the appropriate security controls needed to enable the objectives of the ISMS; and is referred to as a Cyber Security Resilience Framework. The Cyber Security Resilience Framework encompass security controls to enable the identification, protection, detection, response and recovery, testing, situational awareness as well as learning and evolving needed for end-to-end resilience.

LIT has been delivering Cyber Security services to customers for over a decade, but the difference in what we offer is that we have now established an experienced and highly skilled Cyber Security competency that focuses only on Cyber Security, with some of the leading expertise in South Africa appointed over the last six months in 2021.

This is underlined by some with more than twenty-five years’ experience in leading positions in Cyber Security, as well as a long list of industry-leading certifications including but not limited to CISSP, CISA, CRISC, CISM, CEH, OSCP, OSWP, ISO/IEC 27001 Lead Auditor, CIPM, ISO/IEC 27005 Risk Manager.

Key objectives to what we do are to understand our customer business, information technology and security landscape, then to lower the risk, improve compliance, limit the impact, while optimising the investments made already. Most of all, we strive and want to be seen to deliver value.

Advisory Threat Report

Anonymous Sudan Threat Actor Targets Kenyan Infrastructure

Security Consulting Services

Our Security Consulting Services (SCS) consist of technical and non-technical advisory services that are executed by highly certified and experienced consultants.

The technical consulting services team do manual penetration testing of external network perimeter services, public-facing web applications, wireless and internal networks, as well as automated pen-testing, breach and attack (BAS) simulations, red and blue team exercises; and further technical assessments such as firewall and rule reviews, configuration baseline checks, investigations and analysis and more.

The non-technical consulting services team assist and deliver security strategies, roadmaps, architectures and more. They are also doing a variety of best practice assessments and assist with the implementation thereof, e.g. ISO 27001, NIST Cybersecurity Framework (CSF), IOSCO Cybersecurity Guideline, and the SWIFT Customer Security Program (CSP). The team also assist with Data Privacy assessments, policy and processes, and the implementations thereof.

Product Solutions and Professional Security Services

LIT provides a wide range of security product solutions from long time and well-known vendors such as Microsoft, Cisco, Fortinet, Netskope, Trend and more; as well as evolving and disrupting vendor solutions from vendors such as Ridge Security, Comodo, Bullwall, QS Solutions, Cyber Risk Aware, and CyRiskco. These vendor product solutions are sold to our customers or used by us to enable our managed security or consulting services.

Our security product portfolio provides for network, endpoint and mobile, server, data, cloud, Internet of Things (IOT) and Operational Technology (OT), as well as supporting security infrastructures such as Security Incident and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solutions and services.

Our Professional Security Services (PSS) team is highly skilled and experienced to deploy, configure, optimise, and test the latest on offer from these vendors. Examples here are where some of our specialists did a micro network segmentation and zero trust project based on the latest from Cisco’s security portfolio, complex Unified Threat Management (UTM) migrations from one vendor to another, and more. Our PSS team are also assisting those customers who are simply not able to implement and configure their solutions themselves and requires expert assistance to maximise their security control investments.

Managed
UTM

Unified Threat Management provides an all-in-one coverage for common security needs.

Learn more

Security Awareness Training

The only behaviour-driven security awareness platform that delivers training in real time.

Learn more

Security Operation Centre as a Service

Enabling organisations to outsource threat detection and incident response.

Learn more

Secure Access Service Edge

Connect securely and eliminate perimeter-based legacy solutions.

Learn more

Liquid Cloud Backup

Powered by Acronis, Liquid Cloud Backup comes combined with anti-ransomware technologies, so you get the protection you need without any downtime.

Learn more

DDOS Secure

Liquid C2’s DDoS Secure provides you and your business world-class protection against DDoS attacks from cyber criminals; preventing damage to earnings and reputation

Learn more

Secure Remote Access

Network protection like no other. Our Liquid Secure Remote Access protects you from unnecessary intrusions and cyber threats so that remote work can continue seamlessly.

Learn more

Azure Site Recovery

Even in the case of a major IT outage, your work shouldn’t stop. But, with Azure backup and disaster recovery solutions offered by Liquid C2, productivity will prevail.

Learn more

Download our WHITE PAPER on the evolving cyber security threat in Africa

Managed Security Services

Our managed security services (MSS) team assist customers with day-to-day security operations. We offer managed security support for those with their own teams but in need for support, or a choice of completely outsourced managed security services with an option between bronze, silver, and gold levels.

The focus of these services is on ensuring that the security controls are correctly configured, active and effectively protecting our customers environments, and done as per agreed service level agreements (SLA’s). Our MSS includes the typical network perimeter and endpoint requirements that most customers require, but also caters for solutions such as Microsoft Office 365 and Azure where customers migrated to the cloud are not in a position to manage security for those environments.

We also offer evolving MSS services such as continued risk validation, Secure Access Service Edge (SASE) and more.

Security Operation Centre

Our SOC services are closely integrated with our MSS offering. It consists of cost effective SOC-as-a-Platform (SOCaaP) services co-managed by LIT’s own team and Enterprise SOC services delivered by a two of our alliance partners.

The SOCaaP services are enabled via a Managed Detection and Response (MDR) solution and our Enterprise SOC services are enabled by leading Security Incident and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solutions. 

MDR, SIEM and SOAR platform administration, event analysis, incident management and incident response, threat hunting, threat intelligence and actionable reporting are all part of our SOC services, while value-add services such as pen testing, vulnerability management by our MSS and SCS teams and more can be provided and aligned per customer requirement.

Ready to get protected?

We are ready to help secure your network and cloud connection

Contact Us

Are you under attack?

We can protect your business from