IT Solutions/IT Security

Our partner, ICTS CONSULTANTS, provides IT solutions ranging from hardware and software products supply and support, network design, installation and support, software development, database support, and designing IT policies, standards and procedures for organisations. Our speciality is IT security. ICTS Consultants will assess your risks, help you to reduce risk and protect your valuable assets. We help you improve your understanding of the role of cyber-security and provide actionable guidance to protect your business. IT security management entails the identification of an organisation’s information assets, the development, documentation and implementation of policies, standards, procedures and guidelines. Management tools such as data classification, security awareness training, risk assessment and risk analysis are used to identify the threats, classify assets, and rate their vulnerabilities so that effective security controls can be implemented.

IT Security

Our IT security services include:

Governance Risk & Compliance
We assess your current security position while aligning approaches with your specific regulatory requirements. With a robust framework, you will improve your organisation’s decision making, as well as its ability to achieve compliance and to prepare for market volatility.

Business Continuity & Cyber Resilience
As you ready your business for a significant disruption, you’ll need cyber and traditional continuity and recovery strategies that involve personnel across all levels of your business. With integrated response plans, we help you align your business continuity programmes with your organizational structure to build business resilience.

IT Audit
Do you want a different type of audit? A technical investigative as opposed to normal checklist-based audit? We have qualified staff who will check for the existence of controls, and will verify that the controls work as expected by testing them thoroughly.

Incidence Response & Disaster Recovery
Have you encountered an incident? Have you experienced a virus or worm attack? Have your systems - Linux, AIX, Windows, Firewalls, Network devices, Virtual services, etc - failed? Have you lost configurations? Our team will help you restore your critical services.

Do you have a Disaster Recovery Plan? Has it been tested? We can perform an independent test and give you the assurance that you need.

Forensics
Have you been hacked? Do you want to find out who breached your systems? Our team will help you investigate breaches and abuses to your system up to providing evidence for legal or disciplinary action. We can also help you recover your data.

Our Clients

The clients to whom we have provided IT services in recent years include:


Senior IT Consultant

Dout Jolani

DOUT JOLANI worked as an IT specialist for NCR Zimbabwe, Cairns Foods, Plan International (Zimbabwe), Murowa Diamonds and Premier Finance Group. Since 2010, he has worked as a consultant specializing in IT security.

Dout has a BSc (Hons.)(Computer Science) from the National University of Science and Technology (NUST) in Bulawayo and an MBA from the University of Zimbabwe. He has received specialized training in IT Security, is the holder of the Certified Information Systems Security Professional (CISSP) certificate, Certified Information Systems Auditor (CISA) and is a Prince2 Project Management Practitioner.

>