ABOUT US

LEARN MORE ABOUT US, WHY CONSUMERS PREFER US OVER EVERYONE ELSE SEE SOME OF OUR MISSIONS AND VISIONS.

WHO WE ARE

OUR BACKGROUND

Today's workforce is more mobile than ever before, forcing businesses of all sizes to face new IT security challenges. IT sector now needs to deploy and support an exploding number of laptops and mobile devices. Ubiquitous network access means that more sensitive data resides on enterprise devices than ever before.

Not only is their critical data at risk, but lateral movement across the endpoint into corporate network becomes a potential concern, due to the non-compliance of critical applications, including Anti-virus / Anti-malware encryption and Virtual Private Network

Organizations in industries such as Healthcare, Education and Financial services, to name a few, are confronted with ever-growing security challenges on their endpoint devices.

Meanwhile, the consequences of losing sensitive data have grown into millions of dollars per incident and incalculable damage to an organization's brand.

WHO WE ARE

CGP3 Security Solutions (Pty) Ltd Reg: 2017/282526/07, a SMME entity started by Entrepreneurs with ICT and business experience with extensive ICT training and software implementations. Our main thrust is to provide security services and protect Data and Device against unauthorised access. We strive to offer tried and tested state-of-the-art security measures

We are convinced that dignity and respect of any organisation or individual will be tarnished if their device and or sensitive data fall on unauthorised hands. We provide a 'Peace of Mind' with our security solutions.

Why us

WHAT SETS US APART

CGP3 SECURITY SOLUTIONS EMPOWERS ENTERPRISES TO ADDRESS THESE REQUIREMENTS IN ORDER TO CREATE CONDUCIVE ENVIRONMENT AND PROTECT THEIR CUSTOMERS, EMPLOYEES, INTELLECTUAL PROPERTY AND BRAND. END-USERS ARE ALSO WELCOME TO USE THE SYSTEM.

EVERYTHING YOU NEED TO RUN A MORE SECURE LAPTOP FLEET. TRACK LAPTOPS AND MOBILE DEVICES, COUNTERACT THEFT, SECURE SENSITIVE DATA, AND STAY COMPLAINT WITH DATA PRIVACY STANDARDS. WE DO THIS WITH A SINGLE CLOUD-BASED CONSOLE.

WE HAVE SUCCESSFULLY IMPLEMENTED OUR SECURITY SOFTWARE SYSTEM CAPABLE OF LAPTOP TRACKING, MOBILE DEVICE MANAGEMENT, ENDPOINT SECURITY, ANTI-THEFT RESPONSE AND IT ASSET MANAGEMENT.

  • ASSET MANAGEMENT PLATFORM

    We provide small to large businesses with holistic Asset Management. The platform combines robust IT asset tracking, remote data deletion capabilities and industry-leading theft recovery service. The software offers a comprehensive Security and Management solution for remote and mobile devices that leverage, network, Wi-Fi or broadband connections. We secure sensitive data residing on devices from unauthorized persons.

    1. Data and Device Protection Offer
    2. The system provides easy-to-use persistent and undeletable tools to track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. We do this with a single cloud-based console. Comply with POPI Act as defined by law.

      • We offer clients licensed subscriptions of our agents spanning the lifecycle of purchased PCs and the remaining lifecycle of PCs already within the infrastructure.
      • Provide ongoing service as components of the software-as-a-service solution, especially operation of the Production Data Center housing the monitoring servers and Customer Centre web portal, as well as the Technical Support Service and Recovery Services as required from time to time for the duration of the subscriptions
      • Present clients with an option to use dedicated resource to help manage tracking, recovery and data destruction or to use client’s dedicated IT Manager/ Professional.
    3. Beefing up Security
    4. Because we care, we are security aware. We acknowledge that IT environments differ depending on type of threats experienced in different environments. We have access to other security tools available in the market such as:

      • Emails and Backups,
      • Antivirus and Antimalware,
      • Firewalls and Spam Filters
  • HARDWARE AND CONSUMABLES

    We have partnered with reputable vendors and suppliers to supply the hardware component identified for a fully functional Public Access Facility.

  • OUR PROTECTION APPROACH

    ur team will coordinate a meeting to engage client’s IT Personnel staff to negotiate an acceptable and manageable implementation options ensuring compliant to the required practices as defined by the IT industry. We suggest sequenced approach as follows:

    1. Conduct Storeroom management to ensure good governance with asset management;
    2. Install and configure Cloud based security software;
    3. Assist the client to set-up Asset Policies and Groups;
    4. Build geo-fences to send and receive an alert if device strays or is compromised;
    5. Enable assets monitor and usage of equipment using (GPS) applications;
    6. Advise installation of trusted Emails, Antivirus and Backup applications to beef-up the security,
    7. Empower and familiarize client’s IT support staff.
  • CLIENT’S BENEFITS

    CGP3 Security Solutions empowers Enterprises to address these SECURIY requirements in order to create conducive environment and protect their customers, employees, intellectual property and brand. End-users are also welcome to use the system.

    1. Remote Asset Tracking
    2. Control is the bedrock of confidence. Ability and reliability of our system to give customers self-healing endpoint security, visibility of devices, data, users and applications, is the ultimate level of control and confidence for the modern enterprise.

      • Monitor and track all devices – the basis upon which sound asset management and security policies can be driven – it is cost-effective and extremely accurate tool,
      • Remotely wipe data residing on stolen, missing or misplaced devices – ensuring an audit methodology to prove corporate data was successfully deleted,
      • Ensure Endpoint Protection security investments and controls are always in place and functioning continually. Validate to regulators, auditors, senior management and board of directors,
      • Eliminate human involvement thus saving amount of time and money to conduct daily required inventory control.

    3. Asset Administration
    4. A Customer Center provides an easy to use and cost effective cloud-based interface to monitor device status and ensure Regulator compliance is maintained.

      • Collect incredibly accurate and comprehensive information from each device,
      • Create customized policies and alerts to be notified when an unauthorized change is detected

    5. Software and Asset Management and Reporting (ISAM)
    6. Our agent simplifies management of software licenses, computer lease, machine retirement, upgrades and device ownership by providing easy-to-use web-based reporting tools. These tools are accessed through an intuitive web-based Customer Center. Preconfigured reports come standard, and customer reports are easy to generate. Preconfigured reports help IT staff to manage highly distributed, mobile assets.

      The following list the standard reports available – to name a few:

      • Installed Software Overview Reports
      • Software Configuration Change Report
      • Software By Device Report
      • Software License Compliance Overview Report
      • Microsoft Audit Summary Report
      • Software Policy Non-Compliance Report

    7. Endpoint Forensics
    8. Ability of our clients to understand why and how something happened is critical, especially when proving chain of custody or when criminal activity is suspected. The total Absolute Investigations & Recovery team can:

      • Forensically mine a stolen computer regardless of location. Use key captures, registry and file scanning, geolocation, and other investigative techniques to understand how and why a device was breached.
      • Determine who has the computer, what they’re doing with it, and whether any data was accessed.

    9. Endpoint Recovery
    10. In instances where a criminal act has resulted in the theft of a computer or tablet device, a case is reported to the local police – SAPS. An international Absolute Investigations & Recovery team, in alliance with SAPS, will perform an investigation and provide the results to local police to assist in their criminal investigation.

      The International Forensic team has participated in 38,000+ successful recoveries, working closely with law enforcement agencies around the world.


    11. Software Support Training
    12. CGP3 Security Solutions will coordinate or offer to provide training to our clients. Software Training service is your key to a successful implementation by maximizing the applications usability and functionality ensuring a comprehensive knowledge transfer occurs with every training session.

      DDS (Device & Data Security) hands-on training experience for our clients can take place online or on-site. All Software training sessions are interactive by design and encourage participation.