About Us

Cyber Security South-Africa (CSSA) is an industry-leading, Cyber Security Technology Distributor, backed by globally recognised international vendors. Our Company founders are all IT industry veterans with over 80 years’ of industry experience. The network that we have developed over the years, in terms of people, relationships as well as the trust we have earned in the industry, sets CSSA aside from other organizations. Security is growing exponentially, faster than anything else in the market. Part of the reason is that there is a massive skills shortage in the security space. CSSA, as a value-added distributor, has identified and filled this gap.

We offer a comprehensive list of solutions, aimed at mitigating information security risk - working through trusted local channel partners. We work with partners, to help create the market. We assist from the proof of concept right through to when the deal closes. We are also available to help partners with the actual installation and deployment, and of course we provide training.

CSSA distributes Rapid7, CyberArk, Anomali, A10 Networks, GroupIB, Vertiv, Detego, Thales, ZeroFox and Bitdefender in South Africa..


Penetration Testing A penetration test is a simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

Red Team Excercises Red team exercises use various techniques including phishing and social engineering aimed directly at your employees or their usernames and passwords, in addition to watering hole attacks and drive-by downloads that target specific users and their PC using an internet browser or installing malware on a site. The goal is to test the organization’s detection and response capabilities.

Incident Response Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

Compromise Assessment Completion of a full objective survey of a network and its’ devices to discover unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers who are currently in the environment or that have been active in the recent past. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of a successful compromise. For the period of the assessment, there is more time and a wider authority to dig deeper than what is expected day-to-day in real-time monitoring.


International vendors and globally recognised channel partners