About Us

Cyber Security South-Africa (CSSA) is an industry-leading, Cyber Security Technology Distributor, backed by globally recognised international vendors. Our Company founders are all IT industry veterans with over 80 years’ of industry experience. The network that we have developed over the years, in terms of people, relationships as well as the trust we have earned in the industry, sets CSSA aside from other organizations. Security is growing exponentially, faster than anything else in the market. Part of the reason is that there is a massive skills shortage in the security space. CSSA, as a value-added distributor, has identified and filled this gap.

We offer a comprehensive list of solutions, aimed at mitigating information security risk - working through trusted local channel partners. We work with partners, to help create the market. We assist from the proof of concept right through to when the deal closes. We are also available to help partners with the actual installation and deployment, and of course we provide training.

CSSA distributes Rapid7, CyberArk, Anomali, A10 Networks, GroupIB, Vertiv, Detego, Thales, ZeroFox and Bitdefender in South Africa..


Penetration Testing A penetration test is a simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

Red Team Excercises Red team exercises use various techniques including phishing and social engineering aimed directly at your employees or their usernames and passwords, in addition to watering hole attacks and drive-by downloads that target specific users and their PC using an internet browser or installing malware on a site. The goal is to test the organization’s detection and response capabilities.

Incident Response Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

Compromise Assessment Completion of a full objective survey of a network and its’ devices to discover unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers who are currently in the environment or that have been active in the recent past. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of a successful compromise. For the period of the assessment, there is more time and a wider authority to dig deeper than what is expected day-to-day in real-time monitoring.


International vendors and globally recognised channel partners

Malware detection. Multi-Layer Ransomware Protection. Zero System Slowdowns. Webcam Protection. Automatic Upgrades. From IoT to Data Centres, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed.

Buy Now

With Rapid7, technology professionals gain the clarity, command, and confidence to safely drive innovation and protect against risk. We transform your data into the key insights you need to predict, deter, detect, and remediate attacks and obstacles to productivity – so you can safely move your business forward.

ZeroFox, the market leader in social media and digital protection, safeguards modern organisations from dynamic security, brand, physical and digital risks across social, mobile, web and collaboration platforms. Using diverse data sources and artificial intelligence based analysis, the ZeroFOX platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking executive and location threats and more.

Introducing the Next Generation of Multi Factor Authentication. Silverfort delivers strong authentication across entire corporate networks and cloud environments, without any modifications to endpoints and servers. Using patent-pending technology, Silverfort enables adaptive multi-factor authentication for all sensitive users, devices and resources, including systems that don’t support it today, such as IoT devices, critical infrastructure, file systems and more.

Attackers spend an average of 99 days inside your systems undetected. Their target? Unsecured privileged accounts and credentials giving them access to your highest value assets and data. With the most complete solution in the industry, only CyberArk protects your enterprise from the ever-expanding attack surface by locking down privileged access: on-premises, in the cloud or in hybrid environments.

Anomali helps organizations find and respond to cyber threats. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems.

TITUS solutions enable organizations to discover, classify, protect, confidently share information and meet regulatory compliance requirements by identifying and securing unstructured data. Enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.

A10 provides high-performance detection and prevention against DDoS and protocol attacks. Since the A10 Thunder and AX Series ADCs are placed between the routers and data centre resources, these ADCs are ideally positioned to detect and stop attacks directed at any data centre server or application. Using specialized ASICs, A10 can continue to inspect, stop, and redirect all application traffic at network speeds.

Protect your critical systems and ensure continuous operations with full featured and cost-effective power solutions. Products include: Uninterruptible Power Supplies (UPS) – Protect your equipment and applications with our complete range of efficient, reliable UPS systems that can be configured to meet the specific needs of your critical applications.  Power Distribution – Our power distribution systems stand up to changing needs and environments while ensuring the availability you demand.

Thales protect and secure access to sensitive information and software wherever it is created, shared or stored – from the cloud and data-centres to devices and across networks. Protect and manage data, identities and intellectual property – through encryption, advanced key management, tokenisation, and authentication and access management.