About us

More about our history, culture and focus.

Security

Learn more about our services and methodology.

Contact Us

Please get touch for a customsed solution or more information.

Information Security Services

Integrated security and monitoring

Blue Knight Services is a market leader in the field of outsourced information security services.

Using our proven methodologies and unsurpassed experience we are in a position to notify our clients during an attack, or unusual activity, often even before they are aware internally.

Our state of the art security operations center allows us to monitor all of our client internet facing resources on an ongoing basis.

Defense in depth

In today’s competitive market, information technology plays a vital role in any business. Computers have changed the way we do business and unfortunately, the protection of this information is often undervalued or even overlooked entirely.

We assist our clients in creating a solid defensive perimeter using tools and staff education, as well as penetration testing where we use the sames tools and techniques that attackers would use to identify any weaknesses.

Top tier professionals

We employ some of the most skilled and reputable information specialists in South Africa. We conduct multiple penetration tests every month for SME and JSE listed customers alike.

All of our security consultants have top tier qualifications to back up years of hands-on experience in the field. From penetration testing, to forensic auditing, to code review, we understand that each one of our clients have unique requirements and we tailor a custom solution.

CLIENT FOCUSED

A critical factor of our success is that we put the client first. We are not aligned to any brands or owned by a foreign parent company; instead we pride ourselves on our ability to deliver unbiased, personalized and professional solutions.

We understand that your company is different, and so are your needs. We use our unsurpassed experience to ensure uniquely customized solutions for every one of our clients.

 

  • According to McAfee, South Africa’s annual loss from cyber-crime is R5.8 billion
  • On average it takes 156 days between compromise and detection
  • Only 9% of data breaches are uncovered by the attacked organization
  • Cyber risk moved from 12th to 3rd place in the Lloyd’s 2013 Global Risk Index

 

Hacking and cyber espionage have become common place. Companies (and governments) spy on each other on a daily basis and hackers make millions from selling information to competitors. Or worse, they encrypt your data and try to sell the key to your own information back to you.

The damage to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide.

Laws like the Protection of Personal Information (POPI) Act hold organizations to account for the extent to which they have taken steps to protect their data.

We have put together a full suite of services available as ad-hoc or as a managed service solution.


 

What happens when a hacker breaks into your organizations systems and steals personal information? When the Protection of Personal Information (POPI) act was signed into law on the 26th of November 2013, the way we all store, process and manage personally identifiable information changed. With fines of up to R10 million and/or 10 years in prison, not to mention the incalculable reputational loss, prevention really is better than cure.

From external breaches, to internal attacks, from servers to workstations, from laptop to tablet to phone, we offer a full range of forensic auditing services.

Have you been the victim of a ransom ware attack? Not sure whether to pay or if any of your data can be recovered?

Has an attacker changed banking details to channel payments away from the intended accounts?

We employ experienced, certified, professional forensic investigators who will assist you, every step of the way. From the initial investigation, all the way through to providing testimony in court, our staff members arrive on site with all the tools they need to conduct the forensic audit and produce detailed and informative reports.

There is no better way to test how secure your infrastructure and data is, than by having a hacker attack your systems in a responsible, controlled and clearly documented way. Ethical (white hat) hackers use the same tools and methods that an illegal (black hat) hacker would use to break into your infrastructure. We then produce a detailed report explaining every successful attack and vulnerability that was exploited and assist technical staff with protecting against these attacks.

If you were to ask security professionals what the biggest risk to information security is, they would likely give you the same answer: the User. We can spend a wealth of time and money on security only to have a user bypass it all by giving away crucial information.

We believe that training is of critical importance for all staff members that have access to computers, and with that in mind we’ve come up with two different training courses:

Meet the hacker – A one hour presentation aimed at providing only the most basic information in a lighthearted and anecdotal way. We keep the technical jargon to a minimum and relay important security fundamentals in a memorable way.

Hackers mean business – A full day workshop aimed at providing a more in-dept overview of all the security fundamentals at the user level and is targeted at staff who work with sensitive information. This course contains more technical details and practical examples from the real world as well as live hacking demonstrations.

The goal of a vulnerability assessment, (also known as a security audit or security review), is to ensure that the necessary security controls are integrated into the information infrastructure.

An effective vulnerability assessment is not only about running tools and scripts, but about understanding risk. These assessments can prevent breaches, reduce the impact of realized breaches, and inform management about the risk posed to the organisation’s threat surface.

You will have a much better understanding of where your organisation is at risk and what can be done to reduce or eliminate the inherent risks upon completion of a security assessment.

Customer zone

 

Our customer zone allows clients to access reports and test results at their convenience.

This area also allows detailed analytics and statistics about the effectiveness resolution of identified vulnerabilities.

 

Reporting System

Customer Reports

ABOUT US

 

Blue Knight Services was established in 1987 as a support and maintenance company. Following overwhelming requests from our clients  we began investing into specialist cyber security skills and training in 2003. Today BKS is one of the leading information security (Info Sec) service providers on the continent with strong ties to corporate and government entities in many countries across Africa.

We pride ourselves in being able to offer world class services at African rates. We also represent multiple companies as channel partner of choice for cyber security consulting.

Highly specialized and experienced in offensive (red) and defensive (blue) information security, our primary focus is vulnerability assessments and penetration tests (VAPT). We appriciate the value of quality reports, both for internal and public consumption.

We are a socially responsible company and proud level four (100%) BEE contributor. We also actively provide internships and training to educate people around information security.

 

 

Contact us

Name (required)

Contact Telephone Number (required)

E-mail Address (required)

Type of Enquiry (required)

Message / Fault Report (required)

Contact Information

Riverglade Estates 67 Juweel Street, Jukskei Park, Randburg

info@blueknight.co.za

0861 BKS 247 (0861 257 247)

011 704 2252