Our Promise

People-Centric

Generic placeholder image

Our professional team of experts receive constant intensive training in a number of fields, namely: IT security, TSCM, development and forensic software.

Customer First

Generic placeholder image

Whatever the demand, Kernel Afrika responds with a suitable solution. We address your concerns with discretion and transparency.

Security is Personal

Generic placeholder image

IT Security is a part of every attribute of our lives. We consistently bring our clients up to speed with current trends and threats in the world wide web. .

Overview of Product offering

Kernel Afrika’s expertise is in the information and network security services industry. We aim to leave a strong footprint by allowing our dedication for information security to speak for itself. We offer the newest technology in information security products, through our association with global partners. This is coupled with keeping up with industry trends, best practices and ensuring our work is of the highest standard. We are committed to delivering excellence.

This means that there are no extra steps required from you, giving you the peace of mind to go about your daily tasks. The intricacy of the products we use ensures that we deliver, but it is user-friendly enough for us to show you the ropes, should there be a need.

Web Purifier

WebPurifier is a smart web-filtering system, based on all standards and additionally on our Morphology filtering. Morphology filtering is a unique technology used to “understand” the traffic, regardless of the language on the content obtained from websites, chat, emails and more.

Web Convoy

A state of the art web application, WebConvoy WAF, protects any kind of online application such as, e-Banking, e-Government, and more. It can be setup to work in two different ways, basic protection, or extended protection. Both can monitor by connecting WebConvoy to our Security Operation Center (SOC) and to our center (human monitoring).

Event Forensic Tools

We use this efficient solution for monitoring, viewing and analysing Security, System, Application and other Microsoft Windows operating systems event logs. Events Forensic Tools (EFT), unlike limited Windows Event Viewer, exceeds standard functionality and brings monitoring and a plethora of other features.

Virtual SOC

The Virtual Security Operation Centre is fully equipped and based on Splunk SIEM (Or McAfee if required) to analyse all in/out traffic and find any danger or threats. It can be installed and configured on premises or virtually on the cloud.

SmartScan

SmartScan is a complex of scanning techniques for networks of any size. It finds vulnerabilities and generates a report. Additionally, it can scan to be ISO 27000 compliant.

Our Service

Kernel Afrika forecasts potential threats before they can happen and protects your files. This is done by making use of the aforementioned products.

Security Assessment: Ethical hacking, Penetration testing

img-fluid

Preparing for certification ISO 270001

Training: Forensic, IT Security and Ethical hacking

Accreditation

img-fluid

Master’s degree on Information and Communication Systems Security

img-fluid text-center

PECB Certified Lead Pen Test Professional by PECB

img-fluid

ISO 27034 Application Security Lead Implementer by PECB

img-fluid

ISO 27001 Certified Information Security Specialist by TÜV Rheinland

img-fluid

Associate degree in information security.

img-fluid

CISM - Certified Information Security Manager by ISACA

CEH - Certfied Ethical Hacker by EC-council

PECB Certfied Lead Pen Test Professional by PECB

PECB Certified Lead Forensics Examiner by PECB

PECB Certified ISO/IEC 27034 Lead Auditor by PECB

PECB Certified ISO/IEC 27034 Lead by PECB