Information Security Services

ACS Information Security Services’  ( ISS) expertise is in the provision of information security solutions. We understand the business risks associated with any IT security environment and are able to analyse the strengths and vulnerabilities of the environment. As a Trusted Enterprise Security Provider, ACS ISS protects your critical information security, mitigates risk and puts the trust back into your business.

ACS ISS operates out of the seven – tier Trust Centre featuring redundant power, multiple internet service providers and multi-tiered biometrically enabled physical access control system and is staffed with security experts capable of providing the customer with end to end solution in the IT security space:

  • Secure Data Hosting Services (Platform as a Service)
  • 24 x 7 x 365 Secure Operations Centre – proactive compliance monitoring
  • Next Generation Firewalls and Threat Prevention
  • Vulnerability Assessments
  • Professional Services

ACS ISS  Technical Services assists customers in the implementation of solutions based on industry-leading products from our best-of-breed Information Security product basket. ACS ISS expert advisers use well-defined methodologies and processes, based on industry best practices, to help rapidly and effectively unlock the value of our solutions.

Managed Security and Compliance Monitoring
Effective monitoring of  all security data across the enterprise and continuously improving on the  security status and empowering organizations with timely and proactive detection of threats, incidents and violations to minimize loss of...
Secure Hosting
Secure Hosting Facility, based at Altech Card Solutions, provides Tier 4 N+1 hosting facility backed up by ISO27001 certification, PCI DSS Level 1 certification, managed by on-site skilled engineers providing 24 x 7 x 365 support
Vulnerability Management
Security Vulnerability ManagementVulnerability Management consists of Risk Discovery, assessing the exposure to security threats and provides recommendations on possible solutions to eliminate these threats. By continuously and proactively...
Identity and Access Management
Identity Management deals with an individual's authentication, authorization and privileges within a system and controls their access to resources within that system by associating user rights and restrictions with the established identity.
Wireless Security Management
Secure Wireless Management Wireless is no longer a luxury, it is a necessity and the risks to users of wireless technology have increased as the service has become more popular. Hacking methods have become much more sophisticated and...