DataSecure maintains several Service Delivery Centers across Global locations to provide clients with the “virtual capacity” to quickly respond to emerging technology. These delivery centers help meet business needs and thus fast-track, cost-optimize and develop technology excellence towards their pursuits for business excellence and customer delight.


Spaces Waterfall, Ground Floor, 22 Magwa Crescent, Midrand 1685

+27(11) 083-7086 | +27 (79) 183-0877 | +27(11)083-9415



Successfully managing multiple IT projects is challenging without even considering the implications of cyber security threats to individual projects.

Whether it’s new infrastructure being deployed, the launch of a new website or the creation of a new product line or service, we can help you appropriately secure projects according to your policy requirements and risk appetite. Since every project is different, we will analyze the potential threats that your unique project could face. These range from targeted and automated attacks or attacks from disgruntled employees. A security consultant will then analyze the likelihood of each attack and its potential consequences to determine the overall risk to your system.

The result of our analysis will provide you with evidence-based insight so you can make sensible decisions on how to cost effectively manage the security of your project.

As well as enabling security controls, we can provide a Project Security guide for project managers, covering mandatory and recommended security controls, as well as timeframes and the information security budget requirements of the project. If you prefer a more personalized approach, DataSecure seminars can help your project managers understand your policy requirements and help them understand the benefits of security controls and strategies to ensure your project is a success.

Depending on the scope of your project, some of our security services include:

    • Project Security Guide
    • Project Security Workshops
    • Risk Assessment
    • Design Review
    • Penetration Testing
    • Configuration Review
    • Account Audit
    • Password Cracking