Local cyber is global

Issue 4 2021 Information Security

Performanta is a cybersecurity company launched in South Africa in 2010. The company was initially focused on technology sales in the cybersecurity market – specifically data leak prevention (DLP), before moving into the managed services space where it is now operational in countries across the globe, employing around 150 people.

Co-founder, Attie Booyens, says that while the company has expanded its reach beyond South Africa’s shores, to the extent of receiving a 'significant investment' from the UK’s Beech Tree Private Equity firm and retaining many large international clients, it still retains its skills base and many customers within the country.

Martin Springer, Performanta’s COO adds that the company realised that technology is not the solution to the ever-increasing cyber threats the world faces. For this reason, the company today takes a more consultative approach to understanding the people, process and technology risks clients face. In this way it covers the full cybersecurity spectrum through a managed services approach. These cloud-based services allow the business to deal with issues anywhere in the world in real-time.

Understanding the risks and how cybercriminals implement their attacks allows the company to prepare customers for a proactive security posture against these threats. It also operates two security operations centres (SOCs) where its personnel manage their clients’ infrastructures in real-time, 24 x 7, making use of the latest technology available on the market as well as its own software designed specifically to integrate and collate data and provide real-time insights.

Key to the SOCs are the various integrations the company has developed into a host of cybersecurity products and solutions, which allows it to monitor and manage customers’ security from a central, integrated point. And while its goal is to understand clients’ risks and prepare them through its consulting services, while ensuring they are able to withstand the numerous threats companies are faced with via its SOCs and technical integrations, it also runs an incident response team which is geared to react to emergencies and get its clients up and running as quickly as possible.

Naturally, cybersecurity today includes areas that were traditionally separate departments, such as governance and compliance, and the company’s consulting incorporates these in its drive to deliver a complete service. And this does not all have to be done by people.

Booyens says that while the company is developing a solution that integrates all the security information software and hardware provided into a single dashboard, it is also focused on automation. While people will always be necessary in this complex industry, automating many of the background processes and procedures will speed up the process and leave people free to focus on more important tasks. “Skilled people are still the fine art of cybersecurity,” notes Springer.

The story of Performanta is that of a group of highly skilled individuals in South Africa that have taken their skills and capitalised on them to grow an international company with offices in South Africa, Europe, Australia and the USA. Moreover, given the critical need for cybersecurity globally, the company’s integrated, cloud-based dashboard delivers intelligence that goes beyond products and brands, offering real-time protection to clients that runs unseen until it is needed which will find it a receptive market well into the future. (Hi-Tech Security Solutions will follow up with an overview of the company’s latest product in the next issue.)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...