Phakamo Tech

Phakamo Tech

Phakamo Tech Enterprise Risk, Cloud Enablement & Cybersecurity Practice offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Our services identify and close cybersecurity, risk management and compliance gaps so that our clients’ organization can focus on core business operations and growth.

Phakamo believes Security needs to be visioned with an added dimension to counteract and thwart diverse attack vectors. No longer is it sufficient to rely on traditional security defense mechanisms within your infrastructure; with Phakamo you can count on our experience, expertise, diverse knowledge and innovative solution offering to meet your business objectives.

Contact Information

Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Tenfold Security

Tenfold Security

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Cyber Range Training Center

Cyber Range Training Center

Cyber Range Training Center provides a complete and tested framework to help IT security organizations improve their overall security posture.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Mosaic Technologies Group

Mosaic Technologies Group

MOSAIC’s Cyber solutions provide the analytics, planning, technologies, and operations support to protect our clients’ systems, our warfighters, and the nation’s joint cyber mission.