Now Reading
Liquid C2’s Secure360 uses an Artificial Intelligence (AI)-powered cyber security approach against the evolving threat landscape for African businesses

Liquid C2’s Secure360 uses an Artificial Intelligence (AI)-powered cyber security approach against the evolving threat landscape for African businesses

Secure360

Secure360 employs proactive intelligence-driven threat mitigation strategies that prioritises prevention and preparedness rather than reactive remediation

Liquid C2, a business of Cassava Technologies, a leading pan-African technology group, has introduced Secure360, a comprehensive combination of cyber security services and solutions designed to address the growing complexity of cyber threats across the continent.

Secure360 encompasses four key domains: Governance, Risk, and Compliance; Cyber Threat Assurance; Cyber Defence Services; and Cyber Security Solutions.

Unlike traditional reactive methods, Secure360 employs proactive intelligence-driven threat mitigation strategies that prioritises prevention and preparedness rather than reactive remediation, empowering businesses to stay ahead in an ever-evolving digital environment. Additionally, it offers a holistic, multi-layered defence in-depth approach, enabling customers to achieve end-to-end security, safeguard critical data, mitigate risk, and maintain legislative and regulatory compliance.

According to Oswald Jumira, Chief Executive Officer of Liquid C2, “Working with clients across the continent, we’ve seen firsthand how traditional, siloed approaches to security are no longer sufficient. African businesses need holistic, proactive defence strategies that integrate AI, machine learning, and advanced threat protection. Secure360 sees our team of experts and consultants working with our customers to develop bespoke end-to-end solutions and services. The result is a powerful cyber security proposition”.

Working on the ‘assume compromise’ premise, Secure360 pre-emptively addresses all aspects of security across an organisation’s digital environment. It integrates governance, risk, and compliance, cyber threat assurance, cyber defence, and cyber security solutions to defend against a broad spectrum of cyber threats. This approach ensures that every layer of an organisation’s infrastructure is secure, from networks and applications to data and user access, endpoints, servers, mobile devices, cloud, and supporting infrastructure and operations. From initial testing and assessment to continuous management and monitoring, all aspects of the process are managed.

See Also
Joburg Film Festival

A recent Gartner survey (https://apo-opa.co/3Z1dO1U) found that 75% of organisations are consolidating their security vendors to streamline operations and improve risk management. Aligned with this trend, Secure360’s consolidated solutions enable cohesive and integrated security operations, which drive efficiencies, particularly response times, and establish situational awareness through threat intelligence. This consolidation simplifies security management, enhances visibility, and allows for quicker responses to threats.

Firmly positioning itself as a key cyber security player in the Middle East and Africa market, Liquid C2 will focus on several exciting value-added services in the coming year. Businesses can look forward to reaping the benefits of the company’s expertise in cyber defence services, securing AI, secure digital transformation, cost-effective event ingestion, and modernised risk and compliance-based assurance and situational awareness enabled reporting.

In the last two years, through its matrix of Cyber Security Fusion Centres (CFSC) located across Africa and the Middle East, Liquid C2 is yet again demonstrating how data-driven solutions, backed by deep industry expertise, are crucial to navigating complex threats while securing and future-proofing organisations in Africa’s dynamic cyber landscape.

View Comments (0)

Leave a Reply

Your email address will not be published.

© 2022 Drummr Africa. All Rights Reserved. 

Use of this site constitutes acceptance of our User Agreement and Privacy Policy. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Drummr Africa.

Scroll To Top