Phoenix-Guard CyberSecurity

Holistic view of an organizations IT security offering complete cyber threat visibility, extending data democritization and augmenting advanced analytics for replay and analysis.

what we do?

Phoenix-Guard is an intelligent system that employs an analytics driven strategy to safeguarding critical and relevant data within an enterprise making it easier to spot trends and patterns out of the ordinary from a single point of view thereby continually expanding your predictive capacity."

— CTO, Samuel Kamau.

Threat detection & response

Designed to detect and progressively record subtle actions & much broader attack vectors enhancing proactive threat hunting capability to natively isolate threats and attacks [as-is, as-happens], delivering deep insights for investigating and visually reconstructing an attack, and gaining granular control over compromised assets.

Behaviour analysis

Phoenix-Guard engine establishes a good baseline of normal activity recognizing differences in use by inferring behavior from profile derivatives of system, user, network anomalies drawn from a detection footprint that combines user, entity behavior capabilities providing enhanced context by visualising threats across multiple attack phases.

Business value delivery

We are deeply focused on delivering a product that drives business transformation and insight on compelling business use-case on reducing operational risk and fraud by showing the bean counters on how investment will either add to your top line or help reduce your bottom line accruing value to both security functions and streamlining operations within your organization.

Services

SIEM

"SIEM" is an important instrument in the security toolkit of your infrastructure...

Read More

SIEM

Phoenix-Guard "SIEM" is an important instrument in the security toolkit of your infrastructure as it is the CNS (Central Nervous System) correlating and analysing events across a wide variety of contextual disparate sources offering actionable intelligence and situational awareness required to keep up with the ever-evolving threat landscape inorder to identify, alert, understand, respond, and enact appropriate countermeasures to counter said threats.


Features

  • Accelerated threat detection and response for improved mean time.
  • Takes in data from virtually any vendor or in-house applications.
  • Correlation and normalization for context and alerting.
  • Comprehensive compliance automation and assurance.
  • Ease and simplicity of deployment and support.
  • Centralized security event management.
  • Real-time application & user monitoring.
  • Provides reporting on all ingested data.
  • Advanced search and forensic analysis.
  • Real-time event correlation.
  • Log management and reporting.
  • Maintain continuous security.
  • IT compliance reporting.
  • Auditable compliance.
  • Advanced analytics.
  • Threat intelligence.
  • Active response.

Vulnerability assessment

"Vulnerability assessment" offers a single view with an unobstructed deep insight into your...

Read More

Vulnerability assessment


Phoenix-Guard "Vulnerability assessment" offers a single view with an unobstructed deep insight into your risks and security threats within and across your infrastructure, to find the weak spots and loop holes in your critical assests by continously scanning your systems and devices to detect vulnerabilities as they arise, assess the potential threat of those vulnerabilities, and take corrective action so as to best manage IT risk, streamline risk assessment and remediation efforts by automating network vulnerability lifecycle from discovery to prioritization to deal with the greatest threats first.


Features

  • Dynamic filters that categorize systems by owner and responsibility.
  • Easy to configure vulnerability assessments to scan any system.
  • Choose the scan frequency: Monthly/Weekly/Daily.
  • Create custom and on-demand scans easily.
  • Daily/weekly vulnerability check updates.
  • Security risk alerts by email/SMS.
  • Passively monitor your network.
  • Risk solution recommendations.
  • Complete, actionable reports.
  • False-positive prevention.
  • Live dynamic reporting.
  • Actionable data focus.
  • Granular risk scoring.
  • Fast report delivery.
  • Active response.
  • Easy to set up.

Penetration testing

Our security assessment team addresses wide-ranging client needs and offers an...

Read More

Penetration Testing


Our security assessment team addresses wide-ranging client needs and offers an in-depth and comprehensive systems audit from an internal and extenal perspective simulating a real-world attack on your networks, applications, devices, and/or people so as to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilitites on potential points of exposure that may exist and present this to IT professionals and network system managers so as to help them to make strategic conclusions and prioritize related remediation efforts which may be useful in validating the efficacy of defensive mechanisms with an assessment of their impact and propose mitigation or a techincal solution.


Application security

We deliver a robust, complete and comprehensive single vendor solution...

Read More

Application security


We deliver a robust, complete and comprehensive single vendor solution consisting of an integrated set of products stemming from a combination of best-in-class technology that is managed through a centralized platform with its powerful comination of automation, process and speed ensuring that web-based applications are protected from attacks that target vulnerabilities waiting to be exploited effectively eliminating the vulnerabilities with proven effectiveness.


Features

  • Configuration and Deployment Management Testing.
  • Identity Management Testing.
  • Session Management Testing.
  • Input Validation Testing.
  • Authentication Testing.
  • Business Logic Testing.
  • Authorization Testing.
  • Information Gathering.
  • Client Side Testing.
  • Error Handling.
  • Cryptography.

Advisory services

Our industry security professionals and diverse team of consultants team up with you to ...

Read More

Advisory services


Our industry security professionals and diverse team of consultants team up with you to help you deliver better outcomes and long-lasting results from strategy-execution, governance, enterprise risk management-controls architecture, implementation, and management so as to activate and adapt to a foundation tailored to your specific business environment, requirements, and services to reflect the realities of your business. Our actionable insight offers a clear understanding of your organisation's exposure to cyber threats and attacks and the impact such would have on your organisation helping you as the client make better informed cyber risk management decisions that improve the resilience of your organisation. We develop policies and procedures that adapt your organisation to threats as they change, anticipate such threats to tackle cyber risks, and put in place pragmatic cost effective cyber defenses in place to best grow, optimize and protect your business.


Services we provide

  • Risk assurance, quantification, transformation & management.
  • Enterprise-wide cybersecurity program review & roadmapping.
  • Security program development & assessment.
  • Incident response & business continuity.
  • External & internal risk assessment.
  • Technical security controls review.
  • Scenario-based cyber exercises.
  • Security awareness training.
  • Internal security audits.
  • Vulnerability scanning.
  • Vendor due diligence.
  • Penetration testing.
  • Threat modelling.
  • CISO Advisory.

SCAP

"SCAP (Secure Captive Portal)" is an all-in one platform and software implementation that ...

Read More

SCAP

Phoenix-Guard "SCAP (Secure Captive Portal)" is an all-in one platform and software implementation that enables the administrator gain insight on the state of users after completion of a defined process and acceptance of an Acceptable-Use-Policy (AUP) thereby blocking clients until user verification has been established against a database of validated and authorized portal users before access to the internet is granted.


Features

  • Client pass-through - allow devices with certain MAC/IP addresses to pass-through without logging in.
  • Blackout period - block internet access during a certain time period within a day.
  • Bandwidth throttling globally or down to per-user level to stop network abuse.
  • Ability to define operator accounts with different access levels.
  • Effectively secure small-very large heterogeneous networks.
  • Captive-portal for registration and remediation.
  • Powerful & robust BYOD management options.
  • Client blacklist - block offending client PCs'.
  • Centralized wired/wireless management.
  • Automatically remove inactive-users.
  • Detect compromised user accounts.
  • IP block list and web filtering.
  • Extensive reporting feature.
  • Perform compliance checks.
  • Click-once web based login.
  • Role-based access control.
  • Universal clients support.
  • Guest access provision.
  • In-browser messaging.
  • Self sign-up accounts.
  • 802.1X support.

support center

Get in touch with us


Write to us

samuel.kamau@kenindus.com

Call us

+254 20 213 4450 / +254798856705 / +254786650079

Location

Koinange Street, Cianda House. 2nd floor. Suite 210.