Services
Overview of Product Offering
Kernel Afrika’s expertise is in the information and network security services industry. We aim to leave a strong footprint by allowing our dedication for information security to speak for itself. We offer the newest technology in information security products, through our association with global partners. This is coupled with keeping up with industry trends, best practices and ensuring our work is of the highest standard. We are committed to delivering excellence.
This means that there are no extra steps required from you, giving you the peace of mind to go about your daily tasks. The intricacy of the products we use ensures that we deliver, but it is user-friendly enough for us to show you the ropes, should there be a need.
WebPurifier is a smart web-filtering system, based on all standards and additionally on our Morphology filtering. Morphology filtering is a unique technology used to “understand” the traffic, regardless of the language on the content obtained from websites, chat, emails and more.
Web Purifier
Web Convoy
A state of the art web application, WebConvoy WAF, protects any kind of online application such as, e-Banking, e-Government, and more. It can be setup to work in two different ways, basic protection, or extended protection. Both can monitor by connecting WebConvoy to our Security Operation Center (SOC) and to our center (human monitoring).
We use this efficient solution for monitoring, viewing and analysing Security, System, Application and other Microsoft Windows operating systems event logs. Events Forensic Tools (EFT), unlike limited Windows Event Viewer, exceeds standard functionality and brings monitoring and a plethora of other features.
Event Forensic Tools
Virtual SOC
The Virtual Security Operation Centre is fully equipped and based on Splunk SIEM (Or McAfee if required) to analyse all in/out traffic and find any danger or threats. It can be installed and configured on premises or virtually on the cloud.
SmartScan is a complex of scanning techniques for networks of any size. It finds vulnerabilities and generates a report. Additionally, it can scan to be ISO 27000 compliant.