Security Audit and Control solutions tagged posts

Security Audit and Control Solutions (SACS)

Security Audit and Control Solutions (SACS)SACS – “Practice Safe HEX”

Seeing a need for automated audits and security reviews… Mervin Pearce (CISA-CISSP)  started developing tools and utilities to make his life easier.

SACS was started in 1992 with the aim to create a vehicle for clients whereby value added services are delivered using a cost effective model.  After successfully completing the CISSP (Certified Information Systems Security Professional) in 1997, also being the first CISSP in Africa, Mervin brought the certification to South Africa and have been delivering the certification in Africa since 2000.  With a complete solution covering education and training, consulting services covering Security, Audit and Compliance, as well as software development.

SACS (Security Audit and Control Solutions) established in 1992...

Read More

CISSP Boot Camp

CISSP Boot Camp


The Five day CISSP® CBK Boot Camp program, is the most comprehensive tutorial on the IS Security field ever offered.  It consists of intense instruction, and is organized so that all topics are covered. Scattered over a longer period to ensure preparation results are better.  The aim of the course is to prepare professionals for the challenging CISSP® exam, as defined in the body of knowledge. These sessions will describe a brief theory of the topic, show you sample questions and will also provide guides and reference material.


– You will receive a comprehensive reference guide.

– In-depth review of the topics, subtopics, of the 8 CBK domains, discussed during the 5 days.

– Handouts...

Read More

SACS Fraud Monitor and Management

 A real-time predictive Fraud Monitor and Management System

  • SACS Fraud Monitor and Manager is a complete solution to manage and monitorSACS Fraud Monitoring and Management financial transactions in real-time and report high risk transactions to an interface for staff to react and make sure the fraud losses are managed.
  • Predictive Analysis on staff actions to highlight possible anomalies.
  • Low level API connectivity to databases for high speed layers.
  • Management Information Systems reporting on accounts.
  • Communication channels across elected links encrypted with Industry Standard Symmetric and Asymmetric encryption algorithms.
  • Interfaces for different departments ranging from IT Support, Management, Fraud and Risk, Compliance and MIS reporting for the Executives.

With middleware it is possible to adapt this to any database...

Read More