We are one of the biggest security implementation and solution partners in Uganda. We work with multiple vendors, including Splunk, Fortinet, Check Point, Palo Alto, ARCON, Rapid Server, and Tenable. These are all our vendor partners. We work with different solutions for different kinds of customers and requirements. One of the PAM, privileged access management and identity management solutions our customers have been using was CyberArk, which they were not very happy with. We moved them over to solutions like Thycotic or ARCON. That is what we are working on. These are public sector customers, government customers, they are not private customers. It is always on-prem, it cannot be hybrid. These guys will come and do an implementation on a server, which they put in the data center, then they map all the user credentials with it.
Vulnerability Management solutions designed to identify, evaluate, and remediate vulnerabilities within your systems before they can be exploited by attackers. These solutions are fundamental for maintaining the security integrity of software and network infrastructure in a systematic and proactive manner.
We are one of the biggest security implementation and solution partners in Uganda. We work with multiple vendors, including Splunk, Fortinet, Check Point, Palo Alto, ARCON, Rapid Server, and Tenable. These are all our vendor partners. We work with different solutions for different kinds of customers and requirements. One of the PAM, privileged access management and identity management solutions our customers have been using was CyberArk, which they were not very happy with. We moved them over to solutions like Thycotic or ARCON. That is what we are working on. These are public sector customers, government customers, they are not private customers. It is always on-prem, it cannot be hybrid. These guys will come and do an implementation on a server, which they put in the data center, then they map all the user credentials with it.