Security that never sleeps.
Your team in Kigali.
Continuous monitoring, vulnerability management, and cybersecurity advisory. Delivered as a monthly service, not a one-time project. Built for East African banks, fintechs, and enterprises.
Request a managed security quote Assess your postureExternal Perimeter Monitoring
Continuous monitoring of your external attack surface. Domain and subdomain discovery, exposed service detection, certificate tracking, and immediate alerting on new exposures.
Vulnerability Management
Monthly authenticated vulnerability scanning of all in-scope assets. Findings prioritised by exploitability and business impact. Patch tracking and remediation verification.
Cybersecurity Advisory
Board-level cybersecurity advisory. Risk posture briefings, strategic security roadmap, regulatory alignment, and practical guidance for leadership teams.
SAST / DAST Integration
Integrate static and dynamic application security testing into your development pipeline. Findings surfaced in your existing ticketing system. Weekly reports for development teams.
Security Reporting & Compliance
Monthly executive dashboard. BNR-aligned compliance reporting. Evidence packages for ISO 27001 and SWIFT CSP audits. Board-ready summaries each quarter.
Threat Intelligence
Contextualised threat intelligence relevant to East African financial institutions. Early warning on new vulnerabilities affecting your technology stack. Dark web monitoring for credential leaks and data breaches.
Why managed security instead of ad-hoc testing?
A one-time annual penetration test is a snapshot. It tells you your security posture on a single day. But attackers operate continuously, probing your systems every day, looking for new vulnerabilities introduced by software updates, configuration changes, or new deployments.
A managed security service provides continuous coverage:
- New vulnerabilities are detected within days, not 12 months
- Your board gets regular cybersecurity posture briefings without hiring a full-time CISO
- Your security posture is actively maintained, not reviewed once a year
- Compliance reporting is always ready, not assembled in a rush before an inspection
- You have on-demand security expertise without the recruitment cost of a full-time hire
Service tiers
We offer three managed security tiers designed for different stages of security maturity and organisation size:
Monitor
- Monthly vulnerability scanning
- External asset monitoring
- Monthly security report
- Email/WhatsApp alert channel
- Quarterly security posture review
- Annual pentest (included)
Protect
- Everything in Essentials
- Continuous perimeter monitoring
- Quarterly penetration testing
- SAST/DAST pipeline integration
- Quarterly cybersecurity advisory session
- BNR compliance evidence package
- Monthly executive dashboard
- Dedicated analyst point of contact
Defend
- Everything in Professional
- Monthly board-level advisory
- Threat intelligence feed
- Dark web monitoring
- Custom dark web monitoring scope
- On-site quarterly reviews
- SWIFT CSP compliance support
- ISO 27001 audit support
- Custom SLA and scope
All tiers include a kickoff assessment, asset discovery, and onboarding. Pricing is on request. We scope engagements to your specific environment and provide a fixed monthly quote with no surprises.
Who we work with
Our managed security clients include banks and MFIs supervised by BNR, payment service providers, mobile money operators, insurance companies, and technology companies serving the financial sector across Rwanda and East Africa. Our team is based in Kigali and available for on-site work when required.
Compliance alignment
Managed security is not optional for regulated institutions. Continuous monitoring and vulnerability management are explicit requirements under the frameworks that govern financial institutions in Rwanda and East Africa:
- BNR Regulation on Cyber Resilience for the Financial Sector: requires supervised institutions to implement continuous vulnerability management and security monitoring, and mandates incident response capabilities. A managed security service directly addresses these ongoing obligations
- PCI DSS v4.0: Requirement 5 (protect all systems against malicious software), Requirement 10 (log and monitor all access to system components and cardholder data), and Requirement 11.3 (vulnerability scanning) demand the continuous monitoring and scanning infrastructure that a managed security service provides
- ISO 27001:2022: Control 8.16 (Monitoring activities) requires continuous monitoring of networks and systems. Control 5.24 (Information security incident management planning) mandates incident response readiness. Control 8.8 (Management of technical vulnerabilities) requires ongoing vulnerability management
- Rwanda Data Protection Law No 058/2021: Article 30 requires data controllers to implement appropriate technical measures to protect personal data. Continuous monitoring demonstrates ongoing compliance with this obligation
Related services: penetration testing and security awareness training. For the full picture of what we cover, see our guide to penetration testing in Rwanda.
Get a managed security quote
Tell us about your environment and we will scope a proposal within 48 hours. No obligation, no sales pressure.
Request a quote Assess your posture first