Two Practices. One Partner.

Cyber security as a managed service. Compliance as a parallel discipline. Built for the GCC and Africa.

How we work

Most UAE and African organisations start at zero. We get them onboard with a managed cyber security service that establishes a defensible operational baseline — Microsoft 365 hardened, SOC monitoring live, EDR responding. Compliance & Regulatory Advisory is a separate practice that runs alongside it, picked up when the regulator, the auditor or a client demands it. You can buy one, or both. Most clients begin with managed security and grow into compliance.

Managed Security Operations

End-to-end managed security for organisations of 50–500 users. Three named tiers — Essential Guard, Business Defender and Total Defence — anchored to a Microsoft 365 / Sentinel SIEM foundation and extended with best-of-breed tooling where Microsoft has gaps. 24/7 SOC coverage at Tier 2 and above, full EDR/XDR, identity protection, email defence and vulnerability management. Tier 3 adds Microsoft E5, Zero Trust network access, data governance, dark web monitoring, quarterly red team exercises and a dedicated virtual CISO. The growth path is the offering: start where you need to, scale as the business or the regulator demands.

Discuss Your Requirements
Tier 1 — Essential Guard · 50–150 users · Business-hours SOC
Tier 2 — Business Defender · 100–300 users · 24/7 SOC
Tier 3 — Total Defence · 150–500 users · 24/7 SOC and dedicated vCISO
15-minute first analyst touch on critical alerts — Tier 3
Free Vulnerability & Penetration Assessment for clients under 300 users
Microsoft 365 hardening, EDR/XDR, identity protection and email defence

Virtual CISO

A senior Chief Information Security Officer embedded in your organisation, owning your security strategy, compliance roadmap, board reporting, vendor management, and incident response leadership — at a fraction of the cost of a full-time hire. Available as a standalone retainer at three engagement levels (Advisory, Operational, Embedded), or included as standard with Total Defence (Tier 3) of our managed service.

Speak to a vCISO
Security strategy and roadmap
Board and executive reporting
Compliance programme leadership
Vendor and third-party risk management
Incident response coordination
Three retainer levels: Advisory, Operational, Embedded

Compliance & Regulatory Advisory

Compliance & Regulatory Advisory is a separate practice from our managed cyber security service. The managed service produces compliance posture reports as a by-product of operations. This practice runs the formal compliance programme itself: gap analysis, remediation, audit preparation, certification. We lead with the regulators that actually govern you — DESC ISR, NABIDH, ADHICS v2.0, ADGM DPR, DIFC DPL, CBUAE, NESA, SAMA, NCA ECC, UAE PDPL — and add ISO 27001, SOC 2, GDPR, NIST CSF and other international frameworks where your structure or client base requires.

Start Your Compliance Journey
Framework
Name
Region
DESC ISR
Information Security Regulation (Dubai)
UAE
ADHICS v2.0
Abu Dhabi Healthcare Information & Cyber Security
UAE
ADGM DPR
Data Protection Regulations
UAE
DIFC DPL
Data Protection Law
UAE
NABIDH
Dubai Health Authority Health Data Standard
UAE
CBUAE
Central Bank of UAE Cyber & Resilience Framework
UAE
NESA
National Electronic Security Authority
UAE
UAE PDPL
Personal Data Protection Law
UAE
SAMA
Saudi Arabian Monetary Authority
KSA
NCA ECC
Essential Cybersecurity Controls
KSA
ISO 27001
Information Security Management
Global
ISO 27017
Cloud Security Controls
Global

Cyber Threat Intelligence

Intelligence subscriptions adapted from real-world maritime and security operations across the Gulf and Africa. Sector-specific monthly INTSUM briefings, threat-actor profiles, dark web monitoring, and board-ready executive summaries — delivered in Arabic, English, and French. Coverage spans nation-state activity, sector-specific threats, and Gulf and African threat actors.

Subscribe to Intelligence
Monthly INTSUM Briefings (sector-specific)
Threat actor profiles (Gulf and Africa focus)
Dark web monitoring and alerting
Executive threat summaries (board-ready)
Incident-triggered flash reports

Incident Response & Digital Forensics

When a breach occurs, response speed determines the outcome. Tier 3 clients get a 15-minute first analyst touch on critical alerts; the IR retainer guarantees a 1-hour senior advisor mobilisation. Ransomware containment, data breach investigation, regulatory notification support, digital forensics, evidence preservation, and post-incident hardening — delivered virtually with the option of on-site deployment for critical incidents.

Secure Your Retainer
0–15 min

First analyst touch on critical alerts (Tier 3 SOC)

0–1 hour

Senior advisor mobilised under IR retainer

1–4 hours

Full IR team mobilised, containment initiated

4–24 hours

Forensic investigation underway, regulatory notification drafted

24–72 hours

Root cause analysis, remediation plan delivered

AI Security & Governance

As organisations adopt AI, new attack surfaces emerge. We assess AI system integrity, test for adversarial vulnerabilities, evaluate training-data poisoning risks, and align AI governance with the UAE AI Policy and EU AI Act. From LLM security testing to AI regulatory compliance — practical advisory for boards that need to deploy AI without inheriting risk they cannot govern.

Assess Your AI Risk
AI risk assessment and governance framework
LLM security testing and prompt injection assessment
Training data integrity verification
Adversarial attack simulation
UAE AI Policy alignment
EU AI Act compliance advisory

The Risk-Free Way to Start

Complimentary Vulnerability & Penetration Assessment for clients up to 300 users.

A VAPT is a comprehensive security evaluation that identifies weaknesses across your internal and external network, validates exploitable risks, and delivers a prioritised remediation roadmap. We show you the risk before asking you to buy. Comparable engagements from other providers are typically billed at a substantial fee.

AED 0
Cost to qualifying clients
Internal + external
Network coverage
Up to 300
User count to qualify

Command

The platform underneath the practice.

Command is the proprietary client-facing platform that consolidates security posture, compliance status, licence intelligence and a board-ready report into a single view. Designed to be opened before a board meeting and closed in three minutes. Hosted in the UAE.

See Command

Your compliance risk is visible. Is your protection?

Request Your Free Assessment