De Witt Tromp

Head of Information Security and Compliance

XON

Information Security
+27 11 237 4500

XON INFORMATION SECURITY

XON is a leader in the information security space, we have unique methodologies and proprietary tools to assist in identifying potential enterprise risk and provide guidance on addressing shortfalls and risk in a cost effective practical manner. We have expertise in a number of technologies and provide guidance on compensating controls to secure your information, infrastructure while assisting with compliance requirements and aligning to your business objectives. We take the approach of enhancing security while protecting the customer's current investments. We have a number of highly skilled architects and engineers to deliver the highest standard in vendor approved deployments.

Some highlights of what we have accomplished in the last few years.

  • Symantec Highest Growth Partner Award 2014
  • Symantec Most Valued Player Award 2014
  • Largest successful Endpoint Security deployment in Africa
  • Largest successful Control Compliance suite implementation in Africa.
  • 15 dedicated information security engineers and consultants: more than any other Symantec partner in South Africa
  • Symantec platinum partner
  • Symantec Endpoint management specialisation Expert status
  • Symantec Endpoint security Expert status
  • Symantec Data security Expert status
  • Over 150 information security accreditations
  • Over 80 years combined skills and experience in Symantec Information Security solutions: More than any other Symantec security partner
  • Most experienced partner in deploying Encryption solutions, with a number of successful implementations within the last year
  • Certified information security manager and CISSP resources.

Endpoints

  • Security
    • Laptops and Desktops
      • Endpoint Security
      • Whole disk encryption
      • Data Loss Prevention Endpoints
      • Advanced Threat detection
      • Critical System Protection
    • Mobile devices
      • Mobile Security
      • Encryption
      • Data loss prevention
      • Authentication
  • Endpoint management
    • Laptops and Desktops
      • Patch management
      • Software management
      • Remote deployment/management
      • Application and Device Control
    • Mobile devices
      • Mobile device management
      • Application management
  • Assessments and services
    • Malware assessment
    • Vulnerability Assessment
    • Endpoint Security Healthcheck
    • Compromise assessment

Servers

  • Security
    • Data Centre security for VM
    • Data Centre security Serves
    • Control Compliance Suite for Servers
    • DLP storage
    • Storage Encryption
  • Endpoint management
    • Patch management
    • Software management
    • Real time monitoring
  • Assessments and services
    • Controls assessment

Applications and Databases

  • Security
    • Vulnerability management for Databases
    • Virtual Patching for Databases
    • Database activity monitoring
    • Control Compliance Suite for Databases and Applications
  • Management
    • Application metering
  • Assessments and services
    • Controls assessment