# Cybersecurity & Endpoint Protection

Enterprise-grade endpoint protection and managed security for South African businesses. OAS delivers the "Protect" pillar of our Three Pillar Managed Security framework — autonomous threat detection, containment, and response powered by SentinelOne's AI-driven Singularity XDR platform.

The Three Pillar Managed Security Framework

Traditional cybersecurity treats protection, monitoring, and recovery as separate concerns. OAS's Three Pillar framework integrates all three into a single managed service — because a security incident does not pause while you coordinate between vendors.

Pillar 1 — Protect (SentinelOne EDR/XDR)

SentinelOne's Singularity platform uses behavioural AI to detect and neutralise threats in real time. Unlike traditional antivirus that relies on known signatures, SentinelOne identifies malicious behaviour patterns — catching zero-day exploits, fileless attacks, and novel ransomware variants that signature-based tools miss entirely.

  • Autonomous response — threats are contained and remediated without human intervention, reducing response time from hours to seconds
  • Ransomware rollback — encrypted files are restored to their pre-attack state using SentinelOne's patented rollback capability
  • Purple AI — natural-language threat hunting enables analysts to investigate security events conversationally, multiplying the effectiveness of lean security teams
  • Storyline technology — reconstructs the full attack narrative across processes, files, and network events for complete forensic visibility

SentinelOne is recognised as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for the fifth consecutive year.

Learn more about our SentinelOne MSSP partnership

Pillar 2 — Detect (N-able RMM)

SentinelOne stops threats at the endpoint. N-able RMM provides the broader monitoring layer that ensures nothing falls through the gaps.

  • 24/7 infrastructure monitoring across all endpoints — servers, workstations, and network devices
  • Automated patch management for Windows, macOS, Linux, and 100+ third-party applications — closing the vulnerabilities that attackers exploit
  • Anomaly detection and alerting — unusual behaviour triggers immediate investigation by OAS's security team
  • 650+ automation scripts — routine remediation tasks execute automatically, ensuring consistent response across your entire environment

Pillar 3 — Recover (Cove Data Protection)

When prevention and detection are not enough, Cove ensures your data survives.

  • Cloud-first backups — direct-to-cloud architecture eliminates on-site appliance costs and complexity
  • Immutable and encrypted — backups are held out of ransomware's reach. Attackers cannot encrypt or delete cloud-stored data
  • Granular recovery — restore individual files, full servers, or Microsoft 365 mailboxes, SharePoint libraries, and Teams conversations
  • 60x smaller increments — TrueDelta technology enables more frequent backup points and tighter recovery time objectives

How the Three Pillars Respond to a Ransomware Attack

When ransomware strikes, every second counts. Here is how the Three Pillar framework responds:

  1. SentinelOne detects the malicious behaviour and automatically contains the affected endpoint — isolating it from the network in seconds
  2. N-able RMM provides context — device inventory, recent changes, and network connections help OAS analysts understand the scope of the incident
  3. SentinelOne rolls back encrypted files to their pre-attack state using Volume Shadow Copy integration
  4. If rollback is insufficient, Cove restores from the most recent immutable cloud backup — bare-metal, file-level, or virtual recovery
  5. OAS delivers an incident report with root cause analysis, remediation steps taken, and recommendations to prevent recurrence

The entire response — from detection to recovery — is managed by OAS. Your team stays focused on business operations.

Compliance-Ready Security

The Three Pillar framework addresses technical controls required by South Africa's regulatory landscape:

  • POPIA — endpoint protection, access controls, and encrypted backups satisfy Section 19 security safeguard requirements
  • PCI-DSS — continuous monitoring, patch management, and incident response align with cardholder data environment protection standards
  • HIPAA — encrypted backups, access logging, and automated response address technical safeguard requirements for healthcare organisations
  • FSCA Joint Standard — information security management controls aligned to the Financial Sector Conduct Authority's cybersecurity requirements

Zero Trust Architecture

OAS extends the Three Pillar framework with Zero Trust network access through Citrix Secure Private Access and NetScaler. Every user, device, and application is verified before access is granted — regardless of location.

  • Citrix Secure Private Access — zero-trust access to web and SaaS applications with session recording and DLP
  • NetScaler Web Application Firewall — protects internet-facing applications from OWASP Top 10 threats
  • Micro-segmentation — limit lateral movement so a compromised endpoint cannot reach critical systems

One Framework. Three Layers of Defence.

OAS's Three Pillar Managed Security is sold as a per-endpoint monthly subscription — one price, one partner, complete protection. No separate vendors, no integration gaps, no finger-pointing when something goes wrong.

Request a Demo

Explore

Explore

Ready to Get Started?

Talk to our team about how Cybersecurity can strengthen your organisation's security posture.