Three Pillar Managed Security
One framework. Three layers of defence. OAS's Three Pillar Managed Security combines autonomous endpoint protection, 24/7 monitoring, and ransomware-proof backup into a single managed service.
Protect. Detect. Recover.
Traditional antivirus is no longer enough. Cyber threats have evolved — ransomware encrypts entire networks in minutes, fileless attacks bypass signature-based detection, and phishing campaigns target your people around the clock. Point solutions that address only one layer of defence leave dangerous gaps.
OAS's Three Pillar Managed Security framework takes a different approach. We combine three enterprise-grade technologies into one integrated, managed service — covering every stage of a security incident from prevention through recovery.
No gaps. No blind spots. No scrambling when an incident occurs.
The Three Pillars
Protect
SentinelOne Singularity
Your first line of defence: autonomous endpoint detection and response.
- Autonomous response — threats are killed, quarantined, and remediated in seconds, without waiting for a human analyst
- Ransomware rollback — patented capability reverses ransomware encryption automatically, restoring your files to their pre-attack state
- Behavioural AI detection — identifies zero-day exploits, fileless attacks, and novel ransomware that signature-based antivirus misses entirely
- Storyline technology — reconstructs the full attack narrative across processes, files, and network events, giving your team complete forensic visibility
- Offline protection — on-device AI operates fully without cloud connectivity, protecting remote sites and mobile workers
- Multi-platform coverage — Windows, macOS, Linux, Kubernetes, and cloud workloads
SentinelOne is a Leader in the 2025 Gartner Magic Quadrant for Endpoint Protection Platforms — for the fifth consecutive year.
Detect
N-able N-central RMM
Your eyes and ears: 24/7 monitoring, patch management, and automation.
- 24/7 monitoring — continuous endpoint and server monitoring with automated alerting. Issues are identified before they affect your operations
- OS patch management — every Microsoft update class deployed automatically, plus macOS and Linux support. Your systems stay current without manual intervention
- Third-party patching — automated patches for over 100 business applications (Chrome, Adobe, Java, Zoom, Teams, and more), in-house tested and verified before deployment
- 700+ automation recipes — pre-built scripts proven across millions of managed devices, covering Windows, Linux, macOS, and third-party applications
- Network discovery and topology — multi-protocol device discovery with visual network maps. Unmanaged devices and shadow IT are identified and addressed
- Unified console — SentinelOne and Cove are both managed from within N-central, giving OAS a single pane of glass across your entire security stack
N-central is recognised on the 2025 Gartner Magic Quadrant for Endpoint Management Tools.
Recover
Cove Data Protection
Your safety net: cloud-first backup and disaster recovery.
- Direct-to-cloud backup — servers, workstations, and Microsoft 365 data backed up to N-able's private cloud. No on-site appliances required
- TrueDelta technology — block-level change tracking produces incremental backups up to 60x smaller than traditional solutions. More restore points, faster recovery
- Microsoft 365 backup — Exchange backed up six times per day, SharePoint and Teams four times per day. Granular restore of individual emails, files, and conversations
- Ransomware-resilient storage — backups are AES-256 encrypted, immutable, and isolated. Attackers cannot encrypt or delete your cloud-stored backups
- Multiple recovery methods — file-level restore, bare-metal recovery, virtual recovery (Hyper-V, VMware, Azure), and Standby Image for near-instant failover
- Automated Recovery Testing — scheduled every 14 or 30 days with AI-verified boot confirmation. Documented proof that your backups actually work — critical for compliance audits
- Data sovereignty — 30 data centre locations across five continents. All SA client data stored within South African borders
How the Three Pillars Work Together
The real power of this framework is integration. Each pillar reinforces the others. Here is what happens when a ransomware attack targets your organisation:
SentinelOne detects
the malicious behaviour and autonomously kills the process, quarantining the threat in seconds
N-able RMM alerts
the OAS team with full device context — user, location, network segment, and affected systems
OAS investigates
using SentinelOne's Storyline technology, mapping the full attack narrative from initial entry to attempted encryption
SentinelOne rolls back
any encrypted files to their pre-attack state using patented rollback technology
If rollback is insufficient
Cove restores affected systems from immutable cloud backup — clean, verified, ransomware-free
OAS delivers
a full incident report with root cause analysis, scope of impact, and recommendations to prevent recurrence
Two independent recovery paths. SentinelOne rollback for immediate file restoration. Cove backup for full system recovery. Your organisation recovers — whether the attack is contained in seconds or requires a complete restore.
Compliance Built In
The Three Pillar framework addresses technical controls required by South Africa's key regulatory frameworks:
POPIA
Endpoint protection (Section 19 security safeguards), monitoring and audit trails, data protection and retention
FSCA Joint Standard
Cybersecurity governance, vulnerability management, incident reporting, compliance dashboards via Splunk integration
PCI-DSS v4.0
Endpoint protection, patch management, log monitoring, network segmentation, data protection
HIPAA
Access controls, audit logging, encrypted backup with configurable retention
Automated Recovery Testing provides documented, verifiable proof of recoverability — evidence that auditors specifically look for.
Packaging Options
Three Pillar Standard
SentinelOne EDR + N-able RMM + Cove Backup — the core managed security offering. Per-endpoint monthly subscription covering all three technologies, deployed and managed by OAS.
Three Pillar Aluminium
Everything in Standard, plus SOC access through managed detection and response. For organisations that require 24/7 human-monitored security operations with dedicated threat hunting and incident response.