Three Pillar Managed Security

South African businesses face relentless cyber threats — ransomware, phishing, zero-day exploits — yet most lack the resources to build an in-house security operations centre. OAS's Three Pillar Managed Security framework solves this. We combine three best-of-breed technologies into a unified managed service: SentinelOne (Protect), N-able RMM (Detect), and Cove Data Protection (Recover). One monthly subscription. One management console. Complete defence-in-depth security delivered by a trusted partner with over 40 years of enterprise IT experience.

Protect. Detect. Recover.

Traditional antivirus is no longer enough. Cyber threats have evolved — ransomware encrypts entire networks in minutes, fileless attacks bypass signature-based detection, and phishing campaigns target your people around the clock. Point solutions that address only one layer of defence leave dangerous gaps.

OAS's Three Pillar Managed Security framework takes a different approach. We combine three enterprise-grade technologies into one integrated, managed service — covering every stage of a security incident from prevention through recovery.

No gaps. No blind spots. No scrambling when an incident occurs.

The Three Pillars

Pillar 1 — Protect (SentinelOne Singularity)

Your first line of defence: autonomous endpoint detection and response.

SentinelOne uses behavioural AI — not outdated signature databases — to detect and neutralise threats in real time. Every endpoint in your organisation is protected: workstations, laptops, servers, and mobile devices.

What sets SentinelOne apart:

- Autonomous response — threats are killed, quarantined, and remediated in seconds, without waiting for a human analyst - Ransomware rollback — patented capability reverses ransomware encryption automatically, restoring your files to their pre-attack state - Behavioural AI detection — identifies zero-day exploits, fileless attacks, and novel ransomware that signature-based antivirus misses entirely - Storyline technology — reconstructs the full attack narrative across processes, files, and network events, giving your team complete forensic visibility - Offline protection — on-device AI operates fully without cloud connectivity, protecting remote sites and mobile workers - Multi-platform coverage — Windows, macOS, Linux, Kubernetes, and cloud workloads

SentinelOne is a Leader in the 2025 Gartner Magic Quadrant for Endpoint Protection Platforms — for the fifth consecutive year.

Learn more about our SentinelOne MSSP partnership

Pillar 2 — Detect (N-able N-central RMM)

Your eyes and ears: 24/7 monitoring, patch management, and automation.

N-able N-central provides continuous visibility across every endpoint, server, and network device in your environment. OAS uses this platform to detect anomalies, automate routine maintenance, and ensure your systems stay hardened against attack.

What N-able delivers:

- 24/7 monitoring — continuous endpoint and server monitoring with automated alerting. Issues are identified before they affect your operations - OS patch management — every Microsoft update class deployed automatically, plus macOS and Linux support. Your systems stay current without manual intervention - Third-party patching — automated patches for over 100 business applications (Chrome, Adobe, Java, Zoom, Teams, and more), in-house tested and verified before deployment - 700+ automation recipes — pre-built scripts proven across millions of managed devices, covering Windows, Linux, macOS, and third-party applications - Network discovery and topology — multi-protocol device discovery with visual network maps. Unmanaged devices and shadow IT are identified and addressed - Unified console — SentinelOne and Cove are both managed from within N-central, giving OAS a single pane of glass across your entire security stack

N-central is recognised on the 2025 Gartner Magic Quadrant for Endpoint Management Tools.

Learn more about our N-able partnership

Pillar 3 — Recover (Cove Data Protection)

Your safety net: cloud-first backup and disaster recovery.

When prevention and detection are not enough, Cove ensures your data can be restored — quickly, completely, and from ransomware-proof cloud storage. No on-site appliances. No backup tapes. No hardware to maintain.

What Cove provides:

- Direct-to-cloud backup — servers, workstations, and Microsoft 365 data backed up to N-able's private cloud. No on-site appliances required - TrueDelta technology — block-level change tracking produces incremental backups up to 60x smaller than traditional solutions. More restore points, faster recovery - Microsoft 365 backup — Exchange backed up six times per day, SharePoint and Teams four times per day. Granular restore of individual emails, files, and conversations - Ransomware-resilient storage — backups are AES-256 encrypted, immutable, and isolated. Attackers cannot encrypt or delete your cloud-stored backups - Multiple recovery methods — file-level restore, bare-metal recovery, virtual recovery (Hyper-V, VMware, Azure), and Standby Image for near-instant failover - Automated Recovery Testing — scheduled every 14 or 30 days with AI-verified boot confirmation. Documented proof that your backups actually work — critical for compliance audits - Data sovereignty — 30 data centre locations across five continents. All SA client data stored within South African borders

Learn more about our Cove Data Protection partnership

How the Three Pillars Work Together

The real power of this framework is integration. Each pillar reinforces the others. Here is what happens when a ransomware attack targets your organisation:

1. SentinelOne detects the malicious behaviour and autonomously kills the process, quarantining the threat in seconds 2. N-able RMM alerts the OAS team with full device context — user, location, network segment, and affected systems 3. OAS investigates using SentinelOne's Storyline technology, mapping the full attack narrative from initial entry to attempted encryption 4. SentinelOne rolls back any encrypted files to their pre-attack state using patented rollback technology 5. If rollback is insufficient, Cove restores affected systems from immutable cloud backup — clean, verified, ransomware-free 6. OAS delivers a full incident report with root cause analysis, scope of impact, and recommendations to prevent recurrence

Two independent recovery paths. SentinelOne rollback for immediate file restoration. Cove backup for full system recovery. Your organisation recovers — whether the attack is contained in seconds or requires a complete restore.

Compliance Built In

The Three Pillar framework addresses technical controls required by South Africa's key regulatory frameworks:

- POPIA — endpoint protection (Section 19 security safeguards), monitoring and audit trails, data protection and retention - FSCA Joint Standard — cybersecurity governance, vulnerability management, incident reporting, compliance dashboards via Splunk integration - PCI-DSS v4.0 — endpoint protection, patch management, log monitoring, network segmentation, data protection - HIPAA — access controls, audit logging, encrypted backup with configurable retention

Automated Recovery Testing provides documented, verifiable proof of recoverability — evidence that auditors specifically look for.

Packaging Options

Three Pillar Standard

SentinelOne EDR + N-able RMM + Cove Backup — the core managed security offering. Per-endpoint monthly subscription covering all three technologies, deployed and managed by OAS.

Three Pillar Aluminium

Everything in Standard, plus SOC access through managed detection and response. For organisations that require 24/7 human-monitored security operations with dedicated threat hunting and incident response.

Why OAS

  • 40+ years of enterprise IT experience across Southern Africa
  • Citrix Platinum Partner — our virtualisation expertise complements our security offering
  • Proven track record serving healthcare, financial services, government, and professional services
  • Single monthly subscription — no capital expenditure, no multi-vendor complexity
  • South African data sovereignty — all data remains within SA borders
  • Scalable — from a 20-person firm to a 2,000-endpoint enterprise

Your Security Is Only as Strong as Your Weakest Layer

Antivirus alone leaves you exposed. Monitoring without backup leaves you unable to recover. Backup without protection means you are always restoring. The Three Pillar framework closes every gap.

OAS's free security assessment evaluates your current defences and shows you exactly where the gaps are — and how the Three Pillar framework addresses them.

Ready to Get Started?

Talk to our team about Three Pillar Managed Security for your organisation.