+27 71 861 9130 info@seraphcs.co.za


Internal Network Vulnerability Assessment

The internal vulnerability assessment assumes that an attacker is already inside the network, therefore this will highlight weaknesses on the internal network and attached devices.

Vulnerability Assessments

An assessment will identify and analyze the security vulnerabilities that might exist in your organization. 

Third Party Risk Assessments

We will assess and report on your third party’s security posture to determine the security risks they are exposing your business to.

Policies and Procedures

We will develop cyber security policies and procedures for your organisation that provides a roadmap for day-to-day operations.

Firewall Review

This includes a manual review of the firewall configuration and rules to ensure they align to the manufacturer’s best practices and your company’s requirements.

Security Controls Assessment

This assessment will compare existing cybersecurity management practices and controls against, those recommended by the CIS Critical Security Controls Version 7.1. The gaps identified will be risk assessed to assist your company in prioritising the remediation thereof.

External Network Penetration Test

The goal of the external vulnerability assessment is to identify weaknesses in the network’s perimeter defences. The scope of this test includes the external IP addresses of you public facing infrastructure.

Web Application Penetration Test

We will simulate real world cyber-attacks against your internet facing applications to identify where a hacker may penetrate.

Wireless Penetration Test

This test aims to identify vulnerabilities and their exploitability in your wireless network.

Cyber Security Awareness Training and Phishing

We offer a cyber security awareness training product which includes a phishing tool. The phishing tool will enable you to simulate a phishing attempt and measure the effectiveness of your trainingbased on who in your organisation was tricked by the phishing email. We will assist you in setting up your first training campaignand phishing attempt.

About Us

We specialize in providing clients with cyber security assessment services that identify risks and pragmatic measures to mitigate them.

Seraph Cyber Security, a level 1 B-BBEE contributor, was established in 2017 to help clients understand their cyber security risks and how to address them most effectively.  It also aims to meet the ever-increasing demand for specialist cyber security skills by employing and growing local talent.

Seraph is the name of a fictitious character from The Matrix Trilogy.  He is described as the personification of a sophisticated authentication protocol which guards the Oracle. After meeting the protagonist, Neo, Seraph explains his purpose, “I protect that which matters most”. Similarly we aim to assist clients in protecting what matters most to them, their information.

Meet the Team

Stanley Vorsatz

CEO, Founder

Laa'iqah Ismail

Cyber Security Analyst

Yusrah Soeker

Cyber Security Analyst


Cybersecurity Analyst

Security Analytics Professional

Certified Information Systems Auditor


Cloud Practitioner