Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
BY MANDATE

POPI

One of the most disruptive compliance events for businesses in South African history, the Protection of Personal Information (POPI) Act seeks to regulate the processing of personal information and data breach notification.

"South Africa's GDPR"

The Protection of Personal Information (POPI) Act brings South Africa in line with existing data protection laws around the world, aiming to protect PII, enforce an individual's right to privacy and provide guidelines for lawfully processing such information and notifying regulators and data holders in the event of a breach. Trustwave can help elevate your security posture and streamline your compliance process.


POPI: Fast Facts and Consequences

Checkmark_Red_Dot_White_Icon

POPI applies to any company in South Africa that processes personal information.

Checkmark_Red_Dot_White_Icon

Once an information protection regulator has been appointed to administer the law, companies will have 12 months to comply.

Checkmark_Red_Dot_White_Icon

Once an information protection regulator has been appointed to administer the law, companies will have 12 months to comply.

Checkmark_Red_Dot_White_Icon

Violations may also lead to enforcement notices requiring non-compliant companies to stop processing personal information.

Expertise. Intelligence. Customized.


download-2

Tailored for Your Organization

Our compliance assessment involves various policies, procedures and practices which we evaluate through documentation review, interviews, facilities inspection, controls assessment and examination of your current security architecture.

tw-call-center-person

Extensive and Experienced Support

Our team of seasoned compliance support analysts are available 24x7x365 to aid businesses of all sizes, from the largest enterprise to the sole proprietor.

tw-compliance-management

Security Portfolio Enables Compliance

If your security stance is mature, compliance to POPI will be a natural byproduct. Our suite of security products and managed services help protect critical assets and combats advanced threats.

tw-spiderlabs-alt

Supported by Industry-Leading Threat Intelligence

Our elite SpiderLabs team and federated global network of security operations centers produce unique threat intelligence that helps us prevent, monitor and respond to security events.

Services

POPI compliance should be a front-burner issue for your organization. As you embark on your compliance journey, we can offer custom assessments to get you ready and technologies and services to help get and keep you in line with the rules.


Managed Security Services

Augment your existing staff with managed security services that evolve processes, elevate data protection strategies and advance the way you manage threats. With deep expertise and unmatched threat intelligence, we will design a program that supports your security and POPI demands, while giving you complete visibility and control.

Managed Security Testing

Receive on-demand, precision-based penetration testing with just a few clicks of a mouse. With a subscription, you can log in to the portal and schedule testing of databases, networks and applications.

Enterprise-Grade Data Security

Identify security lapses and ensure your information repositories stay protected from internal gaffes and nefarious attackers, while maintaining compliance with POPI.

Incident Readiness and Response

Prepare for and react to security incidents and breaches with the help of our SpiderLabs team, who identifies root causes of incidents and communicates responses in a way your team and management can understand.