
We are pioneering Cyber Safety to help your business operate no matter the threats that you face
Appropriate security for your business
You’ve invested, lets use it better
Doing the right things at the right time
Reduce the blast radius of an attack
From consulting, to managed controls and full 24/7 coverage our flexible approach will keep you Cyber Safe.
Expertly managed security controls
Secure and automate your identity management processes
Secure and manage access to your data and services
Supporting >40 security vendors we’re world leaders in integration
Continuous monitoring and incident response
An extension of your security team 24/7
Expert security services with Microsoft 365 & Sentinel
Cyber Asset Attack Surface Management
Our team will work to right size your security approach
We’ll help you qualify your approach to security
When the risk hits the fan
Stay informed with the latest cybersecurity insights, resources and trends with our global experts
Our cybersecurity experts share their knowledge directly with you
Learn how we’ve helped global organisations overcome their challenges
Stop press. Read the latest company and industry updates
Tune in to hear top security experts discuss the latest cyber trends
Meet us at leading industry events
Keeping you informed with our latest cyber reports and eBooks
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Explore the world of Performanta
Meet the executive team and discover our journey

M&A Due Diligence
Right sizing the security posture of your business
Cyber due diligence is now a key factor in closing a successful merger, investment, divestment or acquisition of a new business. Threats of cyber attack effect every business, however when you’re about to invest significant sums in a business a huge part of its value can be directly tied to it’s security posture, and the associated risk.
Policies and Standards
-
Policy Management
-
Generic Policies
-
Specific Policies
People
-
Organisation
-
Process
-
Third Parties
Process
-
Risk Management
-
Organisational Process
-
Technology Process
Technology
-
Identity and Access
-
Network Security
-
Endpoint Security
-
Perimeter Security
-
Encryption & Key Management
-
Security Organization
-
Data/Information Security
Two sides to the cyber due diligence process:
When you’re buying
The target looks like a great deal, they’ve an innovative service, a successful sales team and a sensible approach to expenses, but when it comes to understanding cyber risk you need to look much deeper than the disclosures made during the initial sales process. You need to ensure that the business you’re investing in has a good level of cyber maturity and competency, without knowing this you could be investing into a business with huge inherent risks
When you’re selling
You need to ensure that your divestment has a right-sized security setup, if you aren’t sure then it’s almost certain that your buyer will find this out and at the last minute demand a significant change in the price.
We offer a front-to-back cyber assessment service – Information Security Maturity Assessment (ISMA), this provides you:
-
An organisation-wide view of your information security and privacy posture
-
Identify the gaps within the current environment that require immediate to long-term remediation efforts
-
A risk mitigation approach including technical, procedural and managed service options
-
Assist management to escalate identified potential risks or issues to the Executive or Board
-
Improve information security awareness across the organisations management
-
Indicative costs to implement recommendations
-
High/Medium/Low risk attributed to each finding
We utilize a guided Self-Assessment which will take around 3 weeks to conduct and involving multiple resources from both the end client and Performanta to gather all the required information.
The assessment is performed utilizing interviews with key stakeholders and personell
Depending on the maturity of the organization, Performanta can review more than 160 separate security controls. Performanta will present each control, explain the rationale for it and assess the Client’s maturity against the control.
Where necessary, Performanta will request access to the evidence of the controls. This may include policies, contracts, reports, or process flows.
Performanta will utilise the information to provide a report, comprising:
-
An executive overview of the level of compliance and maturity of the company against industry standards
-
A technical section highlighting key areas that need to be actioned
-
A recommended plan to implement a Privacy Programme if required