Caveo Systems Specialists in Advanced IT Security

Current & Upcoming Events

Periodically, we organise product and educational events for the benefits of our existing and future customers. Most of these events are complimentary (unless stated). Please click on the panels below to find out more details.


Sorry, none scheduled currently. Please check again at later date.
Sorry, no live webinars are currently scheduled. Please check again at later date.
Sorry, none scheduled currently. Please check again at later date.

We also conduct Customised Training. If you would like to organise a customised onsite training, please contact our Sales Dept.

Caveo Systems are thrilled to announce that we have teamed up with Cylance® Inc, the Next Generation Endpoint Security company. Cylance provide a preventative cybersecurity solution that STOPS advanced persistent threats and malware at the endpoint. The company’s solution leverages artificial intelligence (AI) and machine learning to analyse code for malicious traits before it ever executes on the endpoint – most often the weakest part of an organisation’s network.

Brian See, Managing Director at Caveo Systems, says “This is an important step forward in our plans to partner with innovative companies and technologies, particularly in the evolving and exciting field of AI. It means Caveo and Cylance can offer a unique approach – a truly preventative solution that protects customers’ systems and investment in IT, allowing them to focus on what matters: running their business.”
Our Managed Security Services can help you overcome many of the common challenges found in a typical organisation - lack of resources, budgets and IT security expertise. We now offer the following suite of managed services:
  • Endpoint Protection
  • NextGen Firewalls (NGFW)
  • NextGen Network Intrusion Prevention (NIPS)
  • NextGen Security Information and Event Management (SIEM)
For more information, please visit our MSS page here.
Forget the legacy products. They only operate at a fraction of what the NextGen products do.

In a study on the next generation firewalls, significant improvements were achieved:
  • Event response time improved by 84%
  • Security-related downtime dropped by 94%
  • Security incidents per year decreased by 90%
If you want to find out more on next generation firewalls, please read this interesting white paper.

Similarly with the legacy SIEM, the emphasis is for log archival for compliance and on passing audits. In contrast, NextGen SIEM solutions integrate threat intelligence, correlation, analytics, active response, and adaptive technologies that are specifically geared to help incident response. It is capable of mining data at high speed. 78% of the respondent companies were able to detect attacks in minutes with a real time next generation SIEM.

To read more on next generation SIEM, please download this special report.

If you are thinking of buying a new line of firewalls/SIEM, or simply refreshing your legacy lines, we will be happy to undertake a Proof of Concept project on your behalf. Or if you just need a product demo, we will be equally happy to oblige. Give us a call today.
With Avecto's award winning Privilege Guard technology, organizations can now empower all desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems. Privilege Guard can now be fully managed through McAfee ePolicy Orchestrator.
Threats Stats
Source: McAfee Labs 2017 Threats Predictions, November 2016

  • The threat of IoT attacks is real. Cybercriminals will find profitable models, and financially motivated attacks will become widespread.

  • Ransomware will migrate to IoT, as it has proven to be a relatively easy way for criminals to make money.

  • Aggregation points, where data from IoT devices is collected, will be a prime target. Credentials and authentications systems are the weak points.

  • Adversaries have more information about our defenses than we have about their attacks. Attacks can be tested against security defenses with impunity.

  • Data is moving around outside of the corporate perimeter, making it much more vulnerable to unintentional leaks and targeted attacks. It is moving to clouds and personal devices, but also to partners, suppliers, and customers.

  • Antiquated authentication schemes and their control systems will continue to be the weakest technology link in cloud protection. We expect an increase in targeted credential theft and brute-force attacks against administrator accounts.