Our Services

Rakatu – Your Friendly Experts in Cyber-Security

Trust is arguably the most important word in cyber security. The fight against bad actors, hacking and data-leaks is a war on many fronts. Like an army going into battle, you need to be able to trust every member of your cyber security taskforce – and here at Rakatu, we have ensured that sentiment rests at the very core of our range of products and services – as have our industry partners.

In partnership with BeyondTrust – specialists in risk reduction, industry compliance and operational performance (currently trusted by 20,000 customers, including half of the Fortune 100) we are proud to offer a powerful range of road-tested cyber security solutions that have trust built into every aspect of their function.

If you would like to find out more about how these products and services keep some of our planet’s largest organisations cyber-secure, why not Get In Touch?

Privileged Access Management (PAM)

BeyondTrust Privileged Access Management – Go Beyond the Password™

This powerful solution, implemented with our global partners BeyondTrust, offer the broadest set of credential management capabilities in solutions tailored to address your specific risks and use cases. The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users. Includes:

Endpoint Privilege Management – to stop malicious attacks such as malware and ransomware, by assigning just-in-time privileges and controlling applications on Windows, Mac, Unix, Linux, and networked devices – all without hindering end-user productivity.

For more information about this service, contact us today.

Identity Access Management (IAM)

Okta is one trusted platform to secure every identity. More than 9,400 organisations trust Okta’s software and APIs to sign in, authorise, and manage users. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Create secure, delightful experiences quickly by offloading customer identity management to Okta.

 

Team & Permissions Administration
When it comes to managing your help desk, you want to optimize your help desk for success. Implement usable security across your service desk. With granular role and permissions setting, and session policies, you can enforce least privilege and ensure technicians have just the right amount of access needed for their role.

For more information about this service, contact us today.

User Access Management (UAM)

User Access Management (UAM), also known as identity and access management (IAM), is the administration of giving individual users within a system access to the tools they need at the right time. For businesses, this usually includes access to external applications, permissions, and security requirements.

Today, challenges can arise as companies grow, and employees with varying roles and responsibilities increasingly use external enterprise solutions to do their jobs. An identity and access management solution helps manage this by providing a seamless way to manage user identities and access all in one place.

You can also ensure compliance with your organization’s security policies through UAM. Okta’s UAM can enforce company-wide and group-based password policies, with options for complexity.

For more information about this service, contact us today.

Multi Factor Authentication (MFA)

Okta’s Adaptive Multi-Factor Authentication solution makes it easy to give specific employees access to apps and on-prem systems, and require step-up authentication where needed. For an extra layer of security for mobile users, the Okta Adaptive Multi-Factor Authentication solution makes it easy to give specific employees access to apps and on-prem systems, and require step-up authentication where needed. These features, along with SSO, will help your organization reduce the risk of phishing and data breaches.

For more information about this service, contact us today.

Single Sign On (SSO)

The best in breed identity access management platform for your workforce and customers, securing all your critical resources from cloud to ground with Single Sign-On, Adaptive Multi-Factor Authentication, Universal Directory and Life Cycle Management.

With Okta’s Universal Directory, you can create and manage users and groups, and assign permissions based on user attributes using our cloud-based solution. Since Okta connects directly to the leading SaaS apps, your users will be able to access them directly through our Single Sign-On (SSO) solution. That means fewer password resets for IT and a more streamlined workflow for other departments.

For more information about this service, contact us today.

Compliance, security and auditing

BeyondInsight- Centralised Management, Reporting, and Analytics

BeyondInsight is BeyondTrust’s platform for centralized management, reporting, and threat analytics for Privilege Access Management (PAM). It delivers unmatched visibility and control over privileged access activity, simplifies deployment, automates tasks, improves security, and reduces privilege related risks.

Deep reporting and advanced privileged threat analytics correlate data from a variety of BeyondTrust and third-party solutions to uncover critical privilege related threats and identify weak points for hackers to exploit. BeyondInsight also allows for endpoint policy management, granular control, and flexible assignment process with smart rules. BeyondInsight allows your security team to maintain complete and ongoing visibility over all privileges in your environment.

For more information about this service, contact us today.

Privileged account and asset discovery

Password Safe – Discover, manage, audit, and monitor privileged accounts.

Reduce the risk of privileged credential misuse through automated password and session management. Secure, control, monitor and record access to privileged accounts, while leveraging powerful threat analytics and reporting to address compliance requirements. Password Safe enables organizations to achieve complete control and accountability over privileged accounts, providing secure discovery, management, auditing, and monitoring. Among numerous benefits, Password Safe helps your security and audit teams meet and prove regulatory compliance with a secure audit trail, while providing out-of-the-box integration with a comprehensive range of IT security systems.

Password Safe leverages previous investments in common security tools and technologies to enable your team to get up and running quickly, delivering value in days not weeks.

For more information about this service, contact us today.

Global multi-site implementations

No matter where you are, Rakatu can support you. From Sweden to Sikkim, and South Africa to Australia, we have helped our clients secure their systems and data. Don’t let distance make us strangers – you always have a friend in Rakatu (anywhere on the planet).

For more information, contact us today.

Design and implement integrations with 3rd party solutions (IDM, SIEM, Ticketing)

You’ve already invested in solutions for your service desk or support center to more efficiently track issues and end-user requests. Your remote support software should fit seamlessly into your environment and increase your return on those investments.

Remote Support’s pre-built integrations fit into your environment. Sync up with Active Directory, your ITSM tools, third-party authentication solutions, SIEM tools, or password managers to utilize features that will help you get the most out of your IT software. And our open Remote Support API makes any custom integration possible.

For more information about this service, contact us today.

Component installations and configurations

Rakatu offer three levels of consultancy: Architects, Security Consultants and Project Engineers. Our engineers can handle everything from daily “business as usual” activities, platform health checks and troubleshooting system related issues in production environments – to advanced incident & problem diagnosis and resolution, root cause analysis, product configuration, deployment, and testing. Our engineers are well-versed in training and knowledge transfer as well, ensuring that the Rakatu core value “You’ve got a friend in Rakatu” is not just a fancy branding statement, but rather it is a tangible value-add that differentiates the Rakatu offering from our peers. But don’t just take our word for it. Our satisfied clients can testify that Rakatu really care. From time to time, we will highlight some of their success stories here.

For more information about installations, contact us today.

Community-driven model, blending vendor and customer resources, saves time and effort.

At Rakatu, we provide products and services to our partners and clients which focus on the value desired from the security engagements. Our fully collaborative community-driven approach – working with the vendor and client to blend resources – ensures that the key project objectives are at the heart of our strategy…and not bolted-on as an afterthought at the end. Our three “R”s are: “Right skills, Right place, Right time” This working model not only saves our client and project team a great deal of time and effort, it also creates a tremendously positive working atmosphere that brings out the best in every member of the group. Our approach ensures that Rakatu projects are a success for our clients, and a success for the entire vendor partner team.

For more information about the Rakatu approach contact us today.

Solution upgrades, major project cycle deliveries

Rakatu are an engaged and collaborative team of practitioner consultants who have the specialist background and commercial experience to successfully complete the most complex and challenging Cyber Security implementations, on time, every time and on budget. All our engineers are trained to display the “T-shaped” skill profile – combining depth of industry skills and expertise with the ability to collaborate cross-team and apply cross-discipline knowledge. In practice, this means that the kind of ‘left-of-field’ technical stumbling blocks that defeat many engineers who have deep subject knowledge, but lack wider cross-subject skills – are more easily tackled by Rakatu engineers. And, on the occasions when a particularly intractable issue arises, our assigned consultants working with customer implementations are never left to deal with issues on their own – we ensure they receive the right level of support when needed. In house, senior back-office consultants and Senior Solution Architects are always available at the end of the phone, to get the job done.

For more information about the Rakatu way, contact us today.

Onboarding cycles, knowledge transfer

Complex Cyber Security implementations are not for the faint-hearted. Rakatu have a great deal of experience working with our clients’ complex IT infrastructures, both large and small and across countries and cultures. Many of our projects involve helping client employees get to grips with the new technology being installed by Rakatu. We lead, manage and run the scoping and onboarding workshops needed to bring everyone up to speed, and ensure that transitional glitches and initial teething problems are assessed, addressed, and eliminated. While we do this, we abide by our company values – We believe in ourselves and our team abilities, We trust each other’s knowledge and integrity, We know what we know and what we don’t know, We collaborate to maximise our group skills, We care about our client’s needs and our team‘s knowledge growth and personal development. Rakatu – a friend for You.

For more information about the Rakatu way, contact us today.

Vulnerability Remote Support, Privileged Remote Access

Remote Access & Control

When it comes to empowering your IT organisation and simplifying desktop support, nothing beats BeyondTrust Remote Support.

End users can initiate support requests from your support portal, Windows applications, or BeyondTrust Buttons. You can also control remote desktops to start support. And our patented Jump Technology is state-of-the-art for server and IT infrastructure maintenance – IT admins will resolve issues more quickly, improving productivity and end-user satisfaction. Plus, BeyondTrust integrates with your ITSM, help desk, and ticketing solutions. Details about every remote session are automatically tied to the incident record.

The core of remote support is seeing and controlling the remote devices. With this solution, you can see your customer’s screen and fully interact with the remote desktop, troubleshoot issues and fix end systems on or off your corporate network. With robust features like remote control & screen sharing, unattended access, annotations, file sharing, and remote mobile device camera sharing, you can support your end users and their devices as if you were there. Provide support anytime anywhere via the BeyondTrust thick client, browser based console, or mobile app.

For more information about these services, contact us today.

Managing IAM costs, improving IT security

Okta is one trusted platform to secure every identity. More than 9,400 organisations trust Okta’s software and APIs to sign in, authorise, and manage users. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Create secure, delightful experiences quickly by offloading customer identity management to Okta.

For more information about this service, contact us today.

Powerful industry-leading partner network

Rakatu works in partnership with BeyondTrust – currently trusted by 20,000 customers, including half of the Fortune 100. Together we offer a powerful range of road-tested cyber security solutions that have trust built into every aspect of their function. We implement the full range of BeyondTrust Credential Management and Compliance Solutions, including PAM, IAM, UAM, SSO, MFA, PRA, EPM, SRA. Rakatu is an Accredited Partner of BeyondTrust – our engineers are fully certified and accredited (BCIE) with real-life experience in deploying PAM.

Distology are a passionate and highly knowledgeable IT security distributor, representing best of breed vendors and supporting an extensive network of IT resellers across the EMEA region. Distology shares Rakatu’s belief in the power of people as well as technology, with culture and customer service playing a key role in our joint business approach, alongside leading security products. Our joint ethos is based on collaboration, trust and transparency. Rakatu partners with Distology to ensure that our clients benefit from the most innovative and exciting cybersecurity solutions available today.

For more information about our partners contact us today

“Information is a significant component of most organisations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of information security failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.”

– The Institute of Internal Auditors Research Foundation