FAQ
Frequently asked questions.
Answers to common questions about our pillars, how we work across them, and the kinds of matters we are built to support.
-
01 What does Checkall Analytics do?
We are one integrated practice across secure cloud and evidence storage, advanced AI and machine learning, digital forensics, and cybersecurity — built for organisations whose data has to be intelligent, defensible, and secure at the same time.
-
02 Who are your services for?
Government and law-enforcement and legal/litigation teams lead our engagement mix, alongside enterprise IT and CISOs, financial services, insurance, telcos, and healthcare. The common thread is sensitive data with real consequences attached.
-
03 Do I have to engage on all four pillars?
No. Each pillar runs as a stand-alone engagement. The compounding value is real when they run together, but plenty of clients start with one — typically secure storage, an AI build, a forensic matter, or a cybersecurity programme — and expand from there.
-
04 Where do you operate?
Globally. We deliver remotely where appropriate and on-site where the matter requires it.
-
05 Do you host data, or do we?
Both options are supported. We design and operate hardened cloud tenants where speed and elasticity matter, and secure local network setups (own DC) where on-premises custody is required. The custody guarantees are the same either way.
-
06 Can your AI work be defended in regulated contexts?
That is the design centre. Every prediction or generation is paired with the inputs, model version, and evaluation context that produced it — so findings can survive audit, regulator engagement, or contested review.
-
07 Do you provide expert-witness testimony?
Yes. Our forensic practice delivers expert reports and testimony where matters reach that stage, with methodology documented for cross-examination from day one.
-
08 What does your cybersecurity practice cover?
vCISO advisory, managed SOC, penetration testing, incident-response retainers, and compliance work for POPIA, ISO 27001, and SOC 2 — with direct integration to our forensic and custody capabilities when prevention fails.
-
09 Do you publish case studies?
Most engagements are sensitive. Our use-cases page presents idealised, composite scenarios that illustrate how the pillars combine in practice. Where individual matters are approved for publication and properly anonymised, they will be added alongside.
-
10 How is confidentiality handled?
Sensitive matters require careful handling. Engagements run under specific confidentiality terms agreed during scoping, and our internal practices reflect the custody discipline we deliver to clients.
-
11 Do you provide legal advice?
No. We are a technical practice, not a law firm. We provide secure infrastructure, defensible analysis, forensic findings, and security operations that support legal, compliance, and regulatory decision-making.
-
12 What should I include in the contact form?
Your organisation, the nature of the situation, the service(s) you think apply, your region, and any relevant timing or urgency. The next step is typically a short qualification conversation.
Still have questions?
Outline your situation in confidence.
If your question is specific to your organisation, the fastest path is a short qualification conversation.