Enquire

Services

One practice. Four pillars. Custody-grade by design.

We operate with the same rigor and standards you’d expect if your data were evidence in a trial.

Our services are organised around the lifecycle of sensitive data: where it is kept, how it is understood, how it is examined, and how it is defended. Every pillar assumes outputs may be reviewed, cited, or contested.

Secure Cloud + Evidence Storage

Custody-grade environments for sensitive and evidentiary data — chain of custody, immutable storage, controlled hand-off to courts, regulators, and auditors.

Explore service

Best for

  • Government and law-enforcement bodies
  • Legal and litigation teams managing case data
  • Regulators and audit committees
  • Enterprises preserving incident or investigation artefacts

Capabilities

  • Chain-of-custody design and operation
  • WORM / immutable storage architectures
  • Secure local network builds (own DC) or hardened cloud tenants
  • Controlled hand-off packages for courts, regulators, and auditors
  • Access governance, audit logging, and key management
  • Lifecycle, retention, and defensible disposition

Advanced AI & Machine Learning

Applied analytics, anomaly detection, eDiscovery classification, computer vision, and GenAI integration — engineered with the auditability that contested and regulated workloads demand.

Explore service

Best for

  • Financial-crime and fraud teams
  • Legal review and eDiscovery teams
  • Intelligence, investigations, and analytics functions
  • Operations leaders deploying GenAI inside regulated workflows

Capabilities

  • Applied analytics for client decision-making
  • MLOps: model deployment, monitoring, retraining, and governance
  • Anomaly detection for fraud and forensic signals
  • Document and eDiscovery classification
  • Computer vision for image and video analysis
  • GenAI integration with guardrails, evaluation, and audit trails

Digital Forensics

Disk, mobile, image, and video forensics. Incident response. Expert-witness work. eDiscovery support — defensible at every step.

Explore service

Best for

  • Litigation teams and external counsel
  • Internal investigations and HR-led inquiries
  • Regulators and audit committees
  • Incident-response stakeholders

Capabilities

  • Disk and endpoint forensics
  • Mobile device forensics
  • Image and video forensic analysis
  • Incident response and post-incident reconstruction
  • Expert-witness reports and testimony
  • eDiscovery acquisition, processing, and review support

Cybersecurity

Advisory and operational — vCISO, managed SOC, penetration testing, incident-response retainers, and compliance for POPIA, ISO 27001, and SOC 2.

Explore service

Best for

  • CISOs and security leaders
  • IT leadership at growing organisations
  • Risk and compliance owners
  • Boards and executives wanting credible assurance

Capabilities

  • Virtual CISO (vCISO) advisory
  • Managed Security Operations Centre (SOC)
  • Penetration testing and red-team exercises
  • Incident-response retainers
  • POPIA, ISO 27001, and SOC 2 compliance programmes
  • Security architecture review and roadmap

Engagement model

How we typically work.

  1. 01

    Confidential enquiry

    You outline the situation, sensitivity, and any urgency through the contact form. We review in confidence.

  2. 02

    Qualification & scoping

    A short scoping conversation to map the requirement to the right pillar — or combination of pillars — and agree boundaries, custody, and deliverables.

  3. 03

    Scoped engagement

    Defined work proceeds with clear milestones, custody-aware handling, and reporting tuned to your stakeholders — technical, legal, and executive.

Not sure which pillar fits?

We will help you scope it.

Many engagements span more than one pillar. Outline the situation and we will map it to the right combination, with clear deliverables and custody from day one.