Services
One practice. Four pillars. Custody-grade by design.
We operate with the same rigor and standards you’d expect if your data were evidence in a trial.
Our services are organised around the lifecycle of sensitive data: where it is kept, how it is understood, how it is examined, and how it is defended. Every pillar assumes outputs may be reviewed, cited, or contested.
Secure Cloud + Evidence Storage
Custody-grade environments for sensitive and evidentiary data — chain of custody, immutable storage, controlled hand-off to courts, regulators, and auditors.
Explore serviceBest for
- Government and law-enforcement bodies
- Legal and litigation teams managing case data
- Regulators and audit committees
- Enterprises preserving incident or investigation artefacts
Capabilities
- Chain-of-custody design and operation
- WORM / immutable storage architectures
- Secure local network builds (own DC) or hardened cloud tenants
- Controlled hand-off packages for courts, regulators, and auditors
- Access governance, audit logging, and key management
- Lifecycle, retention, and defensible disposition
Advanced AI & Machine Learning
Applied analytics, anomaly detection, eDiscovery classification, computer vision, and GenAI integration — engineered with the auditability that contested and regulated workloads demand.
Explore serviceBest for
- Financial-crime and fraud teams
- Legal review and eDiscovery teams
- Intelligence, investigations, and analytics functions
- Operations leaders deploying GenAI inside regulated workflows
Capabilities
- Applied analytics for client decision-making
- MLOps: model deployment, monitoring, retraining, and governance
- Anomaly detection for fraud and forensic signals
- Document and eDiscovery classification
- Computer vision for image and video analysis
- GenAI integration with guardrails, evaluation, and audit trails
Digital Forensics
Disk, mobile, image, and video forensics. Incident response. Expert-witness work. eDiscovery support — defensible at every step.
Explore serviceBest for
- Litigation teams and external counsel
- Internal investigations and HR-led inquiries
- Regulators and audit committees
- Incident-response stakeholders
Capabilities
- Disk and endpoint forensics
- Mobile device forensics
- Image and video forensic analysis
- Incident response and post-incident reconstruction
- Expert-witness reports and testimony
- eDiscovery acquisition, processing, and review support
Cybersecurity
Advisory and operational — vCISO, managed SOC, penetration testing, incident-response retainers, and compliance for POPIA, ISO 27001, and SOC 2.
Explore serviceBest for
- CISOs and security leaders
- IT leadership at growing organisations
- Risk and compliance owners
- Boards and executives wanting credible assurance
Capabilities
- Virtual CISO (vCISO) advisory
- Managed Security Operations Centre (SOC)
- Penetration testing and red-team exercises
- Incident-response retainers
- POPIA, ISO 27001, and SOC 2 compliance programmes
- Security architecture review and roadmap
Engagement model
How we typically work.
- 01
Confidential enquiry
You outline the situation, sensitivity, and any urgency through the contact form. We review in confidence.
- 02
Qualification & scoping
A short scoping conversation to map the requirement to the right pillar — or combination of pillars — and agree boundaries, custody, and deliverables.
- 03
Scoped engagement
Defined work proceeds with clear milestones, custody-aware handling, and reporting tuned to your stakeholders — technical, legal, and executive.
Not sure which pillar fits?
We will help you scope it.
Many engagements span more than one pillar. Outline the situation and we will map it to the right combination, with clear deliverables and custody from day one.