A 3-page client-ready assessment document. Use this after a discovery call or attach it to follow-up emails. Covers system overview, risk findings and recommendations. Print-ready, branded.
Open Health Check →Two-page overview of De4sec service packages — Starter, Growth and Advanced — plus add-on services with pricing. Use in proposals and sales conversations.
Open Pricing Guide →A clean two-page proposal template. Covers client overview, issues identified, recommended solution, investment table, timeline and signature block. Print-ready, branded.
Open Template →A practical checklist of all eight controls at Maturity Level 1. Use this to self-assess your current posture or prepare for an insurer's questionnaire. Maps each control to the implementation approach.
Read the Guide →How to implement a structured patch management programme without disrupting business operations. Covers Intune policy setup, staging rings, out-of-hours scheduling and compliance reporting.
Read the Guide →What Kenyan businesses need to do to comply with the Kenya Data Protection Act. Covers ODPC registration, privacy policy requirements, data mapping, breach response and technical controls.
Read the Guide →The common vulnerabilities in Daraja API integrations and how to fix them. Covers credential management, webhook validation, reconciliation and fraud detection setup.
Read the Guide →We review your actual environment and tell you exactly what to fix — not a generic checklist.
Open in your browser and print to PDF. Fully branded, print-ready reference guides for your business.
Plain-language guide to ASD Essential Eight controls and Maturity Level 1 compliance.
Download Guide →What insurers require in 2026 — controls, evidence packages, and common claim gaps.
Download Guide →Securing Azure environments — identity, Defender for Cloud, Sentinel, and workload protection.
Download Guide →Securing your M365 tenant — identity, email, devices, DLP, and compliance configuration.
Download Guide →Complete setup checklist — identity, devices, network, backup, and monitoring from day one.
Download Guide →Step-by-step guide for the first 72 hours of a ransomware incident.
Download Guide →3-2-1 backup design, immutable storage, RTO/RPO, and Microsoft 365 backup requirements.
Download Guide →Identity-first Zero Trust — Conditional Access, device compliance, and data protection.
Download Guide →Deploying and managing Microsoft Defender for Endpoint — EDR, ASR rules, and monitoring.
Download Guide →Email authentication, Defender for Office 365, and defending against BEC.
Download Guide →SPF, DKIM, DMARC, Safe Links, Safe Attachments, and BEC prevention.
Download Guide →Microsoft Sentinel, 24/7 monitoring, alert triage, and managed SOC for SMBs.
Download Guide →Prevention, detection, containment, and recovery — the full ransomware defence lifecycle.
Download Guide →IAM, GuardDuty, Security Hub, CloudTrail, and workload security for AWS environments.
Download Guide →Unified identity, secure connectivity, and monitoring across on-premise and cloud.
Download Guide →The full Defender XDR ecosystem — Endpoint, Office 365, Identity, and Cloud Apps.
Download Guide →Active Directory hardening, patch management, network security, and physical controls.
Download Guide →Six-phase IR planning, tabletop exercises, legal obligations, and De4sec IR support.
Download Guide →Network segmentation, endpoint hardening, access control, and PCI DSS for retail and hospitality.
Download Guide →MFA, passkeys, enterprise password management, and the end of password complexity policies.
Download Guide →What proactive managed IT covers and why it costs less than reactive break-fix IT.
Download Guide →Sensitivity labels, DLP policies, Microsoft Purview, retention, and regulatory compliance.
Download Guide →