Services

Insights

Selcom Wireless Tanzania | Managed Services

Problem

Selcom Wireless Tanzania is Tanzania’s largest payment aggregator (cross-segment financial and payment services provider), providing services in Tanzania and across Sub-Saharan Africa. Selcom has a full range of electronic payment products and services focusing on digital, card and cardless processing services. Selcom has its own merchandise network of more than 10,000 Point-of-Sale (POS) terminals across the country, and it also provides a payment gateway and processes transactions on behalf of 41 banks and 6 telecommunications operators in Tanzania. It’s connectivity, and multiple services with multiple entities has risked its security posture. Compliance and regulatory checks were not enough. Selcom needed to stay ahead with advanced, innovative security solutions that cover all its systems. Selcom wanted to build a continuous, sustainable response to ongoing threats and create strong processes with the most advanced security tools on the market, to maintain its security quality and standards of services.

Services

Development of security modules for all payment applications on Selcom’s infrastructure

Yearly continuous comprehensive security assessments

Cryptography services

POS terminal hardware integrity check and full security review

Engagement details

Minimize time spent chasing false positives while ensuring a negligible rate of false negatives.
Staying ahead of emerging threats with a comprehensive knowledge base of benchmarks and vulnerabilities, continuously updated by Magilatech’s leading security experts.
Connect risk controls to KPIs to measure how well Magilatech’s Cybersecurity Lab is protecting the business.
Focus on the data that is most important based on Selcom’s specific business needs.
Development of Payment APIs to enable clients to securely utilise Selcom services from its Core Banking Platform.
Annual Vulnerability Assessment & Penetration Testing (VAPT) services.
Cryptography services.
POS Terminal Hardware integrity check and full security review.

Benefits

Continually monitor and assess the complete scope of infrastructure assets.
Perform thorough analyses of the threatscape by employing both black-box and white-box analysis, including detailed security configuration checks.
Minimize time spent chasing false positives while ensuring a negligible rate of false negatives.
Stay ahead of emerging threats with a comprehensive knowledge base of benchmarks and vulnerabilities, continuously updated by leading security experts.
Connect risk controls to KPIs to measure how well they are protecting the business.
Focus on the data that is most important based on specific business needs.

Avatar photo

Author

William Edson

Global Chief Software Engineer William, or as we like to call him in the office “Engineer”, is a computer scientist by training and a first-class software engineer. William loves to share his knowledge and has a talent for simplifying and efficiently communicating complex technical matters. In his spare time, he practices spear fishing and loves to cook.