Selcom Wireless Tanzania | Managed Services
Problem
Selcom Wireless Tanzania is Tanzania’s largest payment aggregator (cross-segment financial and payment services provider), providing services in Tanzania and across Sub-Saharan Africa. Selcom has a full range of electronic payment products and services focusing on digital, card and cardless processing services. Selcom has its own merchandise network of more than 10,000 Point-of-Sale (POS) terminals across the country, and it also provides a payment gateway and processes transactions on behalf of 41 banks and 6 telecommunications operators in Tanzania. It’s connectivity, and multiple services with multiple entities has risked its security posture. Compliance and regulatory checks were not enough. Selcom needed to stay ahead with advanced, innovative security solutions that cover all its systems. Selcom wanted to build a continuous, sustainable response to ongoing threats and create strong processes with the most advanced security tools on the market, to maintain its security quality and standards of services.
Services
Development of security modules for all payment applications on Selcom’s infrastructure
Yearly continuous comprehensive security assessments
Cryptography services
POS terminal hardware integrity check and full security review
Engagement details
Minimize time spent chasing false positives while ensuring a negligible rate of false negatives.
Staying ahead of emerging threats with a comprehensive knowledge base of benchmarks and vulnerabilities, continuously updated by Magilatech’s leading security experts.
Connect risk controls to KPIs to measure how well Magilatech’s Cybersecurity Lab is protecting the business.
Focus on the data that is most important based on Selcom’s specific business needs.
Development of Payment APIs to enable clients to securely utilise Selcom services from its Core Banking Platform.
Annual Vulnerability Assessment & Penetration Testing (VAPT) services.
Cryptography services.
POS Terminal Hardware integrity check and full security review.
Benefits
Continually monitor and assess the complete scope of infrastructure assets.
Perform thorough analyses of the threatscape by employing both black-box and white-box analysis, including detailed security configuration checks.
Minimize time spent chasing false positives while ensuring a negligible rate of false negatives.
Stay ahead of emerging threats with a comprehensive knowledge base of benchmarks and vulnerabilities, continuously updated by leading security experts.
Connect risk controls to KPIs to measure how well they are protecting the business.
Focus on the data that is most important based on specific business needs.