Company Profile

Securing your data one byte at a time.

Conor Inc is an IT security firm that was started in 2008. We are a located in Nairobi Kenya. Conor Inc advices governments, cities, corporate and private sector clients on security assessments, security, risk management services and forensic services relating to information security.  We also offer solutions from many of our partners that can help with fraud detection, security breach investigation and assist with business continuity planning in the event such a breach was to occur.

Conor Inc is tasked with trying to find vulnerabilities where they exist and help counter them with solutions and advice that works.  We work with multiple solutions across industries to ensure that your data is safe and not viable to attack.

Our management has over 10 years in the IT industry and over 5 years in IT security. Alex Mathenge, the company CEO has a masters in information management and has worked in many IT environments that required the highest level of clearance and vigilance. You can view our leadership team in the About Us page.

Website security- we advice and assist clients in implementing encryption of sensitive information at all stages of the information life-cycle within the organization and use up to date methods to keep it safe from hackers.  Strong encryption ensures that only trusted and authorized parties are able to access the information. We have worked many commercial and open source solutions to ensure that we are up to date with current threats.

A secure environment is only as secure as the quality of information it allows in and out of it.

Conor Inc also  advises and trains PC users on vulnerabilities and best method practices. We help increase the level of awareness throughout the organization, which in turn helps us decrease the likely hood that poor passwords or poor handling of sensitive data by your users results in a breach.

We also assist and provide the following services:

•    Information Security Design and Implementation
•    Vulnerability Assessments
•    Penetration Testing
•    Security Breach Investigation and Remediation
•    Business Continuity Planning- If in the event a vulnerability was to occur, we assist with incidence response, (this is part of business continuity planning), remediation plans and provide a full audit on how we think the threat occurred thus ensuring that it never occurs again.
•    Policies & Procedures

Risk Management Services

•    Risk Assessment
•    IT Risk Advisory
•    Fraud Detection

Insider threat reviews
Incident response
Architecture- Assist in designing a secure environment where only pre-approved users have access to approved data.
Project management
Pre-implementation services