(+251) 93 173 5798 | milkias@seedanti.com

SEED Cyber security Service

About SEED and ISOLS

A Pan African ICT security solutions provider with a holistic approach to offering end to end data and network systems protection, since 2004 as Isols and Ethiopia now as SEED since 2015 (100% Ethiopian Owned Company ). We are also an innovative & multi-skilled team of IT strategic planning, information technology security, risk management, forensics and project management professionals. Our solutions are tailored to ensure system hygiene, containment of viral outbreak; data availability, confidentiality and integrity. SEED has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications.


To afford our clients safe computing through solutions that reduce organization downtime while ensuring information confidentiality and integrity.


To be the leading IT security solutions provider for enterprise and SME organizations in Sub-Saharan Africa.

Core Values

Reliability, Integrity, Quality & Professionalism.

Key Vendors

Key Clients

Business Problems at Each Layer

Governance, Risk & Compliance

  • Regulatory Requirements
  • Compliance
  • Auditing
  • Enterprise Risk, Operational Risk, IT Risk


  • External attacks
  • Spam & Phishing
  • Hacking
  • Data loss
  • Misuse of internet

Identity & Fraud

  • Financial Fraud
  • Misuse of privilege Accounts
  • Information Right Management


  • Malwares
  • Misuse of devices
  • Malicious & unwanted applications
  • Unauthorized access to network
  • Consumerization of devices

Web Server & Database Server

  • Privilege Abuse
  • Database misuse
  • l attacks


  • Theft / loss of device
  • Data leakage through print / removable media / Email & Web
  • Regulations & global standards

Layered defense for Information

Governance, Risk & Compliance

  • SIEM
  • Vulnerability Management
  • GRC
  • Policy Auditing

Network Security

  • Next Generation Firewall
  • Network DLP
  • Email Security
  • Web Security

Identity & Fraud Management

  • Fraud Protection
  • Privileged Account Management

Endpoint Security

  • Anti-Malware
  • Device Control
  • Application Control
  • NAC
  • Mobile Security
  • Virtualization Security

Web Server & Database Server Security

  • Web application Firewall
  • Database Integrity Monitoring
  • Database Firewall

Data Security

  • Host DLP
  • Disk Encryption
  • Media Encryption
  • File Folder Encryption

Proposed Solutions

Governance , Risk & Compliance

Network Security

Identity & Fraud Management

Endpoint Security

Web Server & Database Server Security

Data Security