Skip to content Skip to footer

Loading Results

Implementation and Operations


Security solutions to build resilience

Architect, design, implement, and enhance the use of technology.

Massive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm organisations and consumers. Despite all the attention that such incidents create, many organisations worldwide still struggle to comprehend and manage emerging cyber risks in an increasingly complex digital society.

To achieve greater cyber resilience as a society and within organisations will require a more concerted effort to uncover and manage new risks inherent in emerging technologies.

Browse our focus areas

Our services cover different technical and organisational domains such as cloud security and access management among others and we provide advice on the areas of improvements.

Cloud security design and implementation

Your Challenges

  • How can the cloud infrastructure be effectively governed?
  • How can the implementation complexities of cloud be managed, and its benefits be measured?
  • What are the regulations to be considered to ensure compliance of the cloud’s global infrastructure?
  • How can cloud implementation be kept aligned to the overall business strategy and objective?
  • What would the operating model and shared responsibility model look like over the cloud?
  • How can company and user data be secured across different borders?
  • Do you have the right controls in place for the business applications and data that are moved to the cloud?
  • Do you know how data is handled and processed by third party service providers in the cloud?
  • Are the security baseline for the applications in the cloud at least as secure as on premise and securely configured?

How can we help you?

  • Migrate client applications and infrastructure to the Cloud.
  • Focus on building secure Cloud configuration, cloud vulnerability remediation programme.
  • Implement Native Cloud securities and Cloud access security broker.
  • Complete scheduled health checks once an organisation has begun their cloud journey.
  • Resiliency checks to continue monitoring and verifying that the environment is secured.

Key benefits

  • Improve customer experience by boosting and enhancing digital innovation.
  • Maximise cloud opportunities rather than simply initiating an IT transformation.
  • Drive revenue and streamline operations, while managing risk and making business resilient.
  • Help organisations identify strengths and areas of improvement of their cloud environment.

Identity and access management (IAM)

Our aim is to help clients address all of their IAM related business challenges, ranging from supporting your digital transformation, securing and governing access, managing access during mergers and divestments, enabling a seamless customer experience, advising on more effective risk-based governance and more


Your Challenges

  • How can IAM be exploited to support your business and digital transformations?
  • Have you adopted a strong, effective access management that enables the access of authorised workers while restricting the access of outsiders?
  • Do you have the right security controls in place to manage and protect privileged credentials for third-party applications?
  • Do you have the right policy and procedure in place when it comes to password management for privileged users?
  • Do you have the right security controls in place to manage and protect privileged credentials for third-party applications?

How we can help you?

  • Assess your Identity and Access Management solution with vendor specific health checks and reviews.
  • Centralise privileged credentials to controls access, monitor and alert for any suspicious activity.

Key benefits

  • Effective control over who can access data and how it can be used and shared
  • Centralised secure storage for privilege account credentials and secrets.
  • Protection against irreversible network takeover attack.
  • Secure infrastructure accounts and access to your domain controller.
  • End-to-end automation of privileged account security tasks.


Follow PwC Mauritius

Contact Us

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.

Contact us

Jean-Pierre Young, ACA, CIA

Jean-Pierre Young, ACA, CIA

Advisory Leader, PwC Mauritius

Tel: +230 404 5028

Vikas Sharma

Vikas Sharma

Partner, Cybersecurity & Privacy, PwC Mauritius

Tel: +230 404 5015