Understanding and controlling communications costs has become a key concern for business executives. Our solution architects, engineers and technicians offer world-class strategic advice to our client. Cytotouch (Pty) Ltd telecommunication services range from fixing ‘old’ systems to designing blockbuster solutions that inspire new ways of doing business for our client.


Technology Consulting

Radio Network Design & Optimisation Consulting

Site Surveys

Radio Network Benchmarking

Transmission Network Design

Synchronization Network Design/Planning

Network Roll-Out Service

Radio Network Audit

Consistency Check

Frequency Plan Evaluation

Radio Network Performance Evaluation

Radio Features Evaluation, including related parameters

indoor radio Surveys & design service

Surveys for targeted buildings

Subsequent indoor radio network design

Indoor solution Implementation

Site hand-over reports


We are a highly technical small business whose agenda is to fill up the gaps in the cybersecurity kill-chain. This is done by utilizing a range of products in our product silo to cater for all the security domains such as:

  • Access Control Systems and Methodology
  • Telecommunications and Network Security
  • Business Continuity Planning and Disaster Recovery Planning
  • Security Management Practices
  • Security Architecture and Models
  • Law, Investigation, and Ethics
  • Application and Systems Development Security
  •  Cryptography
  • Computer Operations Security
  • Physical Security

We have integration with different technologies such as Darktrace (Enterprise Immune System) for real-time threat detection and autonomous response, Globalscape, McAfee, BMC Remedy, Oracle, HPE, CyberArk (Securing privileges on superuser accounts) RSA IAM solutions and threat detection on endpoint using Trend Micro Business

Common Types of Cyber Security We Offer:

Network Security protects network traffic by controlling incoming and outgoing connections to prevent threats from entering or spreading on the network.

Data Loss Prevention (DLP) protects data by focusing on the location, classification, and monitoring of information at rest, in use and in motion.

Cloud Security provides protection for data used in cloud-based services and applications. 

Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) work to identify potentially hostile cyber activity.

Identity and Access Management (IAM) use authentication services to limit and track employee access to protect internal systems from malicious entities.

Encryption is the process of encoding data to render it unintelligible and is often used during data transfer to prevent theft in transit.

Antivirus/Anti-Malware solutions scan computer systems for known threats. Modern solutions are even able to detect previously unknown threats based on their behaviour.