Frequently Asked Questions

click on the question to expand

Under consultancy we do the following services;

  • Business & System Assessment
  • Product Development
  • Certification (Payment related project, IT Security)
  • Payment Department Set-up and Business Optimizations
  • Implementation and Integration
  • Comprehensive Security Assessment
  • Security Product Implementation
  • Vulnerability and Penetration Testing
  • Security Event Logging and Monitoring
  • Information Security Process Advisory

Three Quality Services will use a step-by-step approach and guidelines and best practices from the industry to work with your organization to:

  • Assess its operations and systems to identify the business, technology or peoples risks your organization is exposed to.
  • Design and implement appropriate controls to enhance resilience of your organization to ensure CIA of your organization information.
  • Develop and implement appropriate policies and frameworks that your organization could use to Protect data, quickly Identify breaches or compromises when they occur, quickly Respond from breaches and compromises, and Recover within the shortest possible time from breaches and compromises.

Methodology

Three Quality Services uses industry best practices and guidelines from industry standards and models such as the Factor Analysis of Information Risk (FAIR), NIST 800-30 model, and the SANS top 20 critical controls as the framework for our security risk analysis and controls implementation. Using these tools as our framework, we use a very simple approach to diligently work with our clients to assess their systems and operations to identify risks and their potential impacts on client’s operations and work with them to design and implement appropriate controls. Our simplified approach has 4 basic phases: -

  • Analyze
  • Identify
  • Develop and Implement
  • Maintain

No matter what your business sets out to accomplish, our Professional Services will take you there.

Our team of experts will be on hand to guide your project to success. We have dedicated specialists in Payment System, Enterprise Architecture, Cyber Security project management – guaranteeing your innovation and applicability in product development.

Guiding You to Success

We’ll ensure you get the most out of your corporate strategy product development roadmap by sharing our knowledge and years of experience, best-practice, enterprise architecture and go to market.

3QS experts will help you to bring your ideas to life and guide your product development lifecycle to success. We get it right the first time. We have established best practices around successful design, prototyping, testing and development of rich user interfaces, and we are happy to share all of them with you.

Three Quality Services has cumulative experience of 100 plus years among the founders. We are a four years old company with a foundation design to have a multi-layered organization. The partners at the heart of the business ensure that only the most qualified and experienced people are introduced to our clients. Our benchmark for qualification is based on our core values with a lead-time of three to four months to get a truly converted 3QS disciple with superior payment, e-business and Cyber Security industry credentials and proven team-working abilities. 3QS’s strength is our unique mix of specialized knowledge, practical payment industry and cybersecurity know-how, and consulting expertise.

As such, they carry the knowledge and credibility that only experience can provide: comfortable operating at board level, or at the detailed operational level, and working closely with client’s staff. These people are committed to our beliefs and goals, and share in the success of the business. In addition to this very versatile group of people, we have a number of core associates who are exclusively contracted to us to work on projects and assignments requiring specialist subject matter expertise. These associates share the same high professional standards used by 3QS in all our operations and dealings with clients. In the cybersecurity space, 3QS offers delivery capability made up of a pool of high quality people ranging in skills from Policy developers, Network engineers, Data center specialist, Risk Analyst, Penetration testers, Forensic investigators, etc.

As the proud approved training partner of E-Council, we have access to development and training resources that ensures our personnel are always up-to-date with changes and trends in the cybersecurity space. In addition to the vast resources from E-Council that support and guide our consulting activities, our activities are also guided by industry tested and accepted standards such as FAIR, NIST 800-30, ISO27001/2, etc. as already mentioned. Our strategic goal for our clients on payments systems and cybersecurity is to position them in appropriate positions to deal with the rapid changes in the electronic payment space, which is fast moving to virtual stores and virtual payment instruments and to ensure our clients are knowledgeable on cybersecurity challenges and have cyber resilient operations and systems.

For more about our activities and resource pool, kindly our web site at www.3qs.co.ke

There will thus be the need to build solid foundations for payment based powerful analytics, insightful marketing, rigorous financials, experienced operations, stable systems, strong risk management and great business partnerships.

3QS services offered include organization alignment, operational, technical and commercial assistance and covers all the avenues of a dynamic Mobile, Agency Banking and cards business. The coverage includes but not limited to:-

  • Risk Management will include the following elements of assessment:-
    • The best practice of a Fraud & Chargeback Team (Prevention, Detection and Resolution)
    • Compliance (AML, monitoring rules, and third party registration)
    • Reporting (Fraud reporting, PCI and network program)
  • Accounting and finance will comprise the following components:-
    • Revenue (Interest income, fees and profit on exchange)
    • Cost (Network expenses, interchange, system and other costs)
    • Controls (Reconciliation, analytical review, and income statement)
  • System and Infrastructure will take into account the following key features:-
    • Issuing (Cards management system, authorization and access control)
    • Acquiring (ATM & POS management, Interface management and E-Commerce)
    • Infrastructure (Third party processor, Data management and system parameters)
  • Issuing and Marketing will cover the following areas of assessment:-
    • Product and acquisition (Product characteristics and Features, Communication channels and Usage)
    • Account management (Processing, Personalization, activation and delivery)
    • Credit management (Credit policy, recovery process and collection)
  • Acquiring and Agency Banking business which will include the critical success factor for an acquiring business
    • Strategy (Balanced portfolio, sustained investment, and building partnership)
    • Operation (On-boarding procedures, Transaction processing and Termination procedures)
    • Price and Service (Price v/s value, price transparency and relationship management

Our experience tells us that establishing the right team and team structure is critical to the quality service that you expect and that we commit to deliver. Our proposed team is specifically designed to provide the highest levels of quality and professionalism. Our deep understanding of the financial and payment industry will support your organization handle any standard of bespoke integration efficiently securely inside or outside the organization.

3QS primary project management focus is to manage, control and report on project(s) and delivery performance:

  • Improvements in Business Practices Relating to Projects Selection and Delivery
  • Diligent Selection of Innovations, Products and Projects
  • Efficient Management of Risks and Issues
  • Implementing Sound Project Governance Practices
  • Improved Effectiveness in Avoiding and Resolving Construction Claims
  • Effective Change and Claim Management
  • Safeguarding against losses from not recovering justified Damages and/or paying for unjustified Damages
  • Enhanced Efficiency Resulting from Automating Processes and Sharing Project Information
  • Automating and Standardizing Project Management Processes, Project Document Management and Periodical Project Performance Reporting
  • Protecting Project Files and Important Documents on a Safe and Effective Retrieving Platform
  • Optimized Operating Cost
  • Optimizing the Operating Cost of managing projects by eliminating duplications, enhancing the decision-making process, effective collaboration

3QS comprehensive security assessment (CSA) combines our extensive experience responding to intrusions carried out by advanced threat actors, industry-leading threat intelligence and technology to deliver an assessment that:

  • Identifies ongoing or past intrusions within your organization
  • Assesses risk by identifying weaknesses in security architecture, vulnerabilities, improper usage or policy violations and system security misconfigurations
  • Increases your organization’s ability to respond effectively to future incidents

3QS deliver an assessment that meets your business objectives with speed, scale, and efficiency. In addition to identifying evidence of past or ongoing attack activity the assessment offers:

  • Context derived from threat intelligence
  • Provides insight into attacker attribution and motivation so organizations know if they are being targeted.
  • Identification of risks
  • Identifies security architecture and configuration weaknesses, including missing patches or security software.
  • Facilitation of future investigations
  • Recommends strategic options that can better prepare your organization’s security team to respond to intrusions.

BENEFITS

Comprehensive analysis of the environment focused on finding evidence of ongoing or past compromise Provides a view into systemic risks and exposures, Identifies security hygiene issues and provides recommendations for furthering your rganization’s ability to effectively respond to future incidents

Our penetration tests leverage our deep knowledge of advanced persistent threats and attacker behavior, using tools, tactics and procedures we see every day during our incident response engagements.

SERVICE OVERVIEW

3QS penetration tests are custom-tailored to your environment and needs, assessing specific aspects of your security program and the state of security of your critical systems, networks and applications. We take advantage of all the intelligence gained from our years of experience responding to the most sophisticated threat actors.

OUR APPROACH

  • TARGET RECONNAISSANCE - Understand the environment, system or application being assessed.
  • VULNERABILITY ENUMERATION - Search for exploitable vulnerabilities that may exist in exposed services or PIs, applications or firmware, or social engineering.
  • VULNERABILITY EXPLOITATION - Attempt to exploit identified vulnerabilities using a combination of publicly available exploit code, commercial penetration testing tools and internally developed exploit code and tools.

MISSION ACCOMPLISHMENT

Gain access to the internal environment from the Internet, steal data from segmented environments or take control of a device and issue malicious commands.

Under training we do the following services;

  • Standard and customized training on Card Business
  • Standard and customized training on Mobile Banking
  • Standard and customized training on Agency Banking
  • Certified Training via EC-Council track on IT Security
  • Processing Training
  • System Training

3QS provides the most up-to-date trainings that are needed to succeed and assure confidence in your everyday operations. We custom the training to adapt to your environment.

Our course content are is designed to assist your teams identify gaps, perform remedial actions on the gaps, enhance operational skills,accelerate innovations and project delivery, reduce occurence of reactive business model, enhance system compliance, readiness and availability.

Our methodologies will enhance your teams ability to respond effectively and promptly based on the policies, proceses and procedures.

For further engagement email us at info@3qs.co.ke

3QS provides the most up-to-date trainings that are needed to succeed and assure confidence in your everyday operations. We custom the training to adapt to your environment.

Our course content are is designed to assist your teams identify gaps, perform remedial actions on the gaps, enhance operational skills,accelerate innovations and project delivery, reduce occurence of reactive business model, enhance system compliance, readiness and availability.

Our methodologies will enhance your teams ability to respond effectively and promptly based on the policies, proceses and procedures.

For further engagement email us at info@3qs.co.ke

3QS provides the most up-to-date trainings that are needed to succeed and assure confidence in your everyday operations. We custom the training to adapt to your environment.

Our course content are is designed to assist your teams identify gaps, perform remedial actions on the gaps, enhance operational skills,accelerate innovations and project delivery, reduce occurence of reactive business model, enhance system compliance, readiness and availability.

Our methodologies will enhance your teams ability to respond effectively and promptly based on the policies, proceses and procedures.

For further engagement email us at info@3qs.co.ke

Kindly click on the button below to read more.

Training

3QS provides the most up-to-date trainings that are needed to succeed and assure confidence in your everyday operations. We custom the training to adapt to your environment.

Our course content are is designed to assist your teams identify gaps, perform remedial actions on the gaps, enhance operational skills,accelerate innovations and project delivery, reduce occurence of reactive business model, enhance system compliance, readiness and availability.

Our methodologies will enhance your teams ability to respond effectively and promptly based on the policies, proceses and procedures.

For further engagement email us at info@3qs.co.ke

3QS provides the most up-to-date trainings that are needed to succeed and assure confidence in your everyday operations. We custom the training to adapt to your environment.

Our course content are is designed to assist your teams identify gaps, perform remedial actions on the gaps, enhance operational skills,accelerate innovations and project delivery, reduce occurence of reactive business model, enhance system compliance, readiness and availability.

Our methodologies will enhance your teams ability to respond effectively and promptly based on the policies, proceses and procedures.

For further engagement email us at info@3qs.co.ke

Under solutions we do the following services;

  • Digital Transformation Solution
  • Card Management and Instant Issuing
  • Mobile Banking
  • Agency Banking Solutions
  • Open Banking Solutions
  • Payment Mobile Authentication Security Solutions
  • Holistic data protection platform
  • End Point Solutions
  • Firewall Solutions

Genie-Transformation

Genie-Transformation is an Open API Omni Channel Business Transformation Platform. It is a low-code application development platform designed to help enterprises transform their legacy systems into future ready digital solutions. The platform offers enterprises a cutting edge approach to building digital solutions. It provides unique capabilities that provide agility, flexibility and scalability while building any type of digital solutions. Digital Platform offers enterprises a cutting edge approach to building digital solutions.

The platform adopts a multi-tier micro app architecture that ensures agility, flexibility and scalability while building any type of digital solutions. The Digital Platform also provides a unique end-to-end automation capability in building apps from enterprise services in the quickest possible time.

Ready-Made Banking Solution

On this business transformation platform, Bank-Genie has developed series of vertical solutions to address the market needs of the bank. These vertical solution includes,

  • Genie-Branch, a branch less banking application
  • Genie-Teller, a branch efficiency and paperless banking application
  • Genie-Wallet, a digital wallet solution
  • Genie-Mobile, a mobile banking application
  • Genie-Selfie, a customer opening and E-KYC application
  • Genie-Bot, an artificial intelligence, deep-learning chatbot
  • Genie-Passbook, an e-passbook application

For more details click here...

Is Your Organization Mobilized?

In this new world of digital transactions, an elegant customer experience and security are no longer mutually exclusive.

Businesses must adjust their digital strategies to incorporate real-time risk analysis and real-time decisions.

Security measures need to align to keep up with the faster, “always-on” world.

Learn more about In-Auth by clicking here...

Own your data

Online communications and collaboration methods are used daily. Emails and documents need to be sent and files shared. Your data travels beyond your internal network to third parties, clouds and other jurisdictions and you need the assurance that your data is always secure.

Galaxkey enables you to keep ownership of your data and the keys used to secure your data. Galaxkey has no access to your data or your keys. This means that when you protect your data with Galaxkey you own your data and you control the access to your data.

Learn More about Galaxkey by clicking here..

Safeguard your privacy

Protect your digital identity with our powerful antivirus technology. Keep your confidential data safe from ransomware and phishing.

Learn More on ESET by clickng here...

See it. Stop it. Secure it.

Expose Hidden Risks

Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network.

Stop Unknown Threats

Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure.

Isolate Infected Systems

Automatic threat response instantly identifies and isolates compromised systems on your network and stops threats from spreading.

Click here for more information

We are located at New Waumini House,Suit 201-2nd Floor, opposite delta building in westlands.