IT Services and Support

Every company needs a savvy technology system to go beyond the demands of their business. Acumate Solutions has both the technology and skills to help your IT systems run uninterrupted.

High speed server: We offer Enterprise grade servers for large & small businesses alike

Fast Migration: Ensure business continuity with fast turnaround times

We audit & implement to ensure you have scalable architecture

Cloud Backup & Retention

Avoid Data loss with enterprise-class secure data protection & storage for disaster management and business continuity.

Cloud Server Hosting

Get the most out of your business with Cloud Servers and access vital resources and computing power anywhere, anytime.

Data hosting including the following 3
  • Infrastructure as a Service: IaaS (Infrastructure as a Service) describes the cloud computing model where servers, databases, and the necessary computing resources are delivered by a 3rd party provider. This means that the IaaS provider will provide the underlying hardware, operation systems, and network resources through a virtualized dashboard. You’ll have the flexibility in managing, configuring, and scaling the resources as needed.
  • Private Cloud: In a private cloud, computing resources are dedicated and proprietary, and a single organization host and manages the system. What makes it private is the fact that the underlying hardware layer is segregated from any other client’s infrastructure.
    The IT services are provisioned over private IT infrastructure as a fully managed service and the services are provided by a third-party cloud vendor. These are exclusive cloud offerings dedicated and customized for a single client.
  • On-Premises (Server and LAN): It is a physical computer network and infrastructure on premises. More companies are moving away from “On-Prem” servers and opting to move to the Cloud. Network infrastructure is needed to provide sharing of internet access and other devices.
IT Infrastructure

Ensure that your organisation’s IT resources are agile enough to support emerging technologies and changes.

Network & Security

Network Security, Anti-Virus, Malware, and Ransomware Protection & Prevention. We analyse and report on the vulnerability status of your networks, servers, workstations, firewalls, and routers.

Network Design & Installation

We ensure your network is compatible with your organizational requirements & aspirations.

Product & Software Procurement

We source & procure your software and hardware products and manage licensing agreements:

  • Desktops
  • Notebooks
  • Servers
  • Networking
  • Printers
  • Components
  • Peripherals
  • Software Licences
  • Service Provider Licence Agreements

Our service desk is happy to help with any query or support requirements that you might have.

  • Remote support
  • On-site support
  • Network support
  • Server maintenance and support
  • Desktop and notebook support
  • Office 365 Exchange
  • Mail Hosting
  • Domain Hosting
  • Internet Services
  • Information Workflow Analysis & Design

Duo Application Two-Factor Authentication

What is Two-Factor Authentication?

Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.

Multi-Factor Authentication (MFA): Quickly and securely verify user trust with every access attempt

Remote Access: Establish strong security for your remote users

Adaptive Access: Get granular security tailored to your users and their access context

Single Sign-On (SSO): Provide simpler, safer access with just one username and password

Remote access with Duo

How It Works

  • Enter username and password as usual
  • Use your phone to verify your identity
  • Securely logged in

Once you’ve enrolled in Duo, you’re ready to go: You’ll log in as usual with your username and password, and then use your device to verify that it’s you. Your administrator can set up the system to do this via one-time passcode, or the Duo Mobile smartphone app, and so on.

Why Do I Need This?

Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked — you might not even know someone is accessing your account.

Two-factor authentication adds a second layer of security, keeping your account secure even if your password is compromised. With Duo Push, you’ll be alerted right away (on your phone) if someone is trying to log in as you. This second factor of authentication is separate and independent from your username and password — Duo never sees your password.

Two-Factor Authentication for the POPI Act
South Africa passed the Protection of Personal Information Act (POPI) in 2013. The idea of the act is to assist in the protection of data subjects from theft, discrimination, and security breaches.

Businesses were given eight requirements, each there to help protect the employee’s personal information. No one should be able to release any information about you without your consent. The POPI Act also protects the information of the customer (you). Two-factor authentication is key to the act as the law requires a business to use all security measures possible to protect its information.

Supported Devices

  • iOS
  • Android
  • WindowsPhone

Eset Protect Entry

Multilayered protection for your business

For more than 30 years, Eset has been developing industry-leading IT security software and services, delivering instant, comprehensive protection against evolving cybersecurity threats for businesses and consumers worldwide. Eset is privately owned. With no debts and no loans, Eset have the freedom to do what needs to be done for the ultimate protection of all our customers.

Choice of cloud or on prem

Tech support included, local expertise

Light footprint, discreet

Quick to deploy, easy to use

Top-rated malware detection

Cloud-based Console

Endpoint Protection Platform

Protect your company computers, laptops and mobiles with cutting edge security products all managed via a cloud-based management console.

  • Easily accessible set Protect Cloud console improves the TCO of security management.
  • Single-pane-of-glass remote management for visibility to threats, users and quarantined items.
  • Company endpoints and mobiles protected via advanced multi layered technology, including file server security, now with secure intranet and banking protection.
  • Best-in-class endpoint security, utilizing Eset´s verified layered approach (Combining the best of all worlds: cloud-based reputation, machine learning, and deep behavioural inspection).
  • Award-winning endpoint protection combines the latest Machine Learning techniques with decades of human expertise.
Multi-layered Endpoint Protection Technology

Eset Endpoint Security provides multiple layers of protection and can detect malware before, during, and after execution. Machine learning, advanced behavioural analytics, big data and human expertise work in dynamic equilibrium to balance performance, detection and false positives.

  • Protect against ransomware.
  • Block targeted attacks.
  • Prevent data breaches.
  • Stop fileless attacks.
  • Detect advanced persistent threats.
Cloud-Based Remote Management Console

Eset Protect is a cloud-based, multifunctional remote network security management tool for Eset business security products across all operating systems. It enables one-click security deployment and gives you network visibility without the need to buy or maintain additional hardware, reducing the total cost of ownership.

  • Setup and deployment within minutes.
  • No need for additional hardware or software.
  • Single point of network security management.
  • Accessible safely via web browser from anywhere.
  • Cloud-based Console.
  • Endpoint Protection Platform.
All Eset endpoint solutions are managed from a single-pane-of glass cloud console, Eset Protect, ensuring a complete overview of your network.

Eset In Numbers


Users worldwide


Business customers


Countries & territories


Global R&D centers