Cybersecurity Consultancy

Stop guessing.
Stay secure.

Cybersecurity for Tanzanian SMEs.

Hawrat Cyber brings rigorous, framework-driven security practices to East African businesses โ€” at a price that makes sense for your size.

2,000+ vulnerabilities remediated 161 vendors assessed Framework-driven delivery
Dar es Salaam, Tanzania

How we work

Three interlocking disciplines that build lasting security.

Govern

Framework-driven risk and compliance. ISO 27001, Tanzania PDPA, BoT guidelines.

Engineer

Hands-on technical security. Vulnerability management, cloud security posture, hardening.

Automate

Compliance-as-Code. Automated, version-controlled evidence pipelines. No more spreadsheets.

Our Services

Fixed-scope engagements. Clear deliverables. No surprises.

Start here

Security & Compliance Health Check

Find out where you stand โ€” across cloud, identity, policy, and PDPA โ€” in two weeks.

Learn more โ†’

Cloud Security Posture Assessment

Know exactly where your Microsoft 365 and Azure environment stands.

Learn more โ†’

Compliance-as-Code Engineering

Replace manual evidence collection with automated, auditable pipelines.

Learn more โ†’

Cybersecurity Employee Training Programs

Build a security-literate workforce, from the boardroom to the front desk.

Learn more โ†’

Fintech & Mobile Money Security Audit

Purpose-built for BoT-licensed institutions and mobile money operators.

Learn more โ†’

ISO 27001 Readiness Programme

Get certified. Win the contracts that require it.

Learn more โ†’

Incident Response Readiness

Know exactly what to do when โ€” not if โ€” something goes wrong.

Learn more โ†’

Security Awareness Training

Your people are your first line of defence. Train them.

Learn more โ†’

Third-Party Risk Management Lite

Your vendors are part of your attack surface. Manage them properly.

Learn more โ†’

Tanzania PDPA Compliance Pack

Get ahead of the Personal Data Protection Act โ€” before regulators come to you.

Learn more โ†’

Virtual CISO (vCISO) Retainer

Executive-level security leadership โ€” without the full-time hire.

Learn more โ†’

Vulnerability Management Program Setup

Find your vulnerabilities before attackers do โ€” then fix them systematically.

Learn more โ†’

Why Hawrat Cyber

What makes us different from a generic IT security vendor.

Trained in tier-1 banking environments

Hands-on experience in APRA-regulated financial institutions, where security isn't optional โ€” it's enforced by law.

Compliance-as-Code delivery

We build automated, version-controlled evidence pipelines. Replace manual screenshots and spreadsheets with programmatic compliance.

Built for Tanzanian businesses

We understand Tanzania PDPA, BoT guidelines, mobile money threats, and the local SME landscape.

Fixed-scope engagements

Clear deliverables, fixed scope, no runaway consulting hours. You know exactly what you're getting.

How an engagement works

From first call to ongoing security โ€” a clear, structured path.

Discover

Free 30-minute call. We understand your business and where you stand.

Assess

Gap analysis and scoping. We define what needs fixing and how.

Remediate

Delivery. We execute the agreed scope with clear milestones.

Sustain

Optional retainer. Ongoing monitoring, reporting, and advisory.

Ebrahim Gulamali, Founder of Hawrat Cyber

Who you're working with

Ebrahim Gulamali

Founder, Hawrat Cyber

Trained in cybersecurity GRC and infrastructure roles within APRA-regulated Australian banking environments, Ebrahim founded Hawrat Cyber to make those same rigorous, framework-driven practices accessible to Tanzanian businesses โ€” without the enterprise price tag.

Read the full story

Ready to take security seriously?

Book a free 30-minute discovery call. No commitment, no jargon โ€” just an honest conversation about where your business stands.