WORLD CLASS SOLUTIONS WITH LOCAL INSIGHTS

  • Introducing FundMaster Xi
  • Software Quality Assurance & Testing
  • Unified Communication
  • Enterprise Applications Integration
  • Structured Cabling
  • Cyber Security Solutions

FUNDMASTER Xi

The Most Advanced Pension Administration and Investments Management System in the region. Caters for the core functions of Retirement Benefits and Pension Scheme Administration for both private and public employee retirement organizations. Core Modules include:

  • Benefits Administration
  • Financial Accounting
  • Investments & Assets Management
  • Member Self Service
  • Workflow Management
  • Reporting & Business Intelligence

read moreFundMaster Xi Pension Administration System provides a flexible, extensible architecture and tools designed to accommodate the one-size-does-not-fit-all landscape of today’s retirement programs. Supporting the regional pension funds and administrators for over ten years, FundMaster Xi is a proven solution that has gone through a process of complete re-engineering based on customer feedback to keep current with the industry needs.



SOFTWARE TESTING TRAINING & CERTIFICATION


istqb certified

Introduction to QA & Software Testing

read moreThis course is designed for users, testers, developers and managers who want to learn how to assure the quality of the software they deliver

Basic Software Testing

read moreThis is a quick start course in software testing for people just getting into the field, or for people who just need a refresher course or validation

Software Testing - ISTQB Bootcamp

read moreThis is a comprehensive workshop in software testing for people just getting into the field of software testing, or for people who just need a

Structured User Acceptance Testing

read moreThis is a practical hands-on seminar to convey effective methods to plan and conduct user acceptance testing. This is one of the few

Business Analyst Testing Courses

read moreDo you find yourself challenged by user requirements? Perhaps you understand the important of good user requirements for software


Client Testimonials

Central Bank Of Kenya

Quote

Central Bank Of Kenya

FundMaster has enhanced the operations and services of our pension scheme. Our Appreciation for you, Systech

Kenya Ports Authority

Quote

Kenya Ports Authority

Systech has been more than a service provider to us, being domain experts in pensions, investments, financial accounting and IT, they've even assisted us in re-aligning our operations

Britam

Quote

Britam

FundMaster takes care of the core requirements in our benefits scheme. Thank you Systech

Kenya Commecial Bank

Quote

Kenya Commercial Bank

10 years of providing the Bank with network infrastructure and counting. We have many reasons for the continuing relationship with Systech, but mostly, reliable service you can bank on



ibm rational partner cisco premier partner oracle gold partner istqb silver partner nexans certified installer vidyo partner ibm qradar partner

VIDEO CONFERENCING HAS NEVER BEEN EASIER

Now there's a better way to meet using everyday devices and IP networks, with the power of video collaboration at your fingertips.

See for yourself how Vidyo and Systech Ltd can deliver HD video conferencing, without boundaries, to your organization

enterprise solutions and services

CYBER SECURITY: INTELLIGENCE, INTEGRATION, EXPERTISE



We, in partnership with IBM offer Cyber security services in Sub Saharan Africa. Our partnership with IBM, our superior levels of technical excellence and our 'Cyber-security only' focus differentiate us from other providers.

Our approach to cyber security goes beyond the traditional approach/myth “we are protected since we have firewalls” because, firewalls are not designed to protect networks from vulnerabilities and improper system configurations, nor can they protect one from malicious internal activity/threats or rogue assets inside the firewall.

Our approach focuses on Intelligence, Analytics and Forensics through:


1

Creating an around-the-clock
security monitoring,reporting and
protection system to help you identify,
respond and avoid threats.

2

Retracing the step-by-step actions
of cyber criminals to provide deep
insights into the impact of intrusions
and help prevent their re-occurrence.

3

Reconstructing raw network
data related to a security incident
back into its original form for a
greater understanding of the event.

4

Providing a unified architecture for:

  • Integrating security information and event log management
  • Anomaly detection
  • Incident forensics
  • Vulnerability management.

What's New

  • 1
  • 2