Legacy core banking
Core systems dating from before the cloud era still run the books. Modern channels — mobile, open banking, real-time payments — bolt around them, with all the integration debt that implies.
Industry · Banking & Financial Services
SAMA, NCA, PDPL. The Saudi banking regulatory stack is the most demanding in the region — and the consequences for getting evidence wrong are not academic. We design for the audit, not around it.
Why this sector now
Detection without provable evidence does not pass SAMA's review.
The Saudi banking regulator has shifted from advisory to active. The SAMA Cyber Security Framework, NCA-ECC, and PDPL together create an evidence regime that does not accept "we have the policy" — it asks for proof of execution, control by control, with traceability that holds up under external audit.
At the same time, customer expectations have moved to mobile-first, real-time fraud catches measured in seconds, and 24/7 channel availability that legacy core banking architectures were not designed for. Modernisation cannot wait for the next audit cycle — it has to ship inside it.
Where engagements get stuck
Recurring failure modes from regulated financial-services engagements — observed, not speculated.
Core systems dating from before the cloud era still run the books. Modern channels — mobile, open banking, real-time payments — bolt around them, with all the integration debt that implies.
SAMA expects the audit pack ready continuously — not just "we have the policy", but proof of execution at every control. Most banks reconstruct it under quarterly pressure, which is the wrong way round.
Card and transfer fraud now move faster than batch detection cycles can catch. Behavioural and identity-based attacks bypass signature-based controls entirely.
How we work here
Capabilities tuned for tier-1 banking and regulated financial services — measured against the regulator, not against an internal milestone deck.
Platform decisions designed against the SAMA Cyber Security Framework and the regulator-evidence expectations from day one — not retrofitted before the next audit.
EDR/XDR extended to transaction-level patterns. Behavioural detection across channels — card, transfer, mobile, identity — not just endpoint-only.
Engagements timed to your audit calendar. Evidence captured continuously and indexed against control IDs, not reconstructed quarterly under deadline pressure.
Solutions for this sector
The three NAS solution pages most relevant to banking buyers — written in outcome terms for stakeholders above the technical line.
Full ECC control coverage with the regulator-ready evidence pack — for banks where a finding stalls a Vision 2030 procurement.
Read the outcome pageTested DR posture under SAMA SCF expectations — RPO/RTO targets evidenced, validated failover, evidence pack ready in hours.
Read the outcome pageMulti-vector detection across endpoint, cloud, identity, and transaction channels — for environments where MTTR is reported to the board.
Read the outcome pageFrameworks we deliver to
30 minutes on where your platform sits against SAMA SCF and NCA-ECC expectations — what is in place, what is evidenced, and what would be a finding today. No deck, no pitch.
Our 47-control NCA-ECC readiness checklist — the one we use on bank engagements. Free to download.
NCA ECC checklistSkip the form. Reach our financial-services lead directly — honest assessment of fit before you commit.
[email protected]