







The Intelligence
That Detects
Before They Strike.
Axiata Cyber Fusion Center delivers 24×7 managed defence, offensive security, and advisory services protecting 11,000+ IT, OT, and IoT assets across the region.
The Intelligence
That Detects
Before They Strike.
Axiata Cyber Fusion Center is a cybersecurity center of excellence delivering 24×7 managed defence, offensive security, and advisory services protecting 11,000+ IT, OT, and IoT assets across the region, powered by HELIOS, our in-house patent-granted AI-powered Threat Attribution Platform.
Where cyber defence, intelligence, and innovation converge.
Axiata Cyber Fusion Center was established in 2022 with one mandate: build a cybersecurity capability worthy of defending one of Asia's most complex and targeted digital ecosystems.
What began as a internal security function has grown through deliberate insourcing, product innovation, and operational excellence into a patent-granted, award-winning operation now serving external clients across the region.
What we built to meet that challenge is now available to the enterprises, governments, and critical infrastructure operators who face the same adversaries.
Four pillars.
Every dimension of your security programme.
From 24×7 managed defense and offensive security to architecture advisory, compliance, and data privacy ACFC delivers integrated capability across your entire security posture.
Know your risk. Build your resilience.
Cyber risk clarity for security leaders through strategy, threat advisory, architecture, and maturity assessments aligned to operational and regulatory realities.
Your adversaries don't work business hours. Neither do we.
24×7 intelligence-led defence at scale continuous monitoring, threat detection, incident response, threat hunting, and vulnerability management across complex environments.
Technology can't fix a culture problem. People can.
Operational readiness through people and preparedness executive crisis simulations, cyber drills, phishing exercises, and role-based awareness programmes built from live intelligence.
Privacy compliance is business as usual. Breach response is not a strategy.
Privacy, compliance, and data risk embedded by design data protection governance, privacy impact assessments, and third-party risk management across jurisdictions.
See Your Organisation the Way Attackers Do.
Developed by ACFC, HELIOS is Malaysia's homegrown, patent-granted Attack Intelligence Platform built to mirror how adversaries discover, analyse, and exploit weaknesses before they act.
HELIOS combines AI and heuristic analysis to detect emerging threats, attribute attacks, and aggregate intelligence from multiple sources into a single operational view. Attack surface mapped in under 24 hours.
ATTACK INTELLIGENCE
Reveals chains of exposure, not isolated alerts
OFFENSIVE AUTOMATION
Full attack surface mapped in under 24 hours
CORRELATED INTEL
Underground data linked to your assets & identity
BUSINESS RISK VIEW
Attack paths scored by likelihood & impact
Wherever a threat escalates,
we monitor to defend.
Banking & FSI
RMIT, PDPA, fraud intelligence, CSA, and regulatory guidelines
Government
CNII, NACSA, sector specific Code of Practice
Telco & Infra
5G Security, OT Security, Telco Security Assessments and MBSS Compliance
Energy & OT
ICS/SCADA, CNII protection
Enterprise
Strategy, ESA and Maturity Assessment
RECOGNISED ACROSS THE REGION FOR CYBERSECURITY EXCELLENCE AND INNOVATION.
















Ready to see your organisation the way attackers do?
Tell us about your security challenge. We'll connect you with the right expert.
Book a Security Consultation
Speak directly with a practitioner about your threat environment, compliance obligations, or security architecture.








WHO ARE WE
Where cyber defence, intelligence, and innovation converge.
Axiata Cyber Fusion Center was established in 2022 with one mandate: build a cybersecurity capability worthy of defending one of Asia's most complex and targeted digital ecosystems.
What began as an internal security function has grown through deliberate insourcing, product innovation, and operational excellence into a patent-granted, award-winning operation now serving external clients across the region.
What we built to meet that challenge is now available to the enterprises, governments, and critical infrastructure operators who face the same adversaries.
WHAT WE DO
Four pillars.
Every dimension of your security programme.
From 24x7 managed defense and offensive security to architecture advisory, compliance, and data privacy ACFC delivers integrated capability across your entire security posture.
SECURITY ADVISORY & CONSULTING
Know your risk. Build your resilience.
Cyber risk clarity for security leaders through strategy, threat advisory, architecture, and maturity assessments aligned to operational and regulatory realities.
Know MoreCYBER MANAGED SERVICES
Your adversaries don't work business hours. Neither do we.
24x7 intelligence-led defence at scale continuous monitoring, threat detection, incident response, threat hunting, and vulnerability management across complex environments.
Know MoreCYBER AWARENESS
Technology can't fix a culture problem. People can.
Operational readiness through people and preparedness executive crisis simulations, cyber drills, phishing exercises, and role-based awareness programmes built from live intelligence.
Know MoreDATA PROTECTION & PRIVACY
Privacy compliance is business as usual. Breach response is not a strategy.
Privacy, compliance, and data risk embedded by design data protection governance, privacy impact assessments, and third-party risk management across jurisdictions.
Know MoreWith HELIOS See Your Organisation the Way Attackers Do.
An AI-powered platform that transforms cyber intelligence, attribution & threat actor identification
HELIOS is ACFC's patent-granted, in-house built AI-powered threat attribution and attack intelligence platform built to defend over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex digital ecosystem across the region.
Wherever a threat escalates, we monitor to defend.
Banking & FSI
RMIT, PDPA, fraud intelligence, CSA, and regulatory guidelines
Government
CNII, NACSA, sector specific Code of Practice
Telco & Infra
5G Security, OT Security, Telco Security Assessments and MBSS Compliance
Energy & OT
ICS/SCADA, CNII protection
Enterprise
Strategy, ESA and Maturity Assessment
RECOGNISED ACROSS THE REGION FOR CYBERSECURITY EXCELLENCE AND INNOVATION.
















Ready to see your organisation the way attackers do?
Tell us about your security challenge. We'll connect you with the right expert.