Zizi consulting focuses on advising businesses on how best to use information technology to meet their business objectives. In addition to providing advice, Zizi consultants often estimate, manage, implement, deploy, and administer IT systems on businesses' behalf, known as outsourcing.


Payment Consulting

The payment system is an operational network - governed by laws, rules and standards - that links bank accounts and provides the functionality for monetary exchange using bank deposits. The payment system is the infrastructure (consisting of institutions, instruments, rules, procedures, standards,and technical means) established in effect the transfer of monetary value between parties discharging mutual obligations. Its technical efficiency determines the efficiency with which transaction money is used in the economy, and risk associated with its use.

They include credit mechanisms, but that is essentially a different aspect of payment. They are used in lieu of tendering cash in domestic and international transactions and consist of a major service provided by banks and other financial institutions.

Payment systems may be physical or electronic and each has their own procedures and protocols. Standardisation have allowed some of these systems and networks to grow to a global scale, but there are still many countries and product specific systems. Examples of payment systems that have become globally available are credit card and automated teller machine networks.

EMV Implementation

EMV stands for Europay, MasterCard and Visa, a global standard for inter-operation of integrated circuit cards (IC cards or "chip cards") and IC card capable point of sale (POS) terminals and automated teller machines (ATMs), for authenticating credit and debit card transactions.

The EMV standards define the interaction at the physical, electrical, data and application levels between IC cards and IC card processing devices for financial transactions.

Card Solutions - Contact / Contact less

Smart cards can provide identification, authentication, data storage and application processing. Smart-card-based "electronic purse" systems store funds on the card so that readers do not need network connectivity.

Contact less card can be "read" without inserting it into a reader device. The proximity card is held near an electronic reader unit for a moment. The reader usually produces a "beep" or other sound to indicate the card has been read.

Mobile Solutions

A mobile handheld device has a display screen with touch input and/or a miniature keyboard. It can run various types of application software, known as apps.

zizi Mobile software secures, monitors, manages and supports mobile devices deployed enterprises. It includes over-the-air distribution of applications, data and configuration settings for mobile devices including mobile phones and POS devices. This applies to both company-owned and employee-owned devices across the enterprise or mobile devices owned by consumers.

By controlling and protecting the data and configuration settings for all mobile devices in the network, zizi Mobile can reduce support costs and business risks.

Payment Strategies

This are ways to facilitates the transfer of information between a payment portal (such as a website, mobile phone or point of sale) and the Front End Processor or acquiring bank.

We develop Payment gateways to protect credit card details by encrypting sensitive information, such as credit card numbers, to ensure that the information is passed securely between the customer and the merchant and also between merchant and the payment processor.

Payment strategies include systems that may be physical or electronic and each has their own procedures and protocols. An efficient payment system reduced the cost of exchanging goods and services, and indispensable to the functioning of the interbank, money, and markets.

Application Testing

Software bugs fixing cost millions of shillings annually. More than a third of this cost could be avoided if better software testing was performed. It is commonly believed that the earlier a defect is found, the cheaper it is to fix it. For example, if a problem in the database structure, architecture or construction is found only post-release, then it would cost 10–100 times more to fix than if it had already been found by the requirements review.

Types of testing

  • Stress test - This is used to determine ability of application to maintain a certain level of effectiveness beyond breaking point.
  • Spike testing - is done by suddenly increasing the number of or load generated by, users by a very large amount and observing the behaviour of the system. The goal is to determine whether performance will suffer, the system will fail, or it will be able to handle dramatic changes in load.
  • Functional Testing - of both internet and non-internet applications can be performed using cloud testing. The process of verification against specifications or system requirements is carried out in the cloud instead of on-site software testing.
  • Configuration testing - Rather than testing for performance from the perspective of load, tests are created to determine the effects of configuration changes to the system's components on the system's performance and behaviour.
  • Compatibility Testing - instances of different Operating Systems can be created on demand, making compatibility testing effortless.

Solution Selection Service

Riverbank Solutions is dedicated to making software selection easier.

Our Software Selection Services team help you design, implement and support managed IT solutions that optimise business productivity, availability and continuity.

We are aimed at helping our customers in identifying, quantifying, and resolving key issues through improving IT’s ability to support the challenging demands that the business puts on it to operate effectively, in an increasingly competitive environment.

Riverbank Solutions will ensure your selection process is impartial, fact based, expeditious, thorough, and fair for all involved. The solution service is scalable and is tailored to meet your needs.

System Auditing

Evaluate the system's internal control design and effectiveness. This includes, efficiency and security protocols, development processes, and IT governance or oversight.

Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. In an Information Systems (IS) environment, an audit is an examination of information systems, their inputs, outputs, and processing.

Types of IT audits

  • Technological innovation process audit. This audit constructs a risk profile for existing and new projects.
  • Innovative comparison audit. This audit is an analysis of the innovative abilities of the company being audited, in comparison to its competitors. This requires examination of company's research and development facilities, as well as its track record in actually producing new products.
  • Technological position audit: This audit reviews the technologies that the business currently has and that it needs to add. Technologies are characterized as being either "base", "key", "pacing" or "emerging".

Our Tools:

We do work for:

Banking and Financial

Telecom & Media


Retail and Distribution

Sports & Events


Education & Institutions

Non-Governmental Organizations

University of Nairobi