Skip to main content
REYER
R E Y E R
--
DAYS
:
--
HRS
:
--
MIN
:
--
SEC
⬆ CLICK TO VIEW SERVICE MENU ⬆
REYER™ INTELLIGENCE OPERATIONS
SECURITY OPERATIONS CENTRE
--:--:-- UTC
THREAT INTEL FEED: ACTIVE
NODE: JOHANNESBURG-ZA-01
Active Threats
0
REAL-TIME DETECTIONS
▲ --
Threats Blocked · 24h
0
AUTOMATED RESPONSE
▲ 12.4%
Mean Time To Detect
0m
MTTD AVERAGE
▼ 3.1m
Systems Monitored
0
ENDPOINTS + NODES
▲ 5.7%
Compliance Score
0%
POPIA / ISO 27001
▲ 2.1%
Incidents Resolved
0
THIS MONTH
▲ 8.9%
LIVE THREAT FEED
ATTACK VECTORS · 7D
Phishing
78%
Malware
61%
Ransomware
44%
Injection
38%
Credential
32%
Supply Chain
21%
DDoS
14%
Zero-Day
9%
DETECTION COVERAGE
EVENTS · LAST 24H
Blocked
Detected
Alerts
BANDWIDTH ANOMALY
THREAT ORIGIN HEATMAP · GLOBAL
REGIONS — INTENSITY BY ORIGIN
INCIDENT TIMELINE · 30 DAYS
SYSTEM STATUS
SIEM ENGINEOPERATIONAL
THREAT INTEL FEEDOPERATIONAL
EDR CLUSTEROPERATIONAL
FIREWALL STACKOPERATIONAL
VULNERABILITY SCANNERDEGRADED
BACKUP SYSTEMOPERATIONAL
INCIDENT RESPONSESTANDBY
POPIA COMPLIANCE MON.OPERATIONAL
THREAT INTELLIGENCE BULLETIN
REYER™ — JOHANNESBURG, ZA

AFRICA'S
MOST AGGRESSIVE
CYBER DEFENCE.

We don't just monitor threats — we hunt them.
Reyer combines offensive security expertise, rapid incident response, and purpose-built technology to protect businesses and individuals operating in an increasingly hostile digital landscape.


REGISTER INTEREST →
30
MIN
Emergency remote response SLA — guaranteed
R10M
Average POPIA fine — we keep you compliant
24/7
Cyber emergency response — no time limits
100%
IP ownership — all code and builds belong to you
CYBER EMERGENCY RESPONSE — ACTIVE 24/7
⚠ EMERGENCY SERVICES

UNDER ATTACK
RIGHT NOW?

Ransomware encrypted your files. An attacker is in your network. Your accounts have been taken over. Reyer deploys remotely within 30 minutes — anywhere in South Africa, any time of day or night.

30m
Remote Response
24/7
Always On
4
Response Types
Business IR
Individual IR
Ransomware Recovery
Post-Breach Forensics

CONTACT NOW — EMERGENCY →
ATTACKER FIREWALL DMZ WEB-01 DB-01 DC-01 FS-01 AD-CTRL SQL-SRV BACKUP PERIMETER INTERNAL CRITICAL
REYER™ NETWORK PEN TEST — LIVE OUTPUT
RECONNAISSANCE
HOSTS: 0 FOUND
REYER™ NETPEN v2.1
REYER TECHNOLOGY — COMPLIANCE
FLAGSHIP SERVICE

NETWORK
PENETRATION
TESTING

Real attackers don't wait for scheduled audits. We use the same techniques, tools, and mindset as adversaries to find every exploitable weakness in your network before they do — internal and external.

  • External perimeter attack simulation
  • Internal network lateral movement testing
  • Credential harvesting & privilege escalation
  • CVSS-scored findings report with remediation roadmap
  • Executive summary & board-ready documentation
REGISTER INTEREST →
https://target-app.co.za/api/v1/auth/login
REQUEST
RESPONSE
⊙ ACTIVE SCAN
Initialising OWASP Top 10 test suite...
PHASE: AUTH BYPASS
FINDINGS: 0
REYER™ WEB PEN TEST
REYER TECHNOLOGY — WEB SECURITY
CYBERSECURITY

WEB APP
PENETRATION
TEST

Your web application is your biggest attack surface. OWASP Top 10 and beyond — we manually test every input, endpoint, and business logic flow that an attacker would target.

  • OWASP Top 10 manual testing
  • Authentication & session management review
  • Business logic abuse testing
  • API endpoint security audit
  • Re-test included after remediation
REGISTER INTEREST →
SYS // REYER-COMPLIANCE // NODE-ZA-01 // --:--:--
South African flag
ZA // REPUBLIC OF SOUTH AFRICA
POPIA ACT 4 OF 2013
R10M
MAX PENALTY
8
CONDITIONS
10YR
IMPRISONMENT
PROTECTION OF PERSONAL INFORMATION ACT
EFFECTIVE: 01 JULY 2021  //  ENFORCED BY: INFORMATION REGULATOR (ZA)
Governs how organisations collect, store, use and share personal information of SA citizens.
8 conditions: accountability, processing limitation, purpose specification, further limitation, information quality, openness, security safeguards, data subject participation.
Mandatory breach notification to the Information Regulator and affected data subjects.
Every organisation must appoint an Information Officer registered with the Regulator.
Non-compliance carries fines up to R10M and/or imprisonment up to 10 years for responsible parties.
$ popia --scan --org=CLIENT --depth=full
> mapping personal data landscape...
> gaps detected — initiating remediation protocol
> status: COMPLIANT pending audit sign-off
REYER TECHNOLOGY — COMPLIANCE DIVISION
COMPLIANCE

POPIA
COMPLIANCE
ASSESSMENT

The Information Regulator is issuing fines. The average breach now carries a R10M penalty. Reyer maps your personal data landscape, identifies every gap, and builds the policies to close them — fast.

  • Data inventory & mapping across your organisation
  • POPIA gap analysis against all 8 conditions
  • Risk register creation
  • Policy & procedure drafting
  • Staff awareness briefing included
REGISTER INTEREST →
REYER FILE security_middleware.js LINES 0
REYER LABS

CUSTOM WEB
APPLICATION
DEVELOPMENT

Security built into every line of code, not bolted on afterwards. We build full-stack web applications with a security review baked in from line one — and you own all the code, always.

  • Frontend: React / Next.js
  • Backend API: Node.js / Python
  • Database design & hosting setup
  • Security review pre-launch
  • Full source code & IP — client-owned outright
REGISTER INTEREST →
REYER LABS — R&D & IOT
REYER LABS · R&D & IOT

IOT PROTOTYPE
CUSTOM BUILD

From concept to working hardware in weeks. Sensor arrays, edge compute nodes, automation controllers — scoped, assembled, programmed, and fully documented. Every prototype ships with a scale-up bill of materials and full IP transfer.

  • Use-case scoping & component selection
  • Hardware assembly & firmware development
  • Web dashboard or API integration
  • Test & validation documentation
  • Full IP ownership transferred to client
REGISTER INTEREST →
WHY REYER™

THE THREAT
LANDSCAPE IS
NOT WAITING.

South Africa ranks among the top 10 most targeted nations globally. Ransomware attacks on local businesses increased 78% year-on-year. The average breach goes undetected for 197 days. Reyer exists to change those numbers — for your organisation.


JOIN THE WAITLIST →
78%
INCREASE IN SA RANSOMWARE · YoY
South Africa is one of the most targeted nations on the African continent — and attack frequency is accelerating.
197
DAYS — AVERAGE DWELL TIME
The average attacker spends 197 days in your network before detection. Reyer MTTD targets under 4 minutes.
R10M
POPIA MAXIMUM FINE
The Information Regulator has begun issuing fines. One unpatched breach can cost your business more than a year of Reyer protection.
SIMPLE. FAST. EFFECTIVE.

HOW REYER WORKS

01
REGISTER INTEREST
Email us at hello@reyer.co.za or use any of the Register Interest buttons. We respond within 2 hours during business hours, immediately for emergencies.
02
SCOPE & QUOTE
We scope your requirement, ask the right questions, and provide a fixed-price quote. No retainers you didn't ask for. No scope creep. No surprise invoices.
03
ENGAGE & EXECUTE
We get to work. For emergencies, we're remote within 30 minutes. For projects, we deliver on agreed timelines with weekly progress updates.
04
DELIVER & HAND OVER
Full documentation, source code, or forensic reports — everything delivered in writing, in plain language. You own every output we produce.
PHASE 1 — GOES LIVE 01.01.2027

DON'T WAIT FOR
A BREACH
TO FIND US.

Register your interest now. Waitlist members receive priority access, pre-launch pricing, and direct engagement with the Reyer team before the platform goes live. No commitment required.

REYER™ · REG: 2026/198256/07 · B-BBEE LEVEL 1 · JOHANNESBURG, SOUTH AFRICA
REYER™ — PRE-LAUNCH OPERATIONS

WE HUNT.
WE HACK.
WE GET PAID.

While the platform builds toward go-live on 01.01.2027, Reyer generates real revenue and real reputation through competitive bug bounty hunting, hackathon participation, and responsible threat actor intelligence reporting. Every CVE we find. Every competition we place in. Every criminal we help identify — it all feeds back into the platform and the team.


COLLABORATE WITH REYER →
ACTIVE BUG BOUNTY PLATFORMS
Primary Platform
HackerOne
World's largest bug bounty platform. Reyer actively hunts on private and public programmes across financial, government, and enterprise targets. Verified researcher status.
$50K
max per critical find
Web App
API
Network
Mobile
Platform 2
Bugcrowd
Crowdsourced security platform with programmes across APAC, EMEA, and the Americas. Strong presence in financial services and government sectors highly relevant to the South African market.
$30K
max per critical find
Web
Cloud
IoT
Platform 3
Intigriti
Europe's leading bug bounty platform. Strong GDPR and EU regulatory programme base — cross-applicable to POPIA compliance work. Growing African researcher community.
€20K
max per critical find
Web App
GDPR-scope
API
Platform 4
Synack Red Team
Elite invite-only platform for vetted security researchers. Higher average payouts, US government and defence contractors in scope. Application in progress.
$100K+
potential per engagement
Government
Defence
Enterprise
Platform 5
Open Bug Bounty
Non-commercial, ISO 29147-compliant coordinated disclosure platform. Used for responsible disclosure of findings outside paid programmes — building CVE history and public researcher reputation.
CVE
credits + public recognition
Disclosure
CVE
Reputation
Govt Programme
Rewards for Justice
US Department of State programme paying up to $15M for information leading to the identification or location of threat actors targeting critical infrastructure. Fully legal to participate from South Africa.
$15M
max reward per report
Threat Actors
Nation-State
Infrastructure
HACKATHON PARTICIPATION — 2025/2026
⊙ Target Event
DEF CON CTF
AUG 2026 · LAS VEGAS
$50,000+
Target Event
Pwn2Own
MAR / OCT 2026
$1,000,000+
Target Event
HackerOne H1-xxx
LIVE HACKING 2026
$25,000+
Target Event
Intigriti 1337UP
NOV 2026 · ONLINE
€15,000
Local Event
ITWeb Security Summit
MAY 2026 · JOHANNESBURG
Reputation + Network
THREAT ACTOR INTELLIGENCE
HUNTING
CYBER
CRIMINALS.

Real money. Real fame. Real impact. Governments and private organisations pay significant rewards for actionable intelligence on threat actors targeting critical infrastructure, financial systems, and civilian networks. Reyer operates strictly within the bounds of South Africa's Cybercrimes Act 2020 and ECTA — passive intelligence gathering, responsible disclosure, and formal reporting to authorised law enforcement channels only.

US Govt — Max Reward
$15M
Rewards for Justice
Per actionable tip
Zerodium — 0-Day
$2.5M
Full chain iOS RCE
Per submission
Programme Total Paid
$200M+
RFJ historical
payouts to date
CVE Fame
Each CVE assigned
is permanent record
LEGAL NOTE: All threat intelligence activities conducted by Reyer comply strictly with the Cybercrimes and Cybersecurity Act 2020 (South Africa), ECTA, and applicable international law. Reyer does not conduct offensive operations against third parties. All intelligence is gathered passively and reported through authorised channels only.
HOW REPUTATION IS BUILT
01
CVE ASSIGNMENTS
Every vulnerability you discover and responsibly disclose earns a CVE number permanently attributed to you in the National Vulnerability Database. Recruiters, clients, and media check this.
02
HALL OF FAME LISTINGS
Major companies — Google, Microsoft, Apple, Meta — maintain public researcher halls of fame. A single critical finding on a FAANG programme is career-defining.
03
CONFERENCE TALKS
DEF CON and Black Hat talks from researchers who discovered major vulnerabilities or tracked threat actors routinely generate global press coverage and consulting demand.
04
THREAT ACTOR ATTRIBUTION
Firms like CrowdStrike, Mandiant, and ESET publish attribution reports on APT groups. The researchers behind those reports become industry names with global reach.
05
GOVERNMENT COOPERATION
Reporting to SAPS, Hawks, CISA, or Interpol through proper channels builds institutional relationships that are invaluable for a growing security firm's credibility.
⊙ RECENT CVE ACTIVITY
PHASE 1 SERVICE MENU — GOES LIVE 01.01.2027
REYER™ SERVICES
⚠ EMERGENCY
REYER TECHNOLOGY
REYER LABS
BUNDLES
ACTIVE INCIDENT?
Suspected breach, ransomware, or active attack? Reyer deploys remotely within 30 minutes. 24/7 response guaranteed.
CONTACT NOW
Cyber Emergency Response
EMERGENCY · BUSINESS
Emergency Incident Response — Business
Active breach containment, attacker eviction, forensic evidence preservation, and POPIA regulatory guidance. Remote within 30 minutes, on-site if required.
  • 30-min remote response SLA
  • Network isolation & attacker eviction
  • Forensic evidence preservation
  • Breach scope & impact assessment
  • Regulatory notification guidance (POPIA)
  • Post-incident hardening report
EMERGENCY · INDIVIDUAL
Emergency Incident Response — Individual
Compromised accounts, ransomware on personal devices, or unknown attacker in your home network. Assess, contain, clean, and lock down.
  • 30-min remote response SLA
  • Account takeover triage & recovery
  • Device malware analysis & removal
  • Home network audit & attacker eviction
  • Password reset & MFA enforcement
  • Plain-English debrief & protection plan
EMERGENCY
Ransomware Response & Recovery
Stop the spread, identify the strain, assess recovery options, advise on payment decisions, and rebuild securely. Full root cause analysis included.
  • Immediate network segmentation
  • Ransomware strain identification
  • Decryption feasibility assessment
  • Backup integrity verification
  • Clean rebuild guidance & support
  • Root cause analysis & gap report
FORENSICS
Post-Breach Forensics & Reporting
Full forensic report for insurance, legal proceedings, or regulatory compliance. Attack timeline reconstruction with chain-of-custody evidence handling.
  • Digital forensics & log analysis
  • Attack timeline reconstruction
  • Data exfiltration assessment
  • Chain-of-custody evidence handling
  • POPIA breach report (if applicable)
  • Insurer & legal-ready documentation
Reyer Technology — Cybersecurity & Infrastructure
FLAGSHIP
Network Penetration Testing
Full offensive security assessment of your internal and external network using real attacker techniques. Every finding documented with a remediation plan.
  • External perimeter attack simulation
  • Internal network lateral movement testing
  • Credential harvesting & privilege escalation
  • CVSS-scored findings report
  • Remediation roadmap
  • Executive summary & board-ready report
CYBERSECURITY
Web Application Penetration Test
OWASP Top 10 and beyond. Manual testing of your web application for injection, auth flaws, access control failures, and logic vulnerabilities.
  • OWASP Top 10 manual testing
  • Authentication & session management
  • Business logic abuse testing
  • API endpoint security review
  • Detailed findings with PoC
  • Re-test after remediation
INFRASTRUCTURE
Network Security Audit
Comprehensive review of your network architecture, firewall rules, switch configurations, and access controls. No attack simulation — pure configuration analysis.
  • Firewall rule audit
  • Switch & VLAN configuration review
  • Wireless security assessment
  • Access control & segmentation analysis
  • Findings report with risk ratings
  • Board-level executive summary
INFRASTRUCTURE
Hardened Server Build
We build and harden your Linux or Windows server to CIS Benchmark standards. Fully documented, tested, and handed over with a security baseline report.
  • OS hardening (CIS Benchmark)
  • Service minimisation
  • SSH & remote access lockdown
  • Audit logging & monitoring setup
  • Security baseline documentation
  • Post-build penetration test
MANAGED
Monthly Cybersecurity Retainer
Your security team, on call. Monthly vulnerability scans, patching oversight, log review, and on-demand support. Cancel anytime.
  • Monthly vulnerability scanning
  • Patch management oversight
  • Log & alert review
  • Incident triage (up to 4hrs/mo)
  • Monthly security report
  • Priority emergency response
COMPLIANCE
POPIA Compliance Assessment
Gap analysis against POPIA requirements. Identify what personal data you hold, how it's protected, and what you need to fix to comply.
  • Data inventory & mapping
  • POPIA gap analysis
  • Risk register creation
  • Policy & procedure drafting
  • Staff awareness briefing
  • Board-level executive summary
Reyer Labs — Development, R&D, Deployables & IP
WEB & APPS
Custom Web Application Development
Full-stack web apps built to spec — dashboards, portals, internal tools, customer-facing platforms. Security review built in from line one. You own all code.
  • Requirements & wireframe workshop
  • Frontend (React / Next.js)
  • Backend API (Node.js / Python)
  • Database design & hosting setup
  • Security review pre-launch
  • Full source code & documentation handover
WEB & APPS
Business Website & Digital Presence
Professional websites built for conversion — not templated, not outsourced. SEO foundation, mobile-first design, and security hardening included.
  • Up to 8 pages, responsive design
  • On-page SEO & Google setup
  • Domain, hosting & SSL config
  • Contact forms & basic analytics
  • Security hardening included
  • 1 month post-launch support
WEB & APPS
API & System Integration
Purpose-built REST or GraphQL APIs connecting your systems, tools, or data sources. Fully documented, authenticated, and tested.
  • API architecture & endpoint design
  • Authentication (JWT / OAuth2 / API key)
  • Rate limiting & abuse protection
  • Full OpenAPI / Swagger documentation
  • Test suite & deployment pipeline
  • Source code & IP fully client-owned
DEPLOYABLE PRODUCT
ReyerShield — Network Monitoring Agent
Lightweight network monitoring agent deployed to your environment. Watches traffic, flags anomalies, reports to a centralised dashboard.
  • Custom-built monitoring agent (Python)
  • Deployed & configured to your network
  • Real-time anomaly alerting
  • Web dashboard (hosted or self-hosted)
  • Full source code handover
  • 30-day post-deploy support
DEPLOYABLE PRODUCT
ReyerScan — Automated Vulnerability Scanner
Scheduled vulnerability scanner built and tuned for your specific infrastructure. Structured reports, CVSS-scored findings.
  • Built & tuned to your environment
  • Scheduled automated scan runs
  • Structured HTML/PDF report output
  • CVSS-scored findings per scan
  • Alert integration (email / Slack / webhook)
  • Source code & deployment docs included
TOOLS & AUTOMATION
AI Tool Integration
Embed AI into your existing workflows. LLM-powered chatbots, document processing, automated reporting, and AI-assisted decision tools.
  • Use case identification & scoping
  • LLM integration (OpenAI, Claude API)
  • Custom prompt engineering
  • UI wrapper & user testing
  • Ongoing model tuning support
R&D & IOT
Paid R&D Sprint
2–4 week focused research engagement. Reyer Labs investigates a specific technical problem and delivers a findings report with actionable recommendations.
  • Problem definition workshop
  • Literature & market research
  • Technical feasibility analysis
  • Written findings report
  • Presentation to stakeholders
R&D & IOT
IoT Prototype — Custom Build
Hardware + firmware prototype for your specific use case. Sensor arrays, edge compute nodes, automation controllers — scoped, assembled, programmed, and documented.
  • Use-case scoping & component selection
  • Hardware assembly & firmware development
  • Integration with web dashboard or API
  • Test & validation documentation
  • Scale-up bill of materials
  • Full IP ownership to client
IP & TRAINING
App & Brand Trademark Filing
We file trademark applications with CIPC on your behalf — protecting your app name, logo, and brand identifiers. Registered in your name. You own it outright.
  • Trademark availability search (CIPC)
  • Class selection & application strategy
  • CIPC filing on client's behalf
  • Application tracking & status updates
  • Trademark registered in client's name
  • Guidance on international filing (Madrid Protocol)
IP & TRAINING
Technical Training & Workshops
Hands-on workshops for your team. Cybersecurity awareness, network fundamentals, Python automation, cloud basics, or custom topics on request.
  • Half-day or full-day formats
  • Custom curriculum per team
  • Practical labs & exercises
  • Take-home materials & notes
  • Certificate of completion
TOOLS & AUTOMATION
Data Dashboard & Reporting
Turn raw data into decisions. Custom dashboards connected to your databases, spreadsheets, or APIs — live, visual, role-controlled, and shareable.
  • Data source mapping & cleanup
  • Dashboard design & build
  • Automated scheduled reports
  • Role-based access control
  • Training & handover
Starter Bundles — Cybersecurity
CYBER BUNDLE
Cyber Baseline
Vulnerability assessment + firewall hardening + endpoint security + 1 month retainer. Your first properly defended perimeter.
CYBER BUNDLE
Pen Test + Fix
Full network penetration test + remediation sprint. Find every hole, then close them. Includes re-test to confirm fixes.
CYBER BUNDLE
Web App Security Pack
Web application pen test + security scanning tool + developer security training. Ideal for software companies.
EMERGENCY BUNDLE
Breach Response Pack
Emergency IR engagement + forensics report + post-incident hardening sprint. Everything you need to recover, document, and ensure it never happens again.
Starter Bundles — Growth & Launchpad
LAUNCHPAD BUNDLE
Business Launchpad
Custom business web app + network audit + hardened server build + 1 month IT support. Everything a new business needs to operate professionally and securely from day one.
INFRASTRUCTURE BUNDLE
Network Upgrade Pack
Full network audit + hardened server build + ReyerShield monitoring deployment + firewall hardening. Walk away with a documented, secure, modern network.
LABS BUNDLE
Labs Launch Pack
Custom web app + API layer + ReyerShield monitoring deployment + CIPC trademark filing. Everything you need to build, deploy, and protect your product from day one.

⏻ REYER™ goes live: 01-01-27
Pricing will be available on this website from 1 January 2027
REYER™
CHAT
LIVE
REYER™ · REG: 2026/198256/07 · JHB, ZA
HUMAN-OPERATED
REYER™ Labs — Lab Partner Program
REYER™ Labs — Creat⏻n Network · Partner Program
REYER LABS · 4IR MANUFACTURING

Lab Partner Program

We invest in your space. You manufacture under the REYER™ banner. Together we build a decentralised manufacturing network powered by Creat⏻n — and we share every cent of profit.

R0
Upfront to you
70%
Max partner share
4IR
Decentralised network
Powered by Creat⏻n
Upfront Cost to You
R0
ZERO INVESTMENT REQUIRED
Equipment Supplied
3D
BRANDED PRINTERS + MATERIALS
Partner Revenue Share
70%
SENIOR TIER — UNCAPPED
Network Architecture
4IR
DECENTRALISED NODES
Platform
CREAT⏻N POWERED
Go-Live
2027
01 JANUARY · APPLY NOW
Simple. Fast. Effective.

How It Works

Four steps from application to your first production order — no upfront investment required on your side.

01
Apply
Tell us about your space, skills, and community. We assess fit within the Creat⏻n network and confirm your node location.
02
REYER™ Invests
We supply REYER™-branded 3D printers and equipment to your lab. Zero cost to you. Your node goes live on Creat⏻n.
03
Manufacture
Receive production orders through your Creat⏻n dashboard. Print, assemble, and fulfil locally — faster than centralised production.
04
Earn
Every fulfilled order generates shared revenue. Transparent, tracked, and paid automatically through the Creat⏻n platform. No cap.
Lab Partner Benefits

What You Get

Everything you need to run a REYER™-branded production node — supplied, supported, and connected to the network from day one.

EQUIPMENT · FEATURED
REYER™-Branded 3D Printers
Professional-grade printers supplied and maintained by REYER™ Labs. Fully branded. Zero upfront cost to the partner.
  • Professional FDM printer(s) — REYER™ branded
  • Initial filament stock supplied
  • Remote diagnostics via Creat⏻n
  • Maintenance and repair covered by REYER™
PLATFORM
Creat⏻n Dashboard
Full access to the Creat⏻n platform — order queue, earnings tracking, production stats, and network analytics in one place.
  • Real-time order management
  • Earnings dashboard and payout tracking
  • Node performance analytics
  • Design repository — pre-validated print files
  • Tier progression and expansion requests
REVENUE
Tiered Profit Sharing
Competitive revenue split on every order fulfilled. The more you produce, the higher your tier and the better your share — no cap.
  • Starter tier: 60% partner / 40% REYER™
  • Growth tier: 65% partner / 35% REYER™
  • Senior tier: 70% partner / 30% REYER™
  • Automatic tier upgrades based on output volume
BRAND ACCESS
REYER™ Partner Status
Operate as an official REYER™ Labs partner node — with access to branding, co-marketing, and the global 4IR network.
  • Official REYER™ Labs partner designation
  • Branding assets and style guides
  • Co-marketing and network promotion
  • Access to REYER™ community and events
TRAINING
Full Onboarding & Training
No prior 3D printing experience required. REYER™ provides complete setup, training, and ongoing operational support.
  • Machine setup and calibration training
  • Creat⏻n platform onboarding
  • Quality assurance standards training
  • Ongoing technical support line
GROWTH
4IR Maker Network
Each Lab Partner node strengthens REYER™'s decentralised manufacturing capability and Africa's broader 4IR ecosystem.
  • Additional printers unlocked at higher tiers
  • Priority order routing for top-performing nodes
  • Beta access to new Creat⏻n features
  • Pathway to anchor node status
Creatn
Decentralised Creation Platform


Register Interest →
REYER LABS · TECHNOLOGY

The Creat⏻n
Platform

REYER™'s decentralised creation and manufacturing platform. Every Lab Partner node connects to Creat⏻n — receiving orders, reporting output, and receiving payment through a single unified system.

01
Order Management
Real-time production orders routed to the nearest available node. Accept, track, and complete jobs from your dashboard.
02
Earnings Tracking
Every order logged and verified. Earnings calculated transparently and paid automatically — no chasing invoices.
03
Network Visibility
Node performance, output rankings, and tier progression visible in real time. See where you sit in the network.
04
Design Repository
Access to REYER™-approved print files. All designs pre-validated for dimensional accuracy and brand compliance.
05
Expansion Requests
Request additional equipment, upgrade your node tier, or flag capacity directly through the platform.
Transparent Revenue Model

Profit
Sharing

Every order fulfilled through your node generates revenue split between your lab and REYER™. The split is tiered — the more you produce, the better your share. All tracked and paid through Creat⏻n automatically.


This is not a franchise fee model. REYER™ invests in you upfront. You operate the equipment. We share the upside — aligned incentives, transparent splits, no hidden costs.



Register Interest →
Revenue split per order fulfilled
Lab Partner — Starter 60%
Lab Partner — Growth 65%
Lab Partner — Senior 70%
REYER™ Platform fee 30–40%
Equipment costs are covered by REYER™. Your share is pure revenue from production — no deductions for hardware, maintenance, or platform access. Tier upgrades are automatic based on monthly output volume.
Before You Apply

Eligibility

We look for motivated, reliable people with space — not credentials or capital. If you have a room and the drive, we have everything else.

NO UPFRONT COST
REYER™ supplies all equipment at zero cost to you. You do not need prior experience, capital, or business registration to apply.
APPLY NOW
What we look for
Dedicated space — a garage, workshop, or room with adequate power and ventilation for 3D printing operations
Reliability — ability to fulfil orders consistently within agreed lead times
Community presence — based in or connected to an underserved or growth community in South Africa
Alignment — genuine interest in REYER™'s mission and the 4IR manufacturing vision
Communication — responsive, able to report production progress through the Creat⏻n platform
What is not required
Prior 3D printing experience — REYER™ provides full training
Technical qualifications — motivation and reliability matter more than credentials
Existing customer base — REYER™ handles all order sourcing through Creat⏻n
Business registration — individual applicants and community groups are welcome
REYER™ LABS — LAB PARTNER PROGRAM · PHASE 1

READY TO
RUN YOUR NODE?

Applications are open. REYER™ goes live 01 January 2027 — Lab Partner nodes will be activated in the lead-up to launch. Apply now to secure your place in the network.

REYER™ · REG: 2026/198256/07 · B-BBEE LEVEL 1 · JOHANNESBURG, SOUTH AFRICA
PLATFORM GOES LIVE: 01 JANUARY 2027 · APPLICATIONS OPEN NOW
LIVE
REYER GOES LIVE — 01 JANUARY 2027
SOUTH AFRICA'S 4IR INNOVATION GROUP
TWO ENTITIES. ONE GROUP. ONE VISION. AFRICA'S FUTURE.
ACTIVE BREACH? 30-MINUTE RESPONSE. CALL REYER.
RANSOMWARE RESPONSE · FORENSICS · BREACH RECOVERY
PENETRATION TESTING FOR SOUTH AFRICAN BUSINESSES
BESPOKE WEB APPLICATIONS. ZERO TEMPLATES.
FROM THE FIRST LINE OF CODE TO THE LAST LINE OF DEFENCE.
CIPC TRADEMARK FILING — YOUR APP NAME. LEGALLY YOURS.
YOU OWN THE CODE, THE PRODUCT, AND THE BRAND
REYER GOES LIVE — 01 JANUARY 2027
SOUTH AFRICA'S 4IR INNOVATION GROUP
TWO ENTITIES. ONE GROUP. ONE VISION. AFRICA'S FUTURE.
ACTIVE BREACH? 30-MINUTE RESPONSE. CALL REYER.
RANSOMWARE RESPONSE · FORENSICS · BREACH RECOVERY
PENETRATION TESTING FOR SOUTH AFRICAN BUSINESSES
BESPOKE WEB APPLICATIONS. ZERO TEMPLATES.
FROM THE FIRST LINE OF CODE TO THE LAST LINE OF DEFENCE.
CIPC TRADEMARK FILING — YOUR APP NAME. LEGALLY YOURS.
YOU OWN THE CODE, THE PRODUCT, AND THE BRAND