IT security assessments

IT security testing

Our core activity is performing IT-security tests; also known as hack tests or pentests. Like no other we know how to hack into IT-systems and we are confident enough to say that regarding this discipline we are among the best in The Netherlands. For example: we perform these tests for banks, insurance companies and the Dutch state.

After conducting these tests we will write a security report which summarizes all the security risks we have identified.

Let us, as an independent party, check your company for security leaks before you put software into production. This to minimize the chance of getting hacked.

IT security audits

Does your company need to comply with certain rules and regulations? And does your IT-security need to meet strict requirements on that account? Let us help you to show that your security is in order en meets the required standards.

Examples of security audits we perform: security research of personal digital identification and security research in compliance with the act on protection of personal data.

Furthermore we work with the so called code for information security, PCI DSS, ISO 27001, NEN 7510/11 and other framework settings.

PHP security assessments

One of our senior IT security consultants is an expert on the development of PHP-applications and is also Zend-certified.
This makes him one of the very few PHP-security experts in The Netherlands. If you have a PHP website and security is important to you, then let us advice you on this matter.

Red teaming

You think your IT-security is in order? Let us check this for you.
With the proper authorization and commissioned by your management we might perform an unexpectedly visit to check if we can still hack into your company. And you will be amazed of what unfortunately still turns out to be possible.

Code reviews

An extra option in security testing we can check your programming codes for security leaks. Although a black box security test is a very good method certainly not all risks can be established this way.
To get the fullest possible inventory of your risks we recommend to also have us review your source code (white box).

Exploit development

Do you have a request for a specific digital attack you want us to perform? We can set up a customized digital attack for you.
This could be an exploit we develop (for example via Metasploit) to detect a specific security leak in widely used software. Or it could be a customized attack with specialized hardware aimed at your company network (via a WIFI Pineapple, a Raspberry PI or the like).
Have questions? Or do you want to request a quote directly? Feel free to contact us.