Security assessments

On this page we provide more information about our security assessment services. With this service we can do research for you in the field of vulnerabilities, security, online criminal investigation, and privacy.

Scans, Pen-tests and Red-teaming

We conduct research and tests in the field of intrusion of computer systems and physical buildings. In essence, this form of testing means that the security measures are taken into consideration. Then you will know for sure whether all security measures are working effectively or not.

Do you know how effective your security controls are?

Intelligence and Social Engineering

All kinds of information can be collected through the Internet, Social Media and people themselves. Think of personal data, but also financial and other sensitive data and this applies to both individuals and companies! We can search these sources for undesirable information sharing.

How much data do you leak unknowingly?

Scans, Pen-tests & Red-teaming

Below you will find an overview of our services in the field of vulnerability scans, penetration tests and red-teaming. After all, in the field of researching the technical condition of your environment, you are at the right address.



Do you have a website, application, cloud service or IT infrastructure that you want to have security scanned or tested? We can carry out a vulnerability-scan and -assessment and pen-test for you, in which we will investigate whether the ingredients for the recipe of a hack or data-leak are exists. Based on the findings, we also enable you to solve the problems that have been found.

Ask us today to execute a test to investigate the overall security of your environment.



Would you like to know whether a specific security measure, (web)application or infrastructure can be breached? To answer this question we can perform a so-called pen-test. A vulnerability scan is primarily automated, but with a pen-test we ourselves will use manual tools. We will use various hacker techniques to test whether or not the subject can be breached.

A pen-test continues where a vulnerability scan ends. We test the resilience using manual hacker techniques.


We can also carry out so-called Red-teaming tests. In short, this means that we will test the security measures of your organization, and this can be the guard at the entrance, right down to entrance gates at the data center. We look at how far we can get breach your organization and what defects we encounter along the way. Finally, we help you find solutions for the findings.

Red-teaming is the challenge for your set of security measures for people, process and technology!

Request an obligation-free quotation

Including aftercare and advice

Hygiene scans

Below you will find an overview of our products of what we call hygiene scans. With this we check the configuration of your website and email environment from the outside, and G Suite and Office 365 on the inside.


Microsoft Office 365

Microsoft has the necessary Security features available for Office 365. Have you activated them all, or are you possibly still using the default values? Let us do an assessment and you will immediately have an answer, including our recommendations, for your O365 environment.


Google Suite

Google offers many options to make the G Suite experience safer for your company. Some of them are technical, others functional. Are you curious? Let us do an assessment and you will immediately know whether improvements are possible.


91% of hacks and data breaches start with an email addressed to one of your employees. Do you have everything in order in the area of anti-spoofing (SPF, DKIM & DMARC), spam, and malware for email? And do you also encrypt the emails? Ask us for the answers!


A large part of the security of your website starts with encryption (TLS) and Security Headers. Based on those points, and a large number of other hygiene checks, we can map your online environment. We provide recommendations based on this.

Intelligence & Social Engineering

Finding information via the Internet, social media and people themselves is something we are trained and practiced in. Because we unknowingly leak more than we think and want, and we can therefore figure it out for you. You can read more about this below.

Open Source Intelligence

Open Source Intelligence (OSINT), and Social Media Intelligence (SOCMINT) are research methods for collecting information from public sources. Think of the Internet, Social Media, the library and other forms of publicly available information. This can go from a “due diligence” investigation to finding fraudsters active on your web store.

Would you like to have a thorough online investigation and want to learn more about what can be found online? Then we would like to hear from you.

Social Engineering

Social Engineering is the practice, or actually art, of getting information from people. A Social Engineering test can be very useful to test whether your awareness campaigns actually work. Does your HR department just pass on Social Security numbers by phone? Or does your IT engineer tell you if there are any issues? We will look in to it for you!

We can investigate this often unknowingly way of leaking data and that helps you to give a boost to your awareness trainings.

Request an obligation-free quotation

Including aftercare and advice

• • •