Security assessments

On this page we provide more information about our security assessment services. With this service we can do research for you in the field of vulnerabilities, security, online criminal investigation, and privacy.

Scans, Pen-tests & Red-teaming

We conduct research and tests in the field of intrusion of computer systems and physical buildings. In essence, this form of testing means that the security measures are taken into consideration. Then you will know for sure whether all security measures are working effectively or not.

Do you know how effective your security controls are?

Intelligence & Social Engineering

All kinds of information can be collected through the Internet, Social Media and people themselves. Think of personal data, but also financial and other sensitive data and this applies to both individuals and companies! We can search these sources for undesirable information sharing.

How much data do you leak unknowingly?

Scans, Pen-tests & Red-teaming

Below you will find an overview of our services in the field of vulnerability scans, penetration tests and red-teaming. After all, in the field of researching the technical condition of your environment, you are at the right address.

U

Vulnerability-scan

Do you have a website, application, cloud service or IT infrastructure that you want to have security scanned or tested? We can carry out a vulnerability-scan and -assessment and pen-test for you, in which we will investigate whether the ingredients for the recipe of a hack or data-leak are exists. Based on the findings, we also enable you to solve the problems that have been found.

Ask us today to execute a test to investigate the overall security of your environment.

Red-teaming

We can also carry out so-called Red-teaming tests. In short, this means that we will test the security measures of your organization, and this can be the guard at the entrance, right down to entrance gates at the data center. We look at how far we can get breach your organization and what defects we encounter along the way. Finally, we help you find solutions for the findings.

Red-teaming is the challenge for your set of security measures for people, process and technology!

Request an obligation-free quotation

Including aftercare and advice

Intelligence & Social Engineering

Finding information via the Internet, social media and people themselves is something we are trained and practiced in. Because we unknowingly leak more than we think and want, and we can therefore figure it out for you. You can read more about this below.

Open Source Intelligence

Open Source Intelligence (OSINT), and Social Media Intelligence (SOCMINT) are research methods for collecting information from public sources. Think of the Internet, Social Media, the library and other forms of publicly available information. This can go from a “due diligence” investigation to finding fraudsters active on your web store.

Would you like to have a thorough online investigation and want to learn more about what can be found online? Then we would like to hear from you.

Social Engineering

Social Engineering is the practice, or actually art, of getting information from people. A Social Engineering test can be very useful to test whether your awareness campaigns actually work. Does your HR department just pass on Social Security numbers by phone? Or does your IT engineer tell you if there are any issues? We will look in to it for you!

We can investigate this often unknowingly way of leaking data and that helps you to give a boost to your awareness trainings.

Request an obligation-free quotation

Including aftercare and advice