Our managed service provides continuous vulnerability scans on clients networks and applications. They are performed and monitored by our security experts who will propose a solution to your development team and validate after remediation.


Our application security experts help you to secure your development lifecycle: coaching, training of developers, automated code review with managed services from Checkmarx, ... All what is needed to produce secure code!


To secure websites and web applications in the cloud, we offer a SecurityasaService (SaaS) solution trough the use of Web Application Firewalls (WAF), a shield that detects and blocks attacks. It gives clients full visibility in the attacks against their web application.


Our penetration testing team is specialised in ethical hacking. They execute penetration tests on networks, infrastructures, WiFi, web and mobile applications, Internet of Things and industrial systems.


We offer companies a security advisor/consultant on demand to develop a strategy and a longterm approach to security within their organisation. Our experts have over a decade in experience aiding our clients in developing and guiding them towards the most optimal security strategy.


Our training center provides technical trainings about application security, hacking of websites,... At our office or onsite, we can teach you and your team the techniques commonly used to violate and exploit corporate networks, as well as the security techniques used to protect you against these attacks.

Training & Events

04/24/2017 - 09:00 to 04/28/2017 - 17:00
05/03/2017 - 09:00 to 05/04/2017 - 17:00

A standard reverse proxy such as ModSecurity depends on known patterns delivered by the community. The power of our WAF-solution is its self-learning nature and its scalability.

Erwin Geirnaert
Chief Hacking Officer

Not sure yet?

Get in touch with us or take our free trial.

Latest blogs

20 Mar '17 0 By Dario Incalza

Nowadays, smartphones are becoming more and more our first go-to device. For every task that you might think off, chances are, there is a mobile application that allows you to do that on your mobile device. Interestingly, the Chinese smartphone manufacturing market is rising in a fast pace. We see that popular and trustworthy companies like Huawei, Oppo and Meizu are slowly entering and conquering the US and European markets (Gartner, 2016). In addition, we also see a lot of small scale Chinese smartphone manufacturers appearing that offer cheap mobile devices. Privacy and security has always been an issue on mobile devices and applications. Even the big players sometimes fail to effectively protect their customers. We wanted to know how these small-scale manufacturers handle their users and their data. We will discuss how a small-scale Chinese manufacturer decided to design and implement an Android mobile device that acts, looks and behaves as an iPhone 6S device. We bought this device for 150 EUR, which is allegedly designed by Apple in California and assembled in China.

26 Jan '17 0 By Koen Vanderloock

Two 14 year old students found a XSS vulnerability in a popular HTML comment box. Hackers Karim Rahal and Ibram Marzouk found multiple cross-site scripting vulnerabilities in the component. Rahal was able to bypass the developer's cross-site scripting filters.

07 Apr '16 0 By rborgions

Voor het eerst heeft een Belgische toepassing voor internetbankieren uren platgelegen door een cyberaanval. Virtuele vandalen hebben zo flink wat economische schade aangericht.

07 Dec '15 0 By egeirnaert

Purchase of 60% of company shares allows both companies to accelerate growth in the increasingly strategic security market