Our managed service provides continuous vulnerability scans on clients networks and applications. They are performed and monitored by our security experts who will propose a solution to your development team and validate after remediation.


Our application security experts help you to secure your development lifecycle: coaching, training of developers, automated code review with managed services from Checkmarx, ... All what is needed to produce secure code!


To secure websites and web applications in the cloud, we offer a SecurityasaService (SaaS) solution trough the use of Web Application Firewalls (WAF), a shield that detects and blocks attacks. It gives clients full visibility in the attacks against their web application.


Our penetration testing team is specialised in ethical hacking. They execute penetration tests on networks, infrastructures, WiFi, web and mobile applications, Internet of Things and industrial systems.


We offer companies a security advisor/consultant on demand to develop a strategy and a longterm approach to security within their organisation. Our experts have over a decade in experience aiding our clients in developing and guiding them towards the most optimal security strategy.


Our training center provides technical trainings about application security, hacking of websites,... At our office or onsite, we can teach you and your team the techniques commonly used to violate and exploit corporate networks, as well as the security techniques used to protect you against these attacks.

Training & Events

05/03/2017 - 09:00 to 05/04/2017 - 17:00
05/15/2017 - 09:00 to 05/17/2017 - 17:00

A standard reverse proxy such as ModSecurity depends on known patterns delivered by the community. The power of our WAF-solution is its self-learning nature and its scalability.

Erwin Geirnaert
Chief Hacking Officer

Not sure yet?

Get in touch with us or take our free trial.

Latest blogs

28 Apr '17 0 By Dario Incalza

Recently, at ZIONLABS, we performed a security assessment of the Android runtime running on the Chrome operating system (ChromeOS). This runtime allows Chromebook users to install and use Android applications. In this blog post we discuss our findings and recommendations regarding the security posture of an Android application running on a Chromebook.

09 Apr '17 0 By Dario Incalza

Google has released a developer preview for their next major Android release. This release will be called Android O and will get the version number 8.0. The first public stable release is rumored to be in May, right around the time Google I/O 2017 will take place. In this blog post we will take a closer look at the announced security changes for this new version of Android.

30 Mar '17 0 By Koen Vanderloock

When I started working in IT as a Java Developer in 2004, I was confronted with one of the first MVC frameworks called Struts. It was not always as easy because it could take you up to 4 hours to add a field to web form. Soon other technologies like JSF and later Spring appeared and Struts lost lots of popularity. Of course, there are still lots of applications that run on Struts and new versions are still released.

20 Mar '17 0 By Dario Incalza

Nowadays, smartphones are becoming more and more our first go-to device. For every task that you might think off, chances are, there is a mobile application that allows you to do that on your mobile device. Interestingly, the Chinese smartphone manufacturing market is rising in a fast pace. We see that popular and trustworthy companies like Huawei, Oppo and Meizu are slowly entering and conquering the US and European markets (Gartner, 2016).