Our penetration testing team is specialised in ethical hacking. They execute penetration tests on networks, infrastructures, WiFi, web and mobile applications, Internet of Things and industrial systems.


Our application security experts help you to secure your development lifecycle: coaching, training of developers, automated code review with managed services from Checkmarx, ... All what is needed to produce secure code!


ZIONSECURITY offers information security governance, risk management and compliance services, executed by a substantial team of senior Business Information Security experts with vast experience and a proven track record in various industry segments.

The trick is to handle the threat before it impacts your business.

Christophe Thyssen
Business Unit Manager

Not sure yet?
Get in touch with us or take our free trial.

Latest blogs

23 Aug '19 0 By Laurens

The arrival of Jan De Bondt and Wim Van Langenhove strengthens the 360deg approach to cyber security.

21 Feb '19 0 By Laurens

The acquisition is in line with SecureLink's strategic vision on the challenging security market

02 Oct '17 1 By Laurens

Social engineering is social hacking -or a popular way of stealing information- manipulating the 'human being' as the weakest link. This typical social engineering attack, usually a phone scam, has been popular for years. The victims get tricked into believing their computers have been updated with security features while in reality their computer hasve been compromised. Many people fall for this type of scam resulting in time loss and all too often financial damage. We believe the main reason for this is because they target people who lack (deep) technical knowledge and interest of how their computer and the online world works.

27 Sep '17 0 By Laurens

Standard caching mechanisms such as varnish offer a great deal of performance. It has been built from the ground up to be a dedicated reverse proxy cache so it doesn't have legacy functionality and code, making it fast & highly responsive. While this is great for performance, this doesn't bring any extra added security. Since initial requests are still being server to the back-end this can cause for vulnerabilities to be more apparent and visible to a wider range of users because of the cache time.