Solutions

ZIONVERIFIED

Our managed service provides continuous vulnerability scans on clients networks and applications. They are performed and monitored by our security experts who will propose a solution to your development team and validate after remediation.

ZIONSDLC

Our application security experts help you to secure your development lifecycle: coaching, training of developers, automated code review with managed services from Checkmarx, ... All what is needed to produce secure code!

ZIONSECURED

To secure websites and web applications in the cloud, we offer a SecurityasaService (SaaS) solution trough the use of Web Application Firewalls (WAF), a shield that detects and blocks attacks. It gives clients full visibility in the attacks against their web application.

ZIONLABS

Our penetration testing team is specialised in ethical hacking. They execute penetration tests on networks, infrastructures, WiFi, web and mobile applications, Internet of Things and industrial systems.

ZIONSTRATEGY

We offer companies a security advisor/consultant on demand to develop a strategy and a longterm approach to security within their organisation. Our experts have over a decade in experience aiding our clients in developing and guiding them towards the most optimal security strategy.

ZION UNIVERSITY

Our training center provides technical trainings about application security, hacking of websites,... At our office or onsite, we can teach you and your team the techniques commonly used to violate and exploit corporate networks, as well as the security techniques used to protect you against these attacks.

Training & Events

06/01/2017 - 09:00 to 06/02/2017 - 17:00

A standard reverse proxy such as ModSecurity depends on known patterns delivered by the community. The power of our WAF-solution is its self-learning nature and its scalability.

Erwin Geirnaert
Chief Hacking Officer

Not sure yet?

Get in touch with us or take our free trial.

Latest blogs

23 May '17 0 By egeirnaert

The EternalBlue exploit is not to be underestimated because no user interaction is needed to compromise a system. Many malicious hackers will use this exploit to attack systems because it is so easy and successful.

When new malware spreads silently by just exploiting machines and then wait for further instructions, there will be a lot more infections then that we have seen in the last week. A new variant is already in the wild, UIWIX, waiting 24 hours to start malicious activity.

15 May '17 0 By egeirnaert

Wannacry infected 200.000 machines on Friday 12 May 2017. Read here what to do and how to protect your organisation

28 Apr '17 0 By Dario Incalza

Recently, at ZIONLABS, we performed a security assessment of the Android runtime running on the Chrome operating system (ChromeOS). This runtime allows Chromebook users to install and use Android applications. In this blog post we discuss our findings and recommendations regarding the security posture of an Android application running on a Chromebook.

09 Apr '17 0 By Dario Incalza

Google has released a developer preview for their next major Android release. This release will be called Android O and will get the version number 8.0. The first public stable release is rumored to be in May, right around the time Google I/O 2017 will take place. In this blog post we will take a closer look at the announced security changes for this new version of Android.