To close the gap between detecting, fixing and retesting vulnerabilities in your web applications and infrastructure, we scan your web applications and networks at regular intervals.


Facilitate event investigation and gain real-time insight into critical security events impacting your organization. Continuous monitoring and customized reporting tailored to different stakeholder needs.


We offer a Security-as-a-Service for web applications through the use of Web Application Firewalls (WAF) running on a Content Delivery Network in the cloud.


Our team of ethical hackers is able to identify vulnerabilities in any application and network infrastructure.


Together with you we define a Security Strategy Battle plan based on your existing environment, your security controls and your vulnerabilities.


In our gamma we have a wide variety in security training solutions and will come on premise to teach you about the latest trends and techniques.

Training & Events

A standard reverse proxy such as ModSecurity depends on known patterns delivered by the community. The power of our WAF-solution is its self-learning nature and its scalability.

Erwin Geirnaert
Chief Hacking Officer

Not sure yet?

Get in touch with us or take our free trial.

Latest blogs

20 Mar '17 0 By Dario Incalza

Nowadays, smartphones are becoming more and more our first go-to device. For every task that you might think off, chances are, there is a mobile application that allows you to do that on your mobile device. Interestingly, the Chinese smartphone manufacturing market is rising in a fast pace. We see that popular and trustworthy companies like Huawei, Oppo and Meizu are slowly entering and conquering the US and European markets (Gartner, 2016). In addition, we also see a lot of small scale Chinese smartphone manufacturers appearing that offer cheap mobile devices. Privacy and security has always been an issue on mobile devices and applications. Even the big players sometimes fail to effectively protect their customers. We wanted to know how these small-scale manufacturers handle their users and their data. We will discuss how a small-scale Chinese manufacturer decided to design and implement an Android mobile device that acts, looks and behaves as an iPhone 6S device. We bought this device for 150 EUR, which is allegedly designed by Apple in California and assembled in China.

26 Jan '17 0 By Koen Vanderloock

Two 14 year old students found a XSS vulnerability in a popular HTML comment box. Hackers Karim Rahal and Ibram Marzouk found multiple cross-site scripting vulnerabilities in the component. Rahal was able to bypass the developer's cross-site scripting filters.

07 Apr '16 0 By rborgions

Voor het eerst heeft een Belgische toepassing voor internetbankieren uren platgelegen door een cyberaanval. Virtuele vandalen hebben zo flink wat economische schade aangericht.

07 Dec '15 0 By egeirnaert

Purchase of 60% of company shares allows both companies to accelerate growth in the increasingly strategic security market