Analyse your security and find the best solutions
Network security architecture and setup
Prepare and test a security incident response plan
Detect security breaches using network and host IDS, SIEM, monitoring, ...
Blackbox and whitebox pentesting, physical pentest, social engineering
Vulnerability scans, code review, policy analysis
Security awareness trainings (HACT.be), technical security trainings
Post breach analysis, file recovery, root cause analysis, memory forensics,...