Services we offer

Penetration Testing

We specialize in penetration testing, and we test everything from IT infrastructure, Active Directory, web applications and smartphone apps to vehicles, marine vessels and embedded devices. Our pentest reports include concise issue descriptions, concrete evidence, security risk assessments as well as recommendations for remediation and mitigation.

Adversary simulation

Red Team, or adversary simulation aims to evaluate your detect-and-response capabilities should a threat actor breach your network.

Secure code review

We conduct extensive secure code review of application code, cryptographic implementations, cloud infrastructure and hardware designs.

Threat Landscape Assessment (TLA)

We perform extensive, passive, gathering of intelligence about your environment to assess your security perimeter, online footprint and attack surface.

Secure design

Designing secure applications and networks is hard and it's often very useful to have an experienced security expert help you out in this process.

Security advisory

We can help you create and maintain a security culture at your company as well as we can be your eyes and ears in the security community.

Training

Security training, breakfast seminars, interactive hackathons, security workshops or whatever fits your needs.

Threat & Risk

Workshops and general advisory on threat analysis and risk assessments, with expert perspective on security risks and threats.