<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=185410355348004&amp;ev=PageView&amp;noscript=1">

IT Security

Security-by-design: committing to security from day one

An optimally secured environment is essential to every online platform and workspace. A firewall and virus scanner no longer suffice. In the current API economy, in which GDPR/AVG are important topics, security has come to mean much more. We work according to the ‘security-by-design’ principle. Although we are not a security company, every project we carry out has a focus on integrating, guaranteeing and monitoring security from day one. That, too, is #PlatformPerfection

Security by design



Security-by-design is a fixed part of our data center, data integration and software development core solutions. We know how to protect data in the infra layer, during transport, and in the application. We draw your attention to risks and challenges, carry out security scans and advise on optimization.

In applications we manage, periodic assessments are a part of the process. We continually review security and compliance and, where necessary, propose improvements.

Our security working method

Unlike software-driven projects, we apply the WADIM principle to security:

You let us know what you want, we let you know what is possible. A common form is As IS - To BE; what do you have now, where are we going.

The current environment is mapped and measured. How is security organized now, how much capacity do you have, and what is still needed to optimize your security?

Based on the workshop, plan and assessment, we create a custom design for the new security measures.

Implement the new measures and focusing on awareness and policy.

Controlling and managing the environment based on an ITSM contract.

Security werkwijze


Security policy


Awareness and policy

Although we are not a IT security firm, we perform assessments and audits in this area if required. We can also help you with firewall, antispam and antivirus products from SonicWall, Proofpoint and F-secure, among others.

Strictly speaking these are not security products, but in our opinion they are an important part of a well thought-out data center solution. What’s more, in our vision security is a continuous process, which is all about awareness and policy – and therefore about people.

Software Development

Software: the engine powering every online platform

Read more


Reliable and Scalable Data Centre Solutions for SMEs

Read more