Security assessment (external)

The internet is continuously "scanned" and the results of this can often be found in public sources. During this research, we will dig into this in order to map out the "exposure" of your organization from a security perspective.

We use the OSINT-Framework. We will search the internet for information related to your organization, about systems, people, documents, backups, passwords, archives and so on.

Working method

Our investigations into external enterprise networks go through these phases:

We start with a discussion about the collaboration and test approach.


We look for sensitive information related to your organization in various public sources.

We document our findings and personalized advice in a comprehensive test report.

We hand over the report, discuss the main points with you and think along about pragmatic solutions.

Next steps
We will discuss possible follow-up steps with you. We also recommend a "Internal Investigation".

We remain available to you for questions, retests and advice.

Ethical hackers die samen naar een kwetsbaarheid kijken


No organization is the same, and the same applies to the information that can be found about it. Therefore, a security investigation into your public 'exposure' is always custom-made.

Of course, you can limit the scope of the investigation to control costs. We would be happy to provide you with more information.

Getting started

Do you want permanent assurance about the secure setup of your servers or sites? Contact us now for a non-committal introductory meeting.

Contact us