Ask us a question

You are here

Securing your applications

Securing your applications

In the landscape of cyber-threats, “web application attacks” are ranked third according to the “2017 ENISA Threat Landscape Report”. Not only are these attacks increasingly frequent, but they can also lead to disastrous consequences: massive data leaks, fraudulent transactions or damage to reputation.

Pushing the security of your web applications to one side is no longer an option. Application security is essential and this is where you can rely Approach's core expertise.


Our approach: securing the full stack

To protect web applications, companies will often only focus on penetration-testing, i.e. making an assessment of the security of your applications after the fact, whereas advance security checks are of major importance.

We therefore strongly advise our customers to include security controls in their Software Development Life-Cycle (Secure SDLC). We offer a uniquely comprehensive but pragmatic approach, considering every layer in the application stack and fully integrating security as part of your SDLC (non-exhaustive):

  • Assess security threats and risks to business applications
  • Integrate security into application requirements
  • Secure development environments, practices and coding techniques
  • System hardening of web, application and database servers
  • Select, configure and manage a Web Application Firewall (WAF)
  • Train and coach IT Staff on security issues
  • Security Watch & Vulnerability Management
  • Cover compliance and certification needs (e.g. PCI-DSS, GDPR, ISAE, SysTrust, WebTrust, ETSI, HIPAA, etc.)
  • Secure decommissioning of obsolete applications


The major advantages of our integrated approach can be summarised as follows:

  • All aspects of security are covered, which ensures that there are no grey areas to create a security hole
  • As the approach is logically integrated, the total time & money investment is highly optimised (ROI)
  • Because we align development, infrastructure and operations parties, malfunctions due to security settings, rules and limitations are significantly reduced, thereby increasing the availability of services


Our services

Approach can help your organisation to protect its applications totally and sustainably by:

  • Assessing the current level of security of your environments, by performing penetration testing, reviewing your architecture, assessing the current risk of your business applications or assessing your technical landscape.
  • Training people about security
  • Assisting in securing your environments.
  • Assisting in controlling the relationship with third-party suppliers.
  • Watching and reporting on security and the development of threats.


Client references

itsme (by Belgian Mobile ID) - Approach

"In Approach, we found the ideal partner to build the breakthrough technology and processes we need for a highly secure itsme solution".   Kris De Ryck, CEO Belgian Mobile ID

“Thanks to Approach's intrusion tests and recommendations, we higher a lot our security level before being exposed to an attack.”  Alexandre Lienard, Chief Information Security Officer, Nethys Group

Isabel Group - Approach

"Approach is uniquely positioned to support ISABEL securing tomorrow digital banking and corporate identity solutions."  Jean De Crane, CEO Isabel Group

For more than 8 years now, Approach has been providing application security consulting, support services and security watch services to bpost

For more than 15 years, Approach has been providing support and maintenance services for high security and availability environments.

Approach advises the European Institutions in the field of Business Continuity Management, SOC and Application Security

"For more than 10 years now, Approach has been helping NATO, maintaining an extremely high level of security for applications managing restricted information".   Dimitris Stavrakis, Head of NATO Standardization Office

LuxTrust - Approach

"Thanks to Approach, we were able to provide our partners and customers with a solution combining high security and smooth integration."  Stéphane RIES, Deputy CEO & COO, LuxTrust

“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.”  Koen Reyniers, COO BENELUX EDENRED

"The Approach WAF solution is protecting our key eBanking applications already for some years. The tailor-made solution meets our needs and it follows the technological evolutions (API, cloud, ...). The high security level of the solution combined with the responsive support team makes this a solid and effective service."  Mathieu Desmet, CIO CPH Bank

" Approach is providing us with their solution as managed service since 2007. The low cost adapted to a start-up was the key decision factor, but the very high availability we had during huge attacks proved the maturity of the product. It smoothly supported our migrations over the years (development frameworks, cloud infrastructure, ...), without being distracted by security concerns and technical issues. " Frederic Tais, ATLAS Expat Operations Manager

Publications & events

Published on 12 October 2018

How do you deal with low risk level vulnerabilities ?

Nothing should be left behind when speaking in terms of security...  A story by David Bloom, Cyber-Security Consultant at Approach.
Read more

25October

Mechelen - Lamot Congres (1 day )

Approach at the Belgian Cyber Security Convention

Our cyber-security experts will organise an interactive game "How I hacked a folder". Be one of the actor of this...
Read more

26September

Axis Parc (4 hours)

WAF open forum: is the technology mature?

Isaca Belgium and Approach are pleased to welcome you to the open forum " Web Application Firewalls: is the technology mature" ...
Read more

Published on 04 September 2018

How I hacked a cheap IoT and how it could have been prevented

As a cyber-security company, we regularly create internal contests. The latest one was focusing on the hacking of an IoT application.
Read more

Published on 05 June 2018

Approach is recruiting IT Security experts

The Waldorado team from RTL TVI visited us to know more about our activites and the profiles we are recruiting.  Watch the movie !
Read more

31May

Namur Expo (1 day )

Approach at ICT Infrastructure Namur

Meet us during ICT Infrastructure Exhibition on May 31st.
Read more

Published on 04 April 2018

Rise of DDoS Amplification Attacks

Since the end of February 2018, we’ve seen a rise of DDoS Amplification attacks, with in some case more than 1Tbps of traffic generated. ...
Read more

Published on 21 March 2018

Data News Award Excellence 2018 - Approach nominations

Approach is nominated twice for the Data News Awards for Excellence 2018: Cyber-security Innovator & Scale-up Company.  Why voting for...
Read more

Published on 26 February 2018

Can we really trust an antivirus when it comes to unknown threats?

Approach CSIRT Team reproduced a similar attack in its lab ...
Read more

14March

Brussels Expo (2 days)

Approach at Infosecurity

Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Read more

Published on 14 December 2017

Approach service offering and mission - brochure

We enable our customers to succeed by delivering state‑of‑the‑art solutions to cyber‑security challenges.
Read more

Published on 14 December 2017

Approach acquires Software Development company TInSys

Approach is to take over TInSys (Total Integration Systems), a Belgian medium sized software development company, specialising in mobile apps...
Read more

Our approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:

1

Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.

2

Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.

3

Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results.

+
Certified professionals
0+
Success stories
0
Year of establishment
+ 0%
Average annual growth