Ask us a question

You are here

Securing your infrastructure

Securing your infrastructure: a never-ending story

Infrastructure vulnerabilities and misconfigurations are one of the most common vectors of cyber-attacks. Unfortunately, in the past few years, we have seen an explosive increase in reported vulnerabilities and security flaws. How can a company deal with what might otherwise be seen as a never-ending hassle?

Our approach: securing the full stack

Made popular by Vauban, with his multi-layered fortifications engineered in the 17th century, our strategy relies in adding multiple layers of defences by securing the full stack (also known as in-depth security).

While some companies will rely on a firewall alone, we strongly advise our customers to include security controls throughout the whole infrastructure, for every layer and component. We propose a unique, comprehensive but pragmatic approach, which fully integrates security in every layer and component of your infrastructure (non-exhaustive):

  • Design secured network architectures (zoning, tunnelling, end-to-end encryption, etc.)
  • Secure wired and wireless networks;
  • Implement network firewalls and Web Application Firewalls (WAF);
  • Harden systems;
  • Continuous vulnerability scanning and management
  • Implement Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM).
  • Secure operational processes (system administrators segregation, securing remote accesses, implementing jump stations, etc.)
  • Secure your applications

Our services

APPROACH can help your organisation to protect its infrastructure totally and sustainably by:

  • Assessing the current level of security of your environments, by performing penetration testing, reviewing your architecture, assessing the current risk of your business applications or assessing your technical landscape.
  • Training people about security.
  • Assisting in controlling the relationship with third-party suppliers.
  • Watching and reporting on security and the development of threats.

Client references

Itsme (by Belgian Mobile ID) - Approach

"In Approach, we found the ideal partner to build the breakthrough technology and processes we need for a highly secure itsme solution".   Kris De Ryck, CEO Belgian Mobile ID

Itsme (by Belgian Mobile ID)

“Thanks to Approach's intrusion tests and recommendations, we higher a lot our security level before being exposed to an attack.”  Alexandre Lienard, Chief Information Security Officer, Nethys Group


For more than 8 years now, Approach has been providing application security consulting, support services and security watch services to bpost


For more than 15 years, Approach has been providing support and maintenance services for high security and availability environments.


Approach advises the European Institutions in the field of Business Continuity Management, SOC and Application Security

European Institutions

"For more than 10 years now, Approach has been helping NATO, maintaining an extremely high level of security for applications managing restricted information".   Dimitris Stavrakis, Head of NATO Standardization Office

LuxTrust - Approach

"Thanks to Approach, we were able to provide our partners and customers with a solution combining high security and smooth integration."  Stéphane RIES, Deputy CEO & COO, LuxTrust

EASI - Approach

"Approach brings expertise and leadership during our Cloud2be ISO27001 certification project, a strategic goal for EASI".  Jean Michel Block, Managing Partner EASI


“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.”  Koen Reyniers, COO BENELUX EDENRED


Publications & events

Published on 27 February 2018

Securing your company against SPECTRE/MELTDOWN

Many articles, security bulletins, news and papers have been published so far on how these vulnerabilities can be addressed.  This article...
Read more

Published on 26 February 2018

Can we really trust an antivirus when it comes to unknown threats?

Approach CSIRT Team reproduced a similar attack in its lab ...
Read more


Brussels Expo (2 days)

Approach at Infosecurity

Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Read more

Published on 14 December 2017

Approach service offering and mission - brochure

We enable our customers to succeed by delivering state-of-the-art solutions to cyber-security challenges.
Read more

Our Approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:


Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.


Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.


Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results

Certified professionals
success stories
Year of establishment
+ 0%
average annual growth