Ask us a question

You are here

Security Advisory

High-value, timely advisory solutions to overcome your security challenges
Developing and implementing strategic and detailed action plans
Certified experts, advanced tooling and methodologies

Security Advisory

We provide Security Advisory Services across all industries covering the entire cyber-security value chain, from governance and strategy through to resilient technical designs, architectures and implementations.

What we do:

  • Advise in achieving compliance with security standards, regulations and laws (such as ISO and GDPR)
  • Define and implement your security strategic, risk treatment and action plan
  • Ensure a continuous improvement process for your cyber-security
  • Prepare for and guide you through a security certification process (such as ISO27001 or ISAE/SOC reports)
  • Define and implement your security policies, standards, processes and detailed procedure
  • Integrate security best practices into your projects and software development lifecycle
  • Provide the cyber-security niche expertise that is not available in-house to achieve your security projects
  • Select, acquire and implement security solutions (AV, SIEM, WAF, etc.)
  • And many other things we would love to tell you about...

We make use of a wide range of assets and proven methodologies

What really makes the difference when our consultants start an assignment at a client is their ability to quickly mobilise the resources and skills necessary to achieve the highest return on investment.

We make use of the most advanced tools and solutions to support our advisory services. This allows us to be more efficient during delivery, as well as to enforce the use of standard auditable methods and provide transparency about our achievements and your results.


Do you need cyber-security advisory?
Please contact us

Client references

Itsme (by Belgian Mobile ID) - Approach

"In Approach, we found the ideal partner to build the breakthrough technology and processes we need for a highly secure itsme solution".   Kris De Ryck, CEO Belgian Mobile ID

Itsme (by Belgian Mobile ID)

“Thanks to Approach's intrusion tests and recommendations, we higher a lot our security level before being exposed to an attack.”  Alexandre Lienard, Chief Information Security Officer, Nethys Group

Isabel Group - Approach

"Approach is uniquely positioned to support ISABEL securing tomorrow digital banking and corporate identity solutions."  Jean De Crane, CEO Isabel Group

Isabel Group

For more than 8 years now, Approach has been providing application security consulting, support services and security watch services to bpost


Approach advises the European Institutions in the field of Business Continuity Management, SOC and Application Security

European Institutions

"Approach helped us to define a very clear and structures roadmap for implementing our GDPR compliance programme.  Approach came up with a pragmatic and straightforward methodology covering the full spectrum of the GDPR, complete with a properlky controlled budget and timeline".  Michel Ziegelshiffer,  Risk and Compliance Director Volkswagen D'Ieteren Finance

Volkswagen D'Ieteren Finance

"For more than 10 years now, Approach has been helping NATO, maintaining an extremely high level of security for applications managing restricted information".   Dimitris Stavrakis, Head of NATO Standardization Office

LuxTrust - Approach

"Thanks to Approach, we were able to provide our partners and customers with a solution combining high security and smooth integration."  Stéphane RIES, Deputy CEO & COO, LuxTrust

EASI - Approach

"Approach brings expertise and leadership during our Cloud2be ISO27001 certification project, a strategic goal for EASI".  Jean Michel Block, Managing Partner EASI


“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.”  Koen Reyniers, COO BENELUX EDENRED


Publications & events

Published on 27 February 2018

Securing your company against SPECTRE/MELTDOWN

Many articles, security bulletins, news and papers have been published so far on how these vulnerabilities can be addressed.  This article...
Read more

Published on 22 February 2018

Itsme is ready for the mass market (NL)

Itsme has been activated 125,000 times already.  Via the smartphone app,  you can log into your e-bank and other applications. Its...
Read more

Published on 28 September 2017

Europe actively looking at Data Protection

Read the interview of Laurent Deheyer and Michaël Raison in the Info Enterprendre magazine 
Read more

Published on 26 February 2018

Can we really trust an antivirus when it comes to unknown threats?

Approach CSIRT Team reproduced a similar attack in its lab ...
Read more


Brussels Expo(2 days)

Approach at Infosecurity

Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Read more

Published on 14 December 2017

Our approach and services to GDPR - brochure

Make sure you comply with the new GDPR by using our proven methodology! Download our brochure to learn more.
Read more

Published on 14 December 2017

Approach service offering and mission - brochure

We enable our customers to succeed by delivering state-of-the-art solutions to cyber-security challenges.
Read more

Published on 11 December 2017

Approach, l’un des acteurs derrière Itsme

Approach est l’une des discrètes chevilles ouvrières derrière la solution d’identification sécurisée Itsme, dévoilée récemment....
Read more

Published on 04 December 2017

GDPR - why a CISO !

DO I need a CISO ? Can the CISO be a DPO?  ... Download our white paper to learn more. 
Read more

Our Approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:


Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.


Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.


Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results

Certified professionals
success stories
Year of establishment
+ 0%
average annual growth