You are here
We provide Security Advisory Services across all industries covering the entire cyber‑security value chain, from governance and strategy through to resilient technical designs, architectures and implementations.
What we do:
- Advise in achieving compliance with security standards, regulations and laws (such as ISO and GDPR)
- Define and implement your security strategic, risk treatment and action plan
- Ensure a continuous improvement process for your cyber‑security
- Prepare for and guide you through a security certification process (such as ISO27001 or ISAE/SOC reports)
- Define and implement your security policies, standards, processes and detailed procedure
- Integrate security best practices into your projects and software development lifecycle
- Provide the cyber‑security niche expertise that is not available in‑house to achieve your security projects
- Select, acquire and implement security solutions (AV, SIEM, WAF, etc.)
- And many other things we would love to tell you about...
We make use of a wide range of assets and proven methodologies
What really makes the difference when our consultants start an assignment at a client is their ability to quickly mobilise the resources and skills necessary to achieve the highest return on investment.
We make use of the most advanced tools and solutions to support our advisory services. This allows us to be more efficient during delivery, as well as to enforce the use of standard auditable methods and provide transparency about our achievements and your results.
Do you need cyber-security advisory?
Please contact us
"Approach helped us to define a very clear and structured roadmap for implementing our GDPR compliance programme. Approach came up with a pragmatic and straightforward methodology covering the full spectrum of the GDPR, complete with a properly controlled budget and timeline". Michel Ziegelshiffer, Risk and Compliance Director Volkswagen D'Ieteren Finance
“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.” Koen Reyniers, COO BENELUX EDENRED
"The Approach WAF solution is protecting our key eBanking applications already for some years. The tailor-made solution meets our needs and it follows the technological evolutions (API, cloud, ...). The high security level of the solution combined with the responsive support team makes this a solid and effective service." Mathieu Desmet, CIO CPH Bank
Publications & events
Published on 04 December 2017
GDPR - why a CISO!
DO I need a CISO? Can the CISO be a DPO? ... Download our white paper to learn more.
Published on 11 December 2017
Approach, l’un des acteurs derrière Itsme
Approach est l’une des discrètes chevilles ouvrières derrière la solution d’identification sécurisée Itsme, dévoilée récemment....
Published on 14 December 2017
Approach service offering and mission - brochure
We enable our customers to succeed by delivering state‑of‑the‑art solutions to cyber‑security challenges.
Published on 14 December 2017
Our approach and services to GDPR - brochure
Make sure you comply with the new GDPR by using our proven methodology! Download our brochure to learn more.
Brussels Expo(2 days)
Approach at Infosecurity
Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Published on 26 February 2018
Can we really trust an antivirus when it comes to unknown threats?
Approach CSIRT Team reproduced a similar attack in its lab ...
Published on 28 September 2017
Europe actively looking at Data Protection
Read the interview of Laurent Deheyer and Michaël Raison in the Info Enterprendre magazine
Published on 22 February 2018
Itsme is ready for the mass market (NL)
Itsme has been activated 125,000 times already. Via the smartphone app, you can log into your e-bank and other applications. Its...
Published on 27 February 2018
Securing your company against SPECTRE/MELTDOWN
Many articles, security bulletins, news and papers have been published so far on how these vulnerabilities can be addressed. This article...
Published on 04 April 2018
Rise of DDoS Amplification Attacks
Since the end of February 2018, we’ve seen a rise of DDoS Amplification attacks, with in some case more than 1Tbps of traffic generated. ...
Namur Expo(1 day )
Approach at ICT Infrastructure Namur
Meet us during ICT Infrastructure Exhibition on May 31st.
Published on 05 June 2018
Approach is recruiting IT Security experts
The Waldorado team from RTL TVI visited us to know more about our activites and the profiles we are recruiting. Watch the movie !
Axis Parc (4 hours)
WAF open forum: is the technology mature?
Isaca Belgium and Approach are pleased to welcome you to the open forum " Web Application Firewalls: is the technology mature" ...
Mechelen - Lamot Congres(1 day )
Approach at the Belgian Cyber Security Convention
Our cyber-security experts will organise an interactive game "How I hacked a folder". Be one of the actor of this...
Published on 12 October 2018
How do you deal with low risk level vulnerabilities ?
Nothing should be left behind when speaking in terms of security... A story by David Bloom, Cyber-Security Consultant at Approach.