Ask us a question

You are here

Security Assessment

Assess your security to safeguard your business and compliance
Measure your achievements and identify opportunities for improvement
Find out where your vulnerabilities lie and how to eradicate them

Security Assessment

With our highly skilled staff of specialists and seasoned security professionals, we provide a full range of services and support solutions to help our clients run remarkably effective security assessments.

We provide a broad panel of Assessment Services tailored to your needs and timetable.

  • Security risk and maturity assessment
  • Compliance check with regulations, standards and leading practices (GDPR, ISO, etc.)
  • Penetration/Intrusion testing and vulnerability scanning (black or white box)
  • Architecture, design and code review
  • Development practices and SDLC review
  • Assessment of current security solutions and implementation (Antivirus, firewall, WAF, etc.).
  • Pre‑audits (for certification)
  • Business Impact Assessment for your Business Continuity Plan


By assessing your security and compliance, you will be able to provide answers to the following vital issues:

  • Are your applications and IT systems an easy target for hackers?
  • How confident are you about your security and compliance posture and the level of security threats, risks and vulnerabilities your organisation faces?
  • How should you prioritise your security initiatives and investments?
  • Do you have solutions to quickly and efficiently obtain the right level of information that will enable you to make informed decisions about future plans?
  • Do you need solutions to monitor and measure the performance and ROI of your security and compliance programmes and controls?
  • Do your providers, suppliers and partners offer a sufficient level of trust?


Our Assessment Services come into their own when you need to obtain transparency and control about your current security and compliance posture. Typically when:

  • You need to understand how secure your organisation and/or your third‑party suppliers are before an incident occurs
  • You initiate a certification programme (such as ISO27001) and compliance programme (such as the GDPR)
  • You need to prepare for an upcoming audit or as a follow‑up to a previous audit
  • You need to plan and create a budget for your security improvement and compliance programme
  • You have been hacked, or after an incident
  • As part of a continuous improvement process, you need to monitor the progress, performance and residual risks of your programme

Do you need to obtain transparency and control?  
Please contact us

Client references

itsme (by Belgian Mobile ID) - Approach

"In Approach, we found the ideal partner to build the breakthrough technology and processes we need for a highly secure itsme solution".   Kris De Ryck, CEO Belgian Mobile ID

“Thanks to Approach's intrusion tests and recommendations, we higher a lot our security level before being exposed to an attack.”  Alexandre Lienard, Chief Information Security Officer, Nethys Group

Approach advises the European Institutions in the field of Business Continuity Management, SOC and Application Security

"Approach helped us to define a very clear and structured roadmap for implementing our GDPR compliance programme.  Approach came up with a pragmatic and straightforward methodology covering the full spectrum of the GDPR, complete with a properly controlled budget and timeline".  Michel Ziegelshiffer,  Risk and Compliance Director Volkswagen D'Ieteren Finance

“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.”  Koen Reyniers, COO BENELUX EDENRED

" Approach is providing us with their solution as managed service since 2007. The low cost adapted to a start-up was the key decision factor, but the very high availability we had during huge attacks proved the maturity of the product. It smoothly supported our migrations over the years (development frameworks, cloud infrastructure, ...), without being distracted by security concerns and technical issues. " Frederic Tais, ATLAS Expat Operations Manager

Publications & events

Published on 04 December 2017

GDPR - why a CISO!

DO I need a CISO? Can the CISO be a DPO?  ... Download our white paper to learn more. 
Read more

Published on 11 December 2017

Approach, l’un des acteurs derrière Itsme

Approach est l’une des discrètes chevilles ouvrières derrière la solution d’identification sécurisée Itsme, dévoilée récemment....
Read more

Published on 14 December 2017

Approach service offering and mission - brochure

We enable our customers to succeed by delivering state‑of‑the‑art solutions to cyber‑security challenges.
Read more

Published on 14 December 2017

Our approach and services to GDPR - brochure

Make sure you comply with the new GDPR by using our proven methodology! Download our brochure to learn more.
Read more


Brussels Expo(2 days)

Approach at Infosecurity

Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Read more

Published on 26 February 2018

Can we really trust an antivirus when it comes to unknown threats?

Approach CSIRT Team reproduced a similar attack in its lab ...
Read more

Published on 28 September 2017

Europe actively looking at Data Protection

Read the interview of Laurent Deheyer and Michaël Raison in the Info Enterprendre magazine 
Read more

Published on 06 March 2018

Why compliance monitoring is critical for your business? 

With regulatory requirements continuously increasing, compliance and risk management should be a business process for all organisations.  
Read more

Published on 04 April 2018

Rise of DDoS Amplification Attacks

Since the end of February 2018, we’ve seen a rise of DDoS Amplification attacks, with in some case more than 1Tbps of traffic generated. ...
Read more

Published on 13 April 2018

Replay of the RTL TVI show "Tout s'explique" dedicated to cyber-security

During the interview,  we had the opportunity to demonstrate, in a popularized way, how easy it is for a third-party application to...
Read more


Namur Expo(1 day )

Approach at ICT Infrastructure Namur

Meet us during ICT Infrastructure Exhibition on May 31st.
Read more

Published on 05 June 2018

Approach is recruiting IT Security experts

The Waldorado team from RTL TVI visited us to know more about our activites and the profiles we are recruiting.  Watch the movie !
Read more

Published on 04 September 2018

How I hacked a cheap IoT and how it could have been prevented

As a cyber-security company, we regularly create internal contests. The latest one was focusing on the hacking of an IoT application.
Read more


Axis Parc (4 hours)

WAF open forum: is the technology mature?

Isaca Belgium and Approach are pleased to welcome you to the open forum " Web Application Firewalls: is the technology mature" ...
Read more


Mechelen - Lamot Congres(1 day )

Approach at the Belgian Cyber Security Convention

Our cyber-security experts will organise an interactive game "How I hacked a folder". Be one of the actor of this...
Read more

Published on 12 October 2018

How do you deal with low risk level vulnerabilities ?

Nothing should be left behind when speaking in terms of security...  A story by David Bloom, Cyber-Security Consultant at Approach.
Read more

Published on 31 October 2018

ModSecurity extensions by Approach Belgium

Download the additional input filters developed by Approach for ModSecurity.  
Read more

Published on 27 November 2018

Test Achats/Test Aankoop pentests on Belgian e-shops: outlaw methods for hasty conclusions?

Test Achats tested the security of 100 online shops. Was this initiative legal? Are 55 e-commerce sites really vulnerable? 
Read more

Our approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:


Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.


Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.


Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results.

Certified professionals
Success stories
Year of establishment
+ 0%
Average annual growth