As an independent ICT security consulting partner, we offer innovative services and solutions for the effective exchange of information in a secure working environment.
Our way of working is based on a three-phase model that approaches security from a holistic, methodological yet practical perspective.
We are first and foremost result-driven.
We assess your organisation’s evident and latent needs in ICT security. We detect vulnerabilities and reduce them to controllable risks. We give recommendations to obtain the most effective interaction between people, information and environment.
We give you guidance to cover your ICT security needs. We determine the optimal strategies, together with the most convenient technologies and solutions. That way you can move to implementation in a well-informed and structured way.
We assist your organisation with the implementation of your ICT security policy. We supervise the integration of all risk management technologies involved. As an independent third party, we bring strong added value to the integration process.
There are several large and small companies that offer ICT Security Services. Why should you decide to work with us?
We are independent from product vendors and integrators. You can trust that the advice we bring is unbiased.
Experts in every domain
We have a team of experts that each have their own field of expertise. That way we can always put the right person in the right place.
We are at our best when we can combine our fields of knowledge to create a solution tailored to your needs.
Methodological yet pragmatic
We have a very methodological approach and use well acknowledged security frameworks and standards, but in a very pragmatic way.
We value the knowledge our people bring to the team and help them deepen and widen it. We share knowledge within Toreon and with clients.
Long term thinking
We are always looking for long term relationships of trust with our clients to achieve a higher security maturity that brings value to their business.
Cybersecurity is a hot topic. The rules are getting increasingly strict – look at the GDPR – and attackers are becoming ever more inventive. So robust protection is vital. Luckily, an acceptable level of protection doesn’t need to cost…
https://www.toreon.com/wp-content/uploads/2017/06/ton_windows.jpg8321251Frederic Tollens/wp-content/uploads/2016/07/logo.pngFrederic Tollens2017-06-22 14:17:352017-06-22 14:17:357 ways to secure your Microsoft network for free
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start with SDLC? Siebe and I explained how and why during the OWASP AppSec Europe conference in Belfast. Couldn’t attend?…
https://www.toreon.com/wp-content/uploads/2017/06/SDL.jpg8111384Sebastien Deleersnyder/wp-content/uploads/2016/07/logo.pngSebastien Deleersnyder2017-06-08 11:25:022017-06-12 16:26:51Embedding GDPR in the secure development lifecycle (SDLC)
Are the requirements for the GDPR compatible with the use of public cloud? That interesting question does not only live amongst our customers, but is also on the mind of the readers of the ICT Magazine Smart Business. I made a thorough analysis…
https://www.toreon.com/wp-content/uploads/2017/05/pexels-photo-335907_s.jpg398594Siebe De Roovere/wp-content/uploads/2016/07/logo.pngSiebe De Roovere2017-05-30 15:44:032017-06-06 10:03:17How compatible is the GDPR with public cloud?
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.