As an independent ICT security consulting partner, we offer innovative services and solutions for the effective exchange of information in a secure working environment.
Our way of working is based on a three-phase model that approaches security from a holistic, methodological yet practical perspective.
We are first and foremost result-driven.
We assess your organisation’s evident and latent needs in ICT security. We detect vulnerabilities and reduce them to controllable risks. We give recommendations to obtain the most effective interaction between people, information and environment.
We give you guidance to cover your ICT security needs. We determine the optimal strategies, together with the most convenient technologies and solutions. That way you can move to implementation in a well-informed and structured way.
We assist your organisation with the implementation of your ICT security policy. We supervise the integration of all risk management technologies involved. As an independent third party, we bring strong added value to the integration process.
There are several large and small companies that offer ICT Security Services. Why should you decide to work with us?
We are independent from product vendors and integrators. You can trust that the advice we bring is unbiased.
Experts in every domain
We have a team of experts that each have their own field of expertise. That way we can always put the right person in the right place.
We are at our best when we can combine our fields of knowledge to create a solution tailored to your needs.
Methodological yet pragmatic
We have a very methodological approach and use well acknowledged security frameworks and standards, but in a very pragmatic way.
We value the knowledge our people bring to the team and help them deepen and widen it. We share knowledge within Toreon and with clients.
Long term thinking
We are always looking for long term relationships of trust with our clients to achieve a higher security maturity that brings value to their business.
Last week Thursday we delivered our presentation "Embedding GDPR in the SDLC" at the OWASP AppSec Europe conference in Belfast.
The presentation is the outcome of various projects where we encounter both privacy and application security challenges.
https://www.toreon.com/wp-content/uploads/2017/05/keep-calm-and-prepare-for-the-gdpr.png700600Sebastien Deleersnyder/wp-content/uploads/2016/07/logo.pngSebastien Deleersnyder2017-05-18 07:19:482017-05-18 07:27:06Presentation "Embedding GDPR in the SDLC" available for download
I’ve made a magic mirror. You know, a mirror that also shows text, pictures etc. It was the subject of my talk during the Hack In The Box Security Conference. It’s, for everybody that could use a boost of confidence in the morning, would…
https://www.toreon.com/wp-content/uploads/2017/05/MagicMirror.jpg10801920Steven Wierckx/wp-content/uploads/2016/07/logo.pngSteven Wierckx2017-05-11 14:49:282017-05-11 14:49:28Mirror, mirror on the wall. Who is the smartest of them all?
We at Toreon have a strong focus on the security of Internet of Things (IoT). During our technical assessments, it became clear that a lot of IoT devices are built without basic security in mind. The principle of security by design seems farfetched.…
https://www.toreon.com/wp-content/uploads/2017/04/Screen-Shot-2017-04-25-at-09.58.05-1.png10421825David Commers/wp-content/uploads/2016/07/logo.pngDavid Commers2017-04-25 10:22:272017-04-25 10:22:27Toreon teams up with AIOTI to improve security awareness in the IoT space
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.