As an independent ICT security consulting partner, we offer innovative services and solutions for the effective exchange of information in a secure working environment.
Our way of working is based on a three-phase model that approaches security from a holistic, methodological yet practical perspective.
We are first and foremost result-driven.
We assess your organisation’s evident and latent needs in ICT security. We detect vulnerabilities and reduce them to controllable risks. We give recommendations to obtain the most effective interaction between people, information and environment.
We give you guidance to cover your ICT security needs. We determine the optimal strategies, together with the most convenient technologies and solutions. That way you can move to implementation in a well-informed and structured way.
We assist your organisation with the implementation of your ICT security policy. We supervise the integration of all risk management technologies involved. As an independent third party, we bring strong added value to the integration process.
There are several large and small companies that offer ICT Security Services. Why should you decide to work with us?
We are independent from product vendors and integrators. You can trust that the advice we bring is unbiased.
Experts in every domain
We have a team of experts that each have their own field of expertise. That way we can always put the right person in the right place.
We are at our best when we can combine our fields of knowledge to create a solution tailored to your needs.
Methodological yet pragmatic
We have a very methodological approach and use well acknowledged security frameworks and standards, but in a very pragmatic way.
We value the knowledge our people bring to the team and help them deepen and widen it. We share knowledge within Toreon and with clients.
Long term thinking
We are always looking for long term relationships of trust with our clients to achieve a higher security maturity that brings value to their business.
Implementing proper IT governance is a crucial first step on the road to building reliable security solutions. Without processes like change, configuration and problem management, there is absolutely no way to guarantee that the security measures…
https://www.toreon.com/wp-content/uploads/2017/12/FitSM.jpg533800Bram Verbruggen/wp-content/uploads/2016/07/logo.pngBram Verbruggen2017-12-14 10:51:552017-12-14 10:51:55Achieving lightweight IT service management using FitSM
I had an interesting conversation with Prof. Dr. Jan Verelst of the University of Antwerp. They (Prof. Dr. Jan Verelst together with Prof. Dr. Herwig Mannaert) created the theory of normalized systems.
A normalized system is created following…
/wp-content/uploads/2016/07/logo.png00Wouter Avondstondt/wp-content/uploads/2016/07/logo.pngWouter Avondstondt2017-12-13 14:31:482017-12-14 12:38:48Security of Normalized Systems
In my previous blog, I discussed the need for adequate awareness and how this is the task of the DPO. The accountability principle requires you to be able to objectively demonstrate compliance.
So here are some tips to do just that:
https://www.toreon.com/wp-content/uploads/2017/12/GDPR-awareness-2.jpg532800Siebe De Roovere/wp-content/uploads/2016/07/logo.pngSiebe De Roovere2017-12-11 10:03:412017-12-11 10:03:41GDPR: tips for demonstrating compliance to the awareness requirement
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.