About UNICORN Security

... and our passion to keep data safe

Your independent cybersecurity partner

We are strong advocates of the universal right to privacy, the protection of (personal) data, and intellectual property. Over the last decades we dedicated ourselves to make the world a little safer and more secure. This is an ongoing effort, today more than ever. We strongly believe that our passion to keep data safe and secure will enable you to do your business in a better and more satisfying way, but it never is, or will be, an easy task. The services we provide cover all major aspects of IT security you need to identify, mitigate or eliminate the business security risks you face on a daily basis. It is important to balance risks, costs, and usability. We help you to make these balanced decisions.

Download Company Profile

UNICORN Security can also be your independent ICT security partner

Consultancy

These days customers more often ask proof that you are in control regarding the security of your IT environment. Our consultants have a vast experience with certifications like ISO 27001 and NEN 7510, and are able to support your organisation in achieving and preserve these certifications.

Technical security training

Unfortunately not all developers and (system and network) administrators are trained on security. But in today’s world your customers expect you to keep their data safe. We train developers and administrators to build secure software and infrastructures, and test these complete systems the same way as hackers do. Even more important is keeping that software and infrastructure as secure as possible. Our training curriculum include standard hands-on courses, but these can be tailored to your specific needs.

Penetration testing

Besides standard off the shelve hardware and software you use custom built applications on a daily basis. Unfortunately not all software is designed and implemented with security in mind, and scanning will not find security flaws in your custom built applications, because they only provide known vulnerabilities in off the shelf software packages. That is where penetration testing comes in. We continue where scanners stop. Try to identify logic flaws and configuration errors using provided information or information we gather during reconnaissance.

Security awareness

Be aware that technology can only help you to limit the effects of human error or criminal manipulation. Your employees are working with your valuable data on a daily basis. Keep that data safe by creating better security awareness in your organisation. A single click on a malicious link can infect your systems and create major mayhem in your organisation; these days all kind of organisations, from small shops to multinationals, fall prey to ransomware attacks. But many more attack vectors are available and new ones are continuously invented. So a regular updates on security awareness has become a necessity. Our security awareness training is updated on a regular basis, and can be tailored to each level of your organisation.

CISO as a Service

A Chief Information Security Officer is responsible for providing advice, supported by facts and experience, based on the trade-off between risks, costs and business requirements. (S)He communicates in comprehensible language for all layers of the organisation (from the shop floor to the management), and in addition to giving advice is often responsible for, or at least involved in, the handling of incidents, monitoring the security policy, and maintaining security awareness within the organisation. For many SMEs, having your own CISO is not feasible or necessary. They can choose to combine this role with a position within the management or ICT department, but perhaps we, as an independent external expert, can help you even better by filling this role part-time.

Vulnerability scanning, analysis and reporting

Current and upcoming laws necessitate you to be aware of known vulnerabilities in the hardware, firmware, and software you use. Vulnerability scanning and monitoring are the basic services you need for this, but these may include false positives that are of no interest to you. That is why analysis and reporting by specialists is important. We provide a complete package, that not only informs you of identified vulnerabilities, but also keeps track over time and takes into account any mitigating measures you have installed.

Because we care about the universal right to privacy and keeping (sensitive) data safe.

We support organisations with various IT security processes.

We create partnerships with our customers to ensure they keep control on information security.