Reliable security assessments for a secure website

  • We are IT security experts who help you secure your web applications.
  • We use proven hacking methods and techniques, used by real hackers.
  • Get personal advice in determining the appropriate security assessment.
  • Manual and automated tests combined.


  All Vulnerabilities

Manual and automatic checks on all types of vulnerabilities such as SQL-injections, Cross-site scripting, weak passwords, hidden files and much more.

  Single or Periodic Tests

Decide whether you prefer a one-time pentest, re-test or periodic (black-box) security checks on your web application. We are happy to think along with you for a suitable solution.


  Proven Track Record

Having supported 100+ different organizations (large, small, private, public), we have established a succesfull track record.


  Report Options

Availability of multiple report formats, including comprehensive developer reports, concise management reports and reports based on the OWASP Top 10 or NCSC guidelines.


  Personal Support

Receive personal support during the entire security process, from intake to discussing test results, fixing vulnerabilities and re-testing.

  Manual Code Analysis

Certified (CISA, CISSP, CEH) and experienced web security and web development experts can analyse the source code without extra costs, if the data is available.


  Support for all Technologies

Support for all types of web techniques, such as PHP, .NET and Java. We also have broad experience with commonly used CMS types, including WordPress, Drupal, Magento, Joomla and TYPO3.

  Customized Pentests

Based on the goal, client requirements and information available beforehand, we conduct customized black-box, grey-box, white-box, crystal-box and time/budget-box pentests.


  Trustmark Logo

Show you highly value data security and boost consumer trust. Place the Web Security Scan trustmark logo on your website when no severe vulnerabilities have been found.

Why would you perform a pentest?


55% of all websites are vulnerable

Research shows that a stunning 55% of all web sites/web applications contain multiple vulnerabilities. Cross-Site Scripting and Information Leakage prove to be most frequent vulnerabilities in the applications. The graph below shows the probability that a vulnerability class is encountered at least once in a website.

Top 10 Vulnerabilities


Recommended by the Dutch National Cyber Security Centre

In the "IT Security Guidelines for Web Applications" (version 2015), the Dutch National Cyber ​​Security Centre states as highly classified security guideline: B.08 - Penetration tests are performed periodically. The NCSC-guidelines provide guidance for the safe development, management and delivery of web applications and associated infrastructure.

Performing a penetration test is implicit in change management (see measure B0-6), but is individually addressed with regard to its importance. From a security perspective, it is important that via a penetration test (also called pentest) it is determined whether the web application and / or infrastructure can be compromised or misused in any way. Penetration tests are therefore a valuable addition to the security of web applications.