Skip to content

Security is not a feature.
It's the foundation.

MilesGuard finds vulnerabilities and stays on until they're fixed. Offensive security and compliance for Swiss SMEs, from St. Gallen.

Why MilesGuard

First-Hand Security

MilesGuard was founded in 2024 in St. Gallen, with a simple conviction: whoever finds vulnerabilities should also know how to fix them. Not two separate teams. Not a report that ends up in a drawer. Instead, finding, fix and verification from a single source.

The result: a security boutique that unites offensive and defensive. The same engineers who attack your systems subsequently build the defence. No overhead, no handover losses.

The impetus came from embedded development: systems running in production without anyone having seriously tested their security. That's why MilesGuard relies on open-source tools and lean processes, so that SMEs with limited budgets also receive professional security, not just enterprises with their own department for it.

St. Gallen

Headquarters, Switzerland

OWASP · NIST · PTES

Methodology

CH/EU Infrastructure

Hosting

Offensive + Defensive

One team, no handoff

Core Team and Network

MilesGuard combines a core team with a network of experienced specialists. Depending on project requirements, we bring in targeted expertise from cloud security, forensics or red teaming.

Miles Strässle

Miles Strässle

Offensive security, security research, embedded background. Lecturer for Linux and Cyber Security (HF). ETH Zurich · OST.

Tim Renggli

Tim Renggli

Combines analytical thinking with solid engineering. Develops well-founded solutions where theory and practice come together.

Marlon Zimmermann

Marlon Zimmermann

Combines deep understanding of attack vectors with engineering competence and an eye for good design. Develops applications that work, withstand and convince.

Specialised Network

For projects that go beyond our core team, we work with vetted specialists from cloud security, digital forensics and red teaming. All external experts work under our methodology and quality control.

Principles

How We Work

Four rules that shape every engagement.

Prove or Discard

Every finding comes with a working proof-of-exploit. What's in the report, we can reproduce.

From Finding to Fix

We don't deliver problems without solutions. Every finding comes with actionable remediation guidance, architecture recommendations or configuration fixes.

Swiss Infrastructure

Client data stays in Switzerland. Our SIEM runs on Swiss servers. Our compliance starts with Swiss law.

Build to Hand Over

Our goal is to enable your team to operate without us. We document everything, train your people and create playbooks.

Selected Projects

All projects are anonymised for confidentiality reasons.

>1,000 employees, 6 locations (CH/EU)

Active Directory security assessment and NIS2 gap analysis

Domain takeover identified within 2–4 hours, prioritised action plan delivered to management.

Large enterprise

Forensic investigation of an insider threat scenario

Complete reconstruction of the access chain, court-admissible evidence secured.

SME

External penetration test of cloud infrastructure

Critical perimeter security vulnerabilities identified, retest completed after remediation.

Reference contacts available on request. Most of our clients are bound by confidentiality agreements.

What Sets Us Apart

Transparency

Clear cost overview. Binding timelines. Honest severity ratings. You see exactly what we find and what remediation costs.

Depth Over Breadth

Five services. No 20-service catalogue. If you need something outside our scope, we'll tell you openly.

No Vendor Lock-in

We rely on open-source tools and open standards. Your data, your reports, your infrastructure. You can switch at any time.