Skip to content

Security is not a feature.
It's the foundation.

MilesGuard finds vulnerabilities and stays on until they're fixed. Offensive security and compliance for Swiss SMEs, from St. Gallen.

Why MilesGuard

First-Hand Security

MilesGuard was founded in 2024 in St. Gallen, with a simple conviction: whoever finds vulnerabilities should also know how to fix them. Not two separate teams. Not a report that ends up in a drawer. Instead, finding, fix and verification from a single source.

The result: a security boutique that unites offensive and defensive. The same engineers who attack your systems subsequently build the defence. No overhead, no handover losses.

The impetus came from embedded development: systems running in production without anyone having seriously tested their security. That's why MilesGuard relies on open-source tools and lean processes, so that SMEs with limited budgets also receive professional security, not just enterprises with their own department for it.

St. Gallen

Headquarters, Switzerland

OWASP · NIST · PTES

Methodology

ETH Zurich · FH Computer Science

Education

HF Lecturer

Linux & Cyber Security

Who's Behind MilesGuard

Core Team and Network

MilesGuard combines a core team with a network of experienced specialists. Depending on project requirements, we bring in targeted expertise from cloud security, forensics or red teaming.

Miles Strässle

Miles Strässle

Founder & Lead Security Engineer

From financial auditing through embedded development to cybersecurity. Combines computer science and natural sciences with hands-on security experience. Teaches Linux and cyber security at HF level. Has worked on fuzzing and quantum-safe P2P communication, among other topics.

Tim Renggli

Tim Renggli

Software Engineer & Business Solutions

Combines analytical thinking with solid engineering. Develops well-founded solutions where theory and practice come together.

Marlon Zimmermann

Marlon Zimmermann

Security Consultant & Software Engineer

Combines deep understanding of attack vectors with engineering competence and an eye for good design. Develops applications that work, withstand and convince.

Specialised Network

For projects that go beyond our core team, we work with vetted specialists from cloud security, digital forensics and red teaming. All external experts work under our methodology and quality control.

Principles

How We Work

Four rules that shape every engagement.

Prove or Discard

Every finding comes with a working proof-of-exploit. What's in the report, we can reproduce.

From Finding to Fix

We don't deliver problems without solutions. Every finding comes with actionable remediation guidance, architecture recommendations or configuration fixes.

Swiss Infrastructure

Client data stays in Switzerland. Our SIEM runs on Swiss servers. Our compliance starts with Swiss law.

Build to Hand Over

Our goal is to enable your team to operate without us. We document everything, train your people and create playbooks.

What Sets Us Apart

Transparency

Clear cost overview. Binding timelines. Honest severity ratings. You see exactly what we find and what remediation costs.

Depth Over Breadth

Five services. No 20-service catalogue. If you need something outside our scope, we'll tell you openly.

No Vendor Lock-in

We rely on open-source tools and open standards. Your data, your reports, your infrastructure. You can switch at any time.