Security is not a feature.
It's the foundation.
MilesGuard finds vulnerabilities and stays on until they're fixed. Offensive security and compliance for Swiss SMEs, from St. Gallen.
Why MilesGuard
First-Hand Security
MilesGuard was founded in 2024 in St. Gallen, with a simple conviction: whoever finds vulnerabilities should also know how to fix them. Not two separate teams. Not a report that ends up in a drawer. Instead, finding, fix and verification from a single source.
The result: a security boutique that unites offensive and defensive. The same engineers who attack your systems subsequently build the defence. No overhead, no handover losses.
The impetus came from embedded development: systems running in production without anyone having seriously tested their security. That's why MilesGuard relies on open-source tools and lean processes, so that SMEs with limited budgets also receive professional security, not just enterprises with their own department for it.
St. Gallen
Headquarters, Switzerland
OWASP · NIST · PTES
Methodology
CH/EU Infrastructure
Hosting
Offensive + Defensive
One team, no handoff
Who's Behind MilesGuard
Core Team and Network
MilesGuard combines a core team with a network of experienced specialists. Depending on project requirements, we bring in targeted expertise from cloud security, forensics or red teaming.
Miles Strässle
Founder & Security Engineer
Offensive security, security research, embedded background. Lecturer for Linux and Cyber Security (HF). ETH Zurich · OST.
Tim Renggli
Software Engineer & Business Solutions
Combines analytical thinking with solid engineering. Develops well-founded solutions where theory and practice come together.
Marlon Zimmermann
Security Consultant & Software Engineer
Combines deep understanding of attack vectors with engineering competence and an eye for good design. Develops applications that work, withstand and convince.
Specialised Network
For projects that go beyond our core team, we work with vetted specialists from cloud security, digital forensics and red teaming. All external experts work under our methodology and quality control.
Principles
How We Work
Four rules that shape every engagement.
Prove or Discard
Every finding comes with a working proof-of-exploit. What's in the report, we can reproduce.
From Finding to Fix
We don't deliver problems without solutions. Every finding comes with actionable remediation guidance, architecture recommendations or configuration fixes.
Swiss Infrastructure
Client data stays in Switzerland. Our SIEM runs on Swiss servers. Our compliance starts with Swiss law.
Build to Hand Over
Our goal is to enable your team to operate without us. We document everything, train your people and create playbooks.
References
Selected Projects
All projects are anonymised for confidentiality reasons.
Industrial manufacturer
>1,000 employees, 6 locations (CH/EU)
Active Directory security assessment and NIS2 gap analysis
Domain takeover identified within 2–4 hours, prioritised action plan delivered to management.
Insurance / Financial Services
Large enterprise
Forensic investigation of an insider threat scenario
Complete reconstruction of the access chain, court-admissible evidence secured.
IT / Cloud Services
SME
External penetration test of cloud infrastructure
Critical perimeter security vulnerabilities identified, retest completed after remediation.
Reference contacts available on request. Most of our clients are bound by confidentiality agreements.
What Sets Us Apart
Transparency
Clear cost overview. Binding timelines. Honest severity ratings. You see exactly what we find and what remediation costs.
Depth Over Breadth
Five services. No 20-service catalogue. If you need something outside our scope, we'll tell you openly.
No Vendor Lock-in
We rely on open-source tools and open standards. Your data, your reports, your infrastructure. You can switch at any time.
