Skip to content

Cybersecurity Services.
From Finding to Fix.

Every service exists because Swiss SMEs need it. Not because we wanted to pad our portfolio.

01

Security Audits & Compliance

Regulatory pressure is rising: nDSG since September 2023, ISG reporting obligation since April 2025, NIS2 through the EU supply chain. We assess your IT security against these requirements and deliver an action plan that actually gets implemented in your organisation.

CHF 5,000–15,000

Price depends on scope and regulatory environment. Includes report, action plan and 90-day retest.

Cover: AD Security & NIS2 Assessment
Management Summary: key findings and immediate measures
NIS2 Art. 21 maturity spider diagram
Consolidated roadmap with priorities and traceability
● Critical 1● High 14● Medium 1128 Backlog

Example from a real engagement (anonymised)

02

Penetration Testing

Automated scanners find the obvious. We find the rest. Every engagement is manual-first: we map your application logic, identify trust boundaries and exploit them, the way a motivated attacker would.

Manual, per OWASP/PTES. Price depends on scope and complexity. Includes report, debriefing and retest.

03

CISO as a Service

Most SMEs with 50 to 250 employees don't need a full-time CISO, but someone to coordinate security strategy, board reporting and incident response. From two days per month.

CHF 2,500–5,000/month

From two days per month. Price depends on company size and scope. Cancellable monthly.

CISO Assistant: Analytics Summary with Controls, Compliance and Risk
CISO Assistant: Risk Analytics with Threats Breakdown and scenarios
CISO Assistant: Compliance progress by framework

CISO Assistant GRC platform (demo data)

04

SIEM & Cloud Security

Open-source SIEM on Swiss infrastructure. Your logs stay in the country, your alerts reach you directly. Full control over every layer, no vendor lock-in.

Wazuh SIEM: Threat Hunting Dashboard with 378 Alerts
Wazuh SIEM: Overview with severity distribution and modules

Wazuh SIEM: open-source, Swiss infrastructure (demo data)

05

Attack Simulations & Training

Most successful attacks start with people, not technology. We conduct realistic attack simulations that expose human vulnerabilities, and train the gaps.

Methodology

Four Phases. Full Clarity.

Every engagement follows the same methodology. From scoping to retest.

01

Scope

Define the attack surface, capture compliance requirements, establish rules of engagement.

nDSG | NIS2 | ISG

02

Test

Penetration tests, code audits, architecture reviews. Every finding manually verified and reproducibly documented.

OWASP | PTES | NIST

03

Remediate

Prioritised report with reproduction steps, remediation guidance and architecture recommendations.

90-Day Retest

04

Monitor

SIEM deployment on Swiss infrastructure. Continuous detection and automated alerting.

Swiss DC