01 — Cybersecurity

We assume you are already compromised.

Then we engineer for the day after.

Security audits, penetration testing, infrastructure hardening, compliance frameworks. We don't sell paranoia. We engineer the systems and processes that survive a real attack.

Risk audit · sample report
audit.report
audit-2026-Q2
External · web · cloud · identity
Critical findings92%
High findings74%
Medium findings48%
Low / informational22%
Final security postureA+
OWASPKali LinuxWiresharkSnykSonarQubeCloudflareOPNsenseLet's EncryptPrivacyProtonVPNGitHub ActionsDockerKubernetesSentryOWASPKali LinuxWiresharkSnykSonarQubeCloudflareOPNsenseLet's EncryptPrivacyProtonVPNGitHub ActionsDockerKubernetesSentry
02 — Watch

How we secure systems.

How we secure
03 — Threats we stop

Six attack patterns. Six defensive postures.

Most enterprise breaches fall into one of six patterns. We engineer specific defensive controls against each one.

01
SEV · CRITICAL

Ransomware & data encryption

Attackers encrypt your data and demand payment for the key. Most ransomware enters through phishing, RDP, or unpatched VPNs.

DefenseImmutable backups · network segmentation · EDR · phishing simulation
02
SEV · CRITICAL

Supply chain attacks

A trusted dependency (npm package, Docker image, vendor) gets compromised. The attacker rides the trust into your production.

DefenseSBOM · image signing (Cosign) · supply-chain attestation · dependency pinning
03
SEV · HIGH

Credential theft & identity attacks

Stolen credentials, MFA bypass, session hijacking, OAuth abuse. The most common entry point in modern breaches.

DefenseZero trust · phishing-resistant MFA · short-lived tokens · IAM hardening
04
SEV · HIGH

Web & API exploitation

OWASP Top 10 — injection, broken auth, IDOR, SSRF, deserialization. Most public-facing apps have at least one of these.

DefenseCode review · ASVS testing · WAF · runtime application self-protection
05
SEV · MEDIUM

Insider threats & privilege abuse

An employee, contractor, or compromised account exfiltrates data or plants backdoors. Hard to detect because the access is legitimate.

DefenseLeast-privilege · audit logging · UEBA · separation of duties
06
SEV · HIGH

Cloud misconfiguration

Public S3 buckets, over-permissive IAM, exposed Kubernetes APIs, leaked secrets in code. The #1 cause of cloud-era breaches.

DefenseCSPM · IAM review · secrets scanning · network policies · automated drift detection
04 — Compliance frameworks

Six frameworks. We help you reach all of them.

Compliance is engineering, not paperwork. We build the controls before the auditors show up.

ISO 27001

Information Security Management

International standard for managing information security. Process-driven, audited annually. We help build the ISMS, document controls, and prepare for certification.

SOC 2

Service Organization Control

Required for B2B SaaS sales in the US. Type 1 = controls in place; Type 2 = controls effective over time. We engineer the controls and prepare evidence.

GDPR

EU General Data Protection

EU privacy regulation with global reach. Data subject rights, breach notification, lawful basis for processing. We help you map data flows and implement controls.

PCI DSS

Payment Card Industry

Required for any system handling card data. Network segmentation, encryption, access controls, quarterly scans. We engineer the cardholder data environment.

HIPAA

Health Insurance Portability

US healthcare data regulation. Required for systems handling PHI. We help with technical safeguards, audit trails, encryption at rest and in transit.

NIS2

EU Network & Information Security

Newest EU directive — applies to essential and important entities across critical sectors. Risk management, incident reporting, supply chain security.

05 — How we engage

Four phases. Audit. Pentest. Harden. Monitor.

01

Security audit

1–2 weeks · fixed price

Scope your environment, threat-model, review code and infrastructure, identify the highest-leverage risks. Output: written audit report with prioritized findings and remediation roadmap.

02

Penetration test

2–4 weeks · fixed scope

Authorized adversarial testing of web, mobile, API, cloud, or network targets. Real exploitation, real evidence. Output: detailed report with proof-of-concept and CVSS scores per finding.

03

Hardening & remediation

4–12 weeks

Implement the controls identified in audit and pentest. Code fixes, infrastructure changes, IAM cleanup, network segmentation, secrets rotation, CI/CD hardening.

04

Continuous monitoring

Ongoing

SIEM, alerting, on-call, monthly reports, quarterly re-tests. Security is not a project — it's an operational capability that needs ongoing engineering.

06 — Proof
0
Confirmed breaches across the Symloop client base, since 2020

Across every client we operate or have hardened, the count of confirmed breaches is zero. This is not a marketing number — it is the only number that matters in cybersecurity.

07 — FAQ

Common questions.

CVE.001

How much does a security audit or pentest cost?

A scoped security audit starts at €8K and runs up to €30K depending on environment size. A penetration test is priced by target — a single web app pentest typically lands around €12K–€20K. We start with a fixed-price scoping call (free) before any commitment.

CVE.002

What's the difference between an audit and a pentest?

An audit is a structured review of your security posture against a framework (OWASP ASVS, ISO 27001, etc.). A pentest is authorized adversarial testing — we actively try to exploit the system. Most clients need both: audit to find systemic gaps, pentest to validate the fixes.

CVE.003

Can you get us SOC 2 or ISO 27001 certified?

We don't issue certificates — only accredited auditors can do that. But we engineer the controls, document the policies, and prepare you for the audit. Most clients reach SOC 2 Type 1 in 4–6 months and Type 2 in 12–18 months with us as the engineering partner.

CVE.004

Do you handle incident response?

Yes. We offer incident response retainers — committed response times for confirmed security incidents. Triage, containment, forensics, post-incident review, and (if needed) coordination with law enforcement and regulators.

CVE.005

Do you also fix the issues you find?

Yes. We don't believe in audit reports that just say 'fix this'. We do the audit, write the remediation plan, and (if you want) implement the fixes ourselves. Same engineering team — no handoff to a third party.

CVE.006

Do you train internal teams?

Yes. Secure-coding training, phishing simulations, tabletop incident exercises, security champions programs. Best done alongside an audit so the training is grounded in your real findings, not generic content.

08 — Talk to us

Have a security worry that won't go away? Let's start with a 30-minute call.