Overlay | VanRoey.be

Security Strategy

Discover your ideal security setup

Transparency
Play Video

"Often something has to happen before something happens.”
  -Johan Cruijff

Hackers and malware use a variety of tactics to attack your organization. How do you best protect yourself? Choosing the right solutions is complex and waiting is not an option.

Winning is not possible

This enemy will never stop attacking. It's Cruijff again who said: "If you can't win, you have to make sure you don't lose." Because one hack or virus can be disastrous.

A solid team is needed

One star player means little without teammates. This also applies to security solutions. The right team, backed up by the right strategy, determines whether you are up to the task of defense.

We like to present our solutions as team players that we can use tactically:

Goalkeeper

More info
Essential basics: Antivirus + Antispam + Firewall + Backup & Patch Management

SECURITY AWARENESS

What's this?

Visit page

Multifactor Authentication

What's this?

Visit page

Password Policy

What's this?

Encryption

What's this?

Printing Security

What's this?

Visit page

Client Security

What's this?

Visit page

Mobile Device Management

What's this?

Visit page

Network Access Control

What's this?

Visit page

Wifi security

What's this?

Visit page

Reverse Proxy

What's this?

User Entity Behhavior analytics

What's this?

Visit page

Cloud Access Security Broker

What's this?

Managed ICT Services

What's this?

Visit page

Coach VanRoey.be

Why us?

VanRoey.be has over 25 years of experience in thousands of different environments and numerous certificates. This knowledge is very useful to put together the perfect security set-up. 

#1 KEEPER

A collection of essential interventions: antivirus, antispam, sandboxing, patch management, backup and firewall. If anything should come through,

  • the good antivirus and antispam will stop most of the attacks;
  • a firewall will keep out malicious links, sites and hidden connections;
  • sandboxing will extensively test unknown downloads or attachments for misconduct;
  • Patch management will keep firmware and software up to date as much as possible in order to close known leaks;
  • a good backup - in case of an emergency - will save your organization.

#2 MANAGED SECURITY AWARENESS

A managed Security Awareness Training determines which employees are susceptible to false emails or websites that try to steal data. We regularly test them with traps and alert them to their mistakes and the possible risks.

#3 MULTI FACTOR AUTHENTICATION

Getting a strong password from a user is easier than expected. Therefore, in addition to the password, we ask you to enter a unique time-based code that will be texted to the user.

#4 PASSWORD POLICY

Do your employees use powerful, unique passwords or do they always use the same, weak password? A good policy can require, generate, securely pass on and manage complex passwords using tools.

#5 ENCRYPTION

A stolen laptop or smartphone contains a wealth of information. To prevent thieves from accessing this information, the encryption of this data is of the utmost importance.

#6 PRINTING SECURITY

Just like PCs, printers have network access, memory, a hard drive and a processor, so why put them in your network in an unsecured way? Protect the BIOS to ensure integrity so that no one can read the prints. Even unguarded documents that are left unattended pose a major security risk.

#7 CLIENT SECURITY

Enhance security on devices with fingerprint readers, smartcard readers or a privacy guard. But it goes beyond this... Advanced malware nestles outside the OS or storage and infects the BIOS or RAM memory. HP Sure Start and Sure Run guarantee the integrity of BIOS and software and the systems are self-healing, so there is no question of failure.

#8 MOBILE DEVICE MANAGEMENT

With Mobile Device Management, you enforce (security) policies on employees' mobile devices (iOS, Windows and Android). It requires them to configure a lockscreen, set some applications as default, lock or delete devices, data or apps remotely, etc...

#9 NETWORK ACCESS CONTROL

Make sure that an unknown device does not gain access to your network. Loose network cables or leaked WiFi passwords pose a very high risk of physical hacking. With Network Access Control, only employees' verified devices connect to the company network.

#10 WIFI SECURITY

An encrypted connection with strict WPA-2 or 3 security and always up to date accesspoints is obvious. But how do you deal with guests? With customers in your shop? Hundreds of students in your school who have to stay separated from the network teachers and management... use?

#11 REVERSE PROXY

A reverse proxy has many functions. As far as security is concerned, it can do following things:

  • Protects your domain/website by analyzing external access requests first and before they can (partially) reach your environment.
  • Prevents DDoS attacks in which millions of access requests simultaneously attack your servers in the hope of penetrating or crippling them.
  • Prevents external parties from gaining insight into your internal network.
  • Add an extra layer of security to sites that don't provide security by default
  • ...

#12 USER ENTITY BEHAVIOR ANALYTICS

Prevents risks by identifying deviant behaviour through artificial intelligence, such as employees who download the customer database and then put it on a USB stick or upload it to their private dropbox. Colleagues who were still working from Antwerp a quarter of an hour ago and are now 'suddenly' logging into the document libraries from Ukraine... With UEBA, you can detect seemingly innocent behaviour that, in combination with a number of factors, is less innocent than it might seem at first sight.

#13 CLOUD ACCESS SECURITY BROKER

A CASB provides a layer of security between your company network, your users and the various cloud applications (such as Sharepoint Online, Salesforce, ...) that you use in your company, giving you the same layer of security inside and outside your company network. Within the company network, you will be able to log in quickly and easily, and in an internet cafe in Shanghai, you will have to endure additional layers of security to prove that it is you. Next to this it can detect sensitive content -such as Visa card numbers- are being shared.

#14 MANAGED SERVICES

By leaving the management of your park in the hands of a small army of certified experts with a clear plan, you will avoid many risks such as shadow-IT and security leaks. Extensive documentation, intelligent monitoring, automated patching... We can guarantee uptime and safe operation, but above all fast action thanks to response times 24/7 within 4h or even 1h. This ensures that your park immediately gets the necessary protection in its most vulnerable moments.

COACH VANROEY.BE

  • More than 25 years of experience
  • Certified 'Level 3' security experts
  • The highest partnerships (Fortinet Platinum + Partner of Excellence, Microsoft Gold Partner, HP Platinum Partner, HPE Gold Partner...)
  • Excellent track record
  • Numerous satisfied clients such as Torfs, Soudal, Government agencies, Groep Van Roey, Flanders Make, Suez, hospitals, schools...

Example setups

Put together the perfect strategy with our experts!

Daily Health Check

On the one hand we have a 24/4 (4h or 1h) SLA in our Managed Services but with the ‘daily health-check’-service, our certified experts will log on to your portals of the security solutions we support on a daily basis. They will check whether everything still works without problems and/or whether certain things need to be adjusted. You will receive a daily report and enjoy an extra safe environment!

Also Interesting

Did you know that Belgium is one of the most (digitally) attacked countries in the world? This report shows where the weaknesses lie and offers a blueprint in best practices to arm yourself against the ever evolving cyber threats.
As a Fortinet Platinum Partner, VanRoey.be is the right place for you to be advised and supported about the rock-solid Fortinet Security Fabric.
Together with our security architects LIVE, we will show you how the most complex cyber security attacks happen and are repelled. We will give you a glimpse into the cloud platforms with explanations and explanations!
Or visit webstore.be to find and order products