Background Image


Intelligent Security, INSEC is a niche firm specialized in cybersecurity.

Key differentiators

By defending organizations against cyber intruders, INSEC objective is to help these organizations stay in business by detecting and responding to digital threats.

INSEC services stand for a holistic approach combining business insight, industry knowledge and technical expertise in every engagement with our clients. Through years of experience in the field, INSEC is specialized in securing critical information infrastructures in public, military, energy, telecom, financial and pharmaceutical sector.

Some examples of services

  • Vulnerability assessment
  • Penetration testing
  • Security architectural design
  • Network security monitoring
  • Security Information and Event Management (SIEM)
  • Cyber Threat intelligence
  • Advanced security analytics
  • Incident handling and response
  • Digital investigations
  • Computer forensics
  • Malware analysis




Sweepatic. Gain visibility + control on your internet footprint.

Value proposition

Besides our INSEC cyber security consulting service we offer a state-of-the-art cyber security internet solution for our customers called SWEEPATIC.

Based on studies and research, we know that cyber criminals are constantly monitoring and successfully attacking companies. We also know that those companies lack visibility and control on how they are perceived from the outside. By not having this dynamic view at hand, security and risk stakeholders are struggling to put answers against simple questions like: what information are my applications and my employees leaking, how does my external “footprint” on the internet compares with others? Am I an easy target compared to others?

Through real-time data exploration and using state-of the art reconnaissance techniques, Sweepatic is able to show the “outside-in” view about the level of information, different threat actors gather about your company and its employees.

It does this by sweeping, centralizing, quantifying and visualizing these publicly available artifacts into actionable information, enabling you with a proactive way to further reduce your exposure to an acceptable level. That way your company can further prevent adversaries in achieving their objectives. So take control now and support your business to thrive forward with a secure sweep!

Stijn Vande Casteele