About us

SWITCH Technology provides consultancy, projects and education in areas such as information security, cyber security, risk management, privacy and compliance.

SWITCH Technology offers a comprehensive portfolio of services, including:

- ISO-27001 and NEN-7510 support and implementation
- ISO-IEC62443 support and implementation
- Temporary fulfilment of the role of CISO or Information Security Officer
- Cybersecurity risk assessments
- Security awareness campaigns
- Hacking tests (such as penetration testing and vulnerability scans)
- Security (ICT) monitoring (such as intrusion detection)


Our consultants are experienced specialists with a solid security background. They can independently fulfill an advisory role within (complex) organizations. When executing projects, depending on the size and complexity of the project, a team is assembled from the most experienced security experts.


As a trusted advisor, SWITCH Technology can help you quantify and understand your risks, extend your team resources, help detect and respond to threats, and unify your organization on security priorities to accelerate your business transformation, such as:


Assess, reduce and manage your security risk. Our experts and proven frameworks provide deep understanding of business and compliance needs.

- Security Strategy, Risk and Compliance Services

- Zero Trust Services


Govern and protect your business, data, users and assets. Deliver trust when you connect policy, analytics and controls across your entire business.

- Application Security Services

- Data Security Services

- Identity and Access Management Services

- Infrastructure and Endpoint Services

Identify and respond to threats quickly and confidently. AI provides continuous insights to find critical threats faster and respond more efficiently.

- Incident Response and Intelligence Services

- Offensive Security Services

- Security Intelligence Operations and Consulting Services

- Threat Management Services

- Managed Detection and Response

Security implications change as workloads move from on-premises to cloud. Automate, centralize and simplify with cloud security services.

- Cloud Security Services