top of page

Combatting
your adversaries with structure.

Our vision is a world where (complex) environments are cyber secure by default, not by exception.

​

Our mission is to holistically improve the cyber security posture of companies around the globe through a vendor-independent and risk-based approach, combining high-quality security architecture with in-depth technical cyber security expertise.

Decoration Splynter Homepage
Home: Welcome

Our Technology Services

Home: Services

Secdevops

DevOps with security and privacy and design principles in mind.

IAM - ABAC

Advice and hands-on execution of IAM projects

Cryptography

End-to-end setup of highly complex cryptography solutions

In-depth risk assessments

​Quality penetration testing with a focus on emerging technologies.

Over 10 years of experience in modern cyber security training.

Our Strategy Services

Enterprise Security Architecture

We believe that Enterprise Security Architecture is a necessary practice in every company - small or large. It allows to maintain an overview of the security capabilities, it encourages reuse of security solutions, and it allows to increase the overall cyber security maturity by enabling an automated threat-based approach.

Home: Why Us

Why Choose Splynter

Decoration Splynter Homepage

Vendor Independence

Splynter is vendor independent. That allows us to provide advice that is based on facts, not on sales figures.  We believe this independence is an important characteristic which is essential to realize our vision and maintain the high quality that our customers deserve.

High Quality Security Architecture and In-Depth Technical Cyber Security Expertise

At Splynter we want to empower people and encourage them to take full ownership over tasks that cross traditional role borders. Instead of labelling people as ‘security engineer’, ‘pen-tester’, or ‘security architect’, we truly believe passionate people can excel in technical matters and have architectural vision at the same time. Giving our people the opportunity to work at different layers keeps them intellectually challenged and brings about an environment where passions are grown, not cut.

Decoration Splynter Homepage

Holistic Risk-Based Approach

There is a default set of cyber security best practices that apply to every business. However, each business also faces unique risks and therefore has a unique optimal cyber security posture. We believe businesses should identify and recognize this unique posture and act upon it. Doing this requires a deep understanding of a business’ core capabilities and architecture and goes far beyond executing risk assessments or adhering to cyber security checklists. While we recognize the latter two are necessary and at times difficult tasks, we claim that a holistic approach which leads to a sustainable cyber security capability must start at the architectural layer to be successful.

Decoration Splynter Homepage
Decoration Splynter Homepage

Cyber Security Training

Knowledge is key. Technology is moving fast. It is our obligation to have a profound understanding of information technology in general and cyber security in particular. Only then we can make factual judgments about cyber security needs for our customers. We see it as our responsibility to continuously work on building this knowledge and to share it with you since it is an important enabler to realize our vision: help you understand your adversaries and combat them.

Our Values

Home: Our Values

Embrace expertise

We encourage you to be an expert in a domain that you are passionate about. This enables us to deliver high quality and to

be the best in the business.

Take responsibility

We all care about the outcome as much as anyone else would (including the owners). We show respect and take responsibility when we fail.

SPLYNTER

We believe in combatting your adversaries with structure. Do you?

​

If you're passionate about solving complex challenges, making a difference, and having fun while doing it, you're the person we're looking for.

​

At Splynter, we're always eager to meet new talent, so check out more about working at Splynter and our open positions.

Extended Splynter logo
Home: Join Our Team

Join Our Team

Home: Contact

What Can We Help You With?

For more info fill out the form or call us at +32 474 28 02 63

Thanks for submitting!

Contact Persons

Picture of Michael Boeynaems (Co-Founder)

Michael

Founder of Splynter

and cyber security specialist
CISM - CISSP - OSCP

bottom of page