Digital security

With a focus on people and everyday practices.

Learn more →

Security and people

We know how the organization's assets are secured when technology meets people.

People practice security on a basis of knowledge, emotions, leadership and culture.

  • We work with awareness, training, collaboration and change.

Rules allow for better compliance when people can be both secure and productive.

  • We help taking policies and procedures from paper to secure practice.

Technology can automate and aid secure behavior through good user experiences.

  • We assist to select and configure products for high satisfaction.

More about services →

People + Policy + Products = Practice

Click the figure read more about our philosophy!


We develop unique products which allow everyone to contribute to better enterprise security.

People can't always keep last year's security training in mind.

  • We give email users immediate help to think before they click.

Our button is always present in software that people use every day.

  • We offer a brand for security which everyone can recognize.

Positive user experiences and feedback loops builds security culture.

  • We contribute to positive dialogue between IT and employees.

See our products →

Click here to see a short movie about MailRisk

Get introduced to our product MailRisk in 90 seconds – see video above!


Mnemonic and MailRisk in the news

Our collaboration includes integration with Mnemonic's security operations center (SOC) and analysis engine, for even more efficient handling of suspicious emails, 24/7.

Read full post

Secure software with OWASP ASVS

Are you working on security requirements in software development, test or procurement? There is no need to re-invent the wheel. See the talk on how OWASP Application Security Verification Standard (ASVS) can help.

Read full post

Experiences with simulated phishing

Are you assessing whether simulated phishing may be a good thing to do in your company? See this video for useful steps and input to prepare and launch your own internal phishing campaign.

Read full post

Show all posts →