Lieuwe Jan Koning

Zero Trust INNOVATOR

Lieuwe Jan Koning

Embrace Zero Trust with Ease

redefine what it means to have your services managed

Quickly gain the protective power of Zero Trust with ON2IT’s Zero Trust as a Service

ON2IT’s Zero Trust as a Service delivers a new approach to managed cybersecurity services, designed for prevention, enabling you to embrace Zero Trust with ease and 24/7 support from our comprehensive SOC team. We are Zero Trust.

Built on the Zero Trust strategy, Zero Trust As A Service delivers the industry’s strongest protection against cyber threats as a managed service.

the only mssp with zero trust as a service

The pillars of your cyberdefense

Zero Trust

INNOVATORS SINCE 2005

ON2IT has designed and implemented Zero Trust environments for hundreds of organizations. Lieuwe-Jan Koning (CTO) and Yuri Bobbert (CISO) are world renowned Zero Trust experts.

read more ›

AUXO™

PROPRIETARY ZERO TRUST platform

The first to offer the best of SIEM, SOAR, and MDR: the all-in-one automated managed service platform integrating our cutting-edge Eventflow™ technology for superior breach protection.

read more ›

mSOC™

CERTIFIED 24/7 managed SOC

Focus on your core business while the mSOC™ functions as your fully operational security conscience. Leverage the experience, skills, and latest tooling ON2IT’s Zero Trust experts offer.

read more ›

zero trust Prevents
Data Breaches

Secure your critical assets with unsurpassed protect surface management

Using a Zero Trust strategy reduces your overall attack surface by segmenting your infrastructure in much smaller protect surfaces, optimized to safeguard your valuable resources against known and unknown threats.

Zero Trust as a Service includes:

A transparent view of all protect surfaces and their DAAS elements, traffic patterns, preventive measures and threats per protect surface
Active management of all controls per protect surface
Zero Trust FitnessTM: a real-time view of the state of your cybersecurity
Request a demo
AUXO - Zero Trust Platform

fast track your zero trust journey

Utilizing the NSTAC recommended Five-Step Methodology

Define the protect surface

Map the transaction flows

Build a Zero Trust architecture

Zero Trust Policy

Create a Zero Trust policy

Monitor Maintain Network

Monitor and maintain the network

The Five-Step Methodology is recommended by the NSTAC (The President’s National Security Telecommunications Advisory Committee) in the Zero Trust and Trusted Identity Management draft report of March 2022.

BETTER PREVENTION,
Less staff

Our integrated AUXO™ solution to dramatically decrease your workload and free up valuable resources: Eventflow™

With our AI-based Eventflow™ automation, only one in every 100,000 events need manual inspection, so you get fewer alerts instead of more.

Eventflow™

Ingests logs and events from a variety of security controls and cloud environments
Enriches and weighs each and every security event using the Zero Trust Contextualization Engine
Automates responses using our Rules of Engagement
Request a demo

GET Unparalleled insight and actionable advice

Problem identification and recommended solutions after every critical event

24/7 visualization of your Zero Trust Fitness and policy validations in real-time

24/7 visualization of your Zero Trust FitnessTM and policy validations in real-time

Personalized Security Improvement Advisories to strengthen your security even further

Personalized Security Improvement Advisories to strengthen your security even further

Dashboards and reports on our SOC performance and all SOC analyst remediations

Dashboards and reports on our SOC performance and all SOC analyst remediations

Cybersecurity blog

News, articles and opinions on cybersecurity

Some CISOs fear auditors more than they fear actual hackers… Compliance has become a crucial focus with the implementation of regulations like the GDPR, CCPA, and various global data privacy directives. But whilst many organizations have rightfully turned their focus to said compliance, does it actually ensure better (cyber)security?
We challenge you to look at cybersecurity assessments through a different lens. IT and executive leaders alike should recognize assessments for the sanity check they are, as well as a way to build trust within the organization. Not as some sort of score card or grading system, but as a way to figure out where to start and where to go next. 
Though the recent Baltimore bridge collision wasn’t a cyber-attack, it did showcase a serious vulnerability in ship systems. A vulnerablity that could’ve easily been exploited by hackers, highlighting a truth that can no longer be denied – ships are easy targets for cybercriminals.