Lieuwe Jan Koning

Zero Trust INNOVATOR

Lieuwe Jan Koning

Embrace Zero Trust with Ease

redefine what it means to have your services managed

Quickly gain the protective power of Zero Trust with ON2IT’s Zero Trust as a Service

ON2IT’s Zero Trust as a Service delivers a new approach to managed cybersecurity services, designed for prevention, enabling you to embrace Zero Trust with ease and 24/7 support from our comprehensive SOC team. We are Zero Trust.

Built on the Zero Trust strategy, Zero Trust As A Service delivers the industry’s strongest protection against cyber threats as a managed service.

the only mssp with zero trust as a service

The pillars of your cyberdefense

Zero Trust

INNOVATORS SINCE 2005

ON2IT has designed and implemented Zero Trust environments for hundreds of organizations. Lieuwe-Jan Koning (CTO) and Yuri Bobbert (CISO) are world renowned Zero Trust experts.

read more ›

AUXO™

PROPRIETARY ZERO TRUST platform

The first to offer the best of SIEM, SOAR, and MDR: the all-in-one automated managed service platform integrating our cutting-edge Eventflow™ technology for superior breach protection.

read more ›

mSOC™

CERTIFIED 24/7 managed SOC

Focus on your core business while the mSOC™ functions as your fully operational security conscience. Leverage the experience, skills, and latest tooling ON2IT’s Zero Trust experts offer.

read more ›

zero trust Prevents
Data Breaches

Secure your critical assets with unsurpassed protect surface management

Using a Zero Trust strategy reduces your overall attack surface by segmenting your infrastructure in much smaller protect surfaces, optimized to safeguard your valuable resources against known and unknown threats.

Zero Trust as a Service includes:

A transparent view of all protect surfaces and their DAAS elements, traffic patterns, preventive measures and threats per protect surface
Active management of all controls per protect surface
Zero Trust FitnessTM: a real-time view of the state of your cybersecurity
Request a demo
AUXO - Zero Trust Platform

fast track your zero trust journey

Utilizing the NSTAC recommended Five-Step Methodology

Define the protect surface

Map the transaction flows

Build a Zero Trust architecture

Zero Trust Policy

Create a Zero Trust policy

Monitor Maintain Network

Monitor and maintain the network

The Five-Step Methodology is recommended by the NSTAC (The President’s National Security Telecommunications Advisory Committee) in the Zero Trust and Trusted Identity Management draft report of March 2022.

BETTER PREVENTION,
Less staff

Our integrated AUXO™ solution to dramatically decrease your workload and free up valuable resources: Eventflow™

With our AI-based Eventflow™ automation, only one in every 100,000 events need manual inspection, so you get fewer alerts instead of more.

Eventflow™

Ingests logs and events from a variety of security controls and cloud environments
Enriches and weighs each and every security event using the Zero Trust Contextualization Engine
Automates responses using our Rules of Engagement
Request a demo

GET Unparalleled insight and actionable advice

Problem identification and recommended solutions after every critical event

24/7 visualization of your Zero Trust Fitness and policy validations in real-time

24/7 visualization of your Zero Trust FitnessTM and policy validations in real-time

Personalized Security Improvement Advisories to strengthen your security even further

Personalized Security Improvement Advisories to strengthen your security even further

Dashboards and reports on our SOC performance and all SOC analyst remediations

Dashboards and reports on our SOC performance and all SOC analyst remediations

Cybersecurity blog

News, articles and opinions on cybersecurity

In these cyber warfare episodes of Threat Talks, we explore whether or not we stand a chance in this continuous arms race in cyber technologies, what Advanced Persistent Threats (APTs) are, and how these modern threats can affect literally everyone.
PwC’s Dutch CEO Survey shows that 56% of Dutch CEOs are very concerned about cyber risks. The Allianz Risk Barometer lists cyber incidents as the biggest worry for companies globally and Gartner’s 2023 Top Cybersecurity Trends reports that business leaders are recognizing cybersecurity as a top business risk, yet organizations still struggle with implementing the necessary measures to mitigate risks.
If you’ve read any cybersecurity articles lately, you’ve likely come across the term ‘ever-evolving cyber threat landscape.’ It’s one of those phrases that gets thrown around a lot – especially in AI generated content – almost to the point of sounding cliché. But here’s the truth: as cliché as it may sound, it’s not just a buzzword.