A man in a suit looking at multiple monitors displaying financial or security data.

Vulnerability Scanning
Cyber threats get smarter every day.

Vulnerability scanning is one of the most effective ways to catch weaknesses before someone else does. We use advanced tools and offensive techniques to sweep through your networks, web applications, and operating systems, hunting down vulnerabilities and misconfigurations that could leave you exposed.

Unlike many others offering vulnerability scans, we don’t leave you with an unfiltered report spanning hundreds of pages. We go through everything manually, weed out the false positives, and highlight what actually matters. You get a curated report with clear risk levels and concrete recommendations – so you know exactly what deserves your attention.

The real question is: are your systems keeping up?

About

We scan:

- Web applications
- Infrastruktur och Active Directory

Regelbundna skanningar är din bästa chans att hålla försvaret intakt. Cyberhoten förändras ständigt. De som är alltid uppdaterade, är de som står pall. No weakness. No entry.
A man in a suit looking at multiple monitors displaying financial or security data.
Surveys
Shows that the average cost of a breach is around 4 million euros.
– Cybersecurity Ventures

We scan

Web applications
Infrastructure and Active Directory
Web applications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Web applications
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Contact us

blog

Cyloq offers penetration tests in the following:

94%
94% of companies experience security incidents due to unpatched vulnerabilities.
$4.45
 million
Average cost of a data breach: $4.45 million (IBM 2023 Report).
60%
60% of SMBs close within six months of a cyberattack.
book a meting

testings

Threats evolve fast

Your defenses should too
A man in a suit looking at multiple monitors displaying financial or security data.
A futuristic digital representation of a blockchain network, featuring interconnected glowing cubes with transparent and metallic elements, symbolizing data processing and decentralized technology.

blog

Case studies

view more
Text Link

VX Fiber: “Now we have a 'stamp of approval' on our security work”

March 11, 2025
0
min read

VX Fiber is an international company that delivers broadband services to companies and municipalities that own fiber networks. With 80 employees and a growing network, IT security has become a central concern for the business. “Security work has become so important that we report it to the board on an ongoing basis,” said Tim Cambrant, Chief Security Officer at VX Fiber.

An external partner became a necessity

Before working with Cyloq, security work was handled by an internal team with the ambition to do the right thing, but they lacked external verification. “We realized that investors and customers expected an independent review of our security,” Tim tells us.

Responsibility grew as VX Fiber expanded. “The more customers we deliver to, the more socially critical our business becomes. The security issues come up in sales calls, and we need to be able to prove that we have a robust security structure,” said Tim. Despite internal competence, the company faced a crucial realisation; however carefully they audited themselves, an external party was required to ensure nothing was missed.

“We really wanted to know where we stood and get an external validation of our work.”

When they started looking for a partner, they wanted someone who was flexible, quick-footed and responsive. There Cyloq stood out among the crowd.

“They stood out among the great giants. They were easy to get in touch with, small but adaptable. They showed they were ready to do the job instead of just trying to sell in a big package.” After an initial meeting, the choice fell on hiring Cyloq to conduct a penetration test.

Penetration tests have become policy

Tim tells them that they were unsure if Cyloq would even be able to find anything in the two weeks that they have to do a penetration test.

“We had people on site who were ready to answer questions or assist Cyloq in its work. We thought they would need help and guidance, but they were working independently. And after 2 weeks they delivered a clear report.”

Tim describes the process as smooth and efficient. “We describe what we want them to focus on and give them access to relevant systems. Then they start — fully autonomous. They'll get in touch if it's something critical. They offer to be available for explanation or help fix things.”

When they got the report into their hands, Tim tells us they were surprised at how much they found.

“We want them to find things, but they also have a lot of confidence. We thought that they would not succeed in this in such a short period of time. They do a solid job and the feeling is that they put in more hours than they bill.”

VX Fiber now done three penetration tests and has as policy to do so at least 1 time per year. They test different parts of the business, and when everything is tested, they do it again. “It is a continuous work. Once one area has been tested, we start over on another.”

Clear results and strengthened safety culture

The cooperation has produced clear results. “The biggest improvement is that we now have a clear picture of our vulnerability profile. Cyloq has given us a 'stamp of approval' on our security work, which has strengthened our legitimacy with both customers and investors,” says Tim.

Another important effect is the changing safety culture within the company. “We have a young team of developers, and working with Cyloq has created humility and increased respect for information security. They've really seen the value of having an external reviewer,” explains Tim.

“It is not enough that we have a team of experts in-house, we become homeschooled. The collaboration has proven that however fussy we think we have been, we will always have missed things. It's raised awareness that no one is perfect, even the most experienced can miss critical details and that we always need to have someone else looking at this stuff and reviewing what we're doing. “

Advice for companies looking to strengthen their security

For companies looking to strengthen their security, VX Fiber recommends starting with a thorough inventory. “What do we want to protect? Customer details are often the most important. Then one should quickly move on to reviewing user permissions and storage routines. Many small businesses make it too easy for themselves, and what gets leaked is often a document that someone saved in the wrong place,” explains Tim.

Tim's second piece of advice is to seek outside help if you don't have the resources to devote time to it. “Not every company can invest in a large security team, but even if you manage your own IT, you should have an external auditor who can identify and close security gaps.”

Recommendation? Eh, yes!

When asked if VX Fiber would recommend Cyloq to others, the answer was a clear yes. “Above all, because they are easy to deal with, efficient, flexible and knowledgeable. They deliver value and make security work easier for us,” says Tim.

“We see no reason to switch from Cyloq, or even supplement with another player. So far we haven't given them anything that they haven't succeeded in. '

You want us to find the security flaws you didn't know you had?

Read more
Text Link
Text Link
Text Link
Text Link
Text Link
Text Link
Text Link
Text Link
view more

Questions

FAQs

Penetration testing is a simulated attack to test an application/system/network for vulnerabilities.
Report writing & delivery

A meeting between Cyloq and the customer is set up to discuss the details of the penetration test.

The meeting is important to ensure that all parties agree on the objectives and limitations of the test, and that everyone has the same expectations of what the test will deliver.

In this step, the items to be tested are presented so that CYLOQ can produce an estimate for the mission.

After this meeting, Cyloq responds with a quote.

Continuous reporting of deficiencies3

A meeting between Cyloq and the customer is set up to discuss the details of the penetration test.

The meeting is important to ensure that all parties agree on the objectives and limitations of the test, and that everyone has the same expectations of what the test will deliver.

In this step, the items to be tested are presented so that CYLOQ can produce an estimate for the mission.

After this meeting, Cyloq responds with a quote.

Penetration test starts

A meeting between Cyloq and the customer is set up to discuss the details of the penetration test.

The meeting is important to ensure that all parties agree on the objectives and limitations of the test, and that everyone has the same expectations of what the test will deliver.

In this step, the items to be tested are presented so that CYLOQ can produce an estimate for the mission.

After this meeting, Cyloq responds with a quote.

Start-up meeting

A meeting between Cyloq and the customer is set up to discuss the details of the penetration test.

The meeting is important to ensure that all parties agree on the objectives and limitations of the test, and that everyone has the same expectations of what the test will deliver.

In this step, the items to be tested are presented so that CYLOQ can produce an estimate for the mission.

After this meeting, Cyloq responds with a quote.

Ready to stay ahead of the threats?

Book a meeting