FAQ
BECYBERSCAPE is a mapping of the Belgian Cybersecurity landscape. The goal is to showcase the Belgian Cybersecurity sector and connect cybersecurity providers, customers, investors and job-seekers.
How can customers use this website?
Customers can:
- search for and directly connect with Belgian cyber security companies
- explore the Belgian cyber security sector
- understand more about cyber security and their cyber security needs
How can cybersecurity companies use this website?
Belgian cybersecurity companies can use this website to showcase their products and services, business solutions and sector experience.
This is a place to put your company in front of customers and prospective employees. We aim to highlight both the business and human side.
Who is behind this site and what is the goal?
BECYBERSECURITYSCAPE is the personal initiative of Stijn Muylle. This website is the continuation of a google sheet mapping of the Belgian cybersecurity landscape.
The goal is to further map the Belgian cybersecurity landscape and showcase its thriving participants. In the typical Belgian style, we often work very hard to deliver great results, but forget to tell others about it. This website helps with the latter part.
Which companies are on this list?
To be included on the list, the company has to have a large Belgian footprint and be active in cybersecurity.
Large Belgian footprint: The company is either headquartered in Belgium or has a strong local presence. There are at least 3 Belgian people working for the company
Active in cybersecurity: The company is active in the cybersecurity field or closely related fields (such as data protection). There are at least 3 people working in these teams within the company
If you believe your company should be on this list, send me a message on linkedin.
What are the possible company types?
- Pure play: this company is only active in the cybersecurity field
- Diversified: this company is active in multiple fields
What are the possible primary delivery types?
- Consultancy: this company delivers mainly consultancy activities
- Integrator: this company mainly acts as an integrator
- MSSP: this company mainly acts as a managed security services provider
- Vendor: this company develops its own cybersecurity solution
What are the possible security categories?
We use the security categories listed in the security yearbook written by Richard Stiennon, a well known industry analyst.
- Network
- Endpoint
- Data
- Identity
- Governance
- Risk and Compliance (GRC)
- Operations: Vendors that provide products used by security operations centers (SOCs)
- Application Security: the tools and platforms that assist in making applications secure
- IoT security: The Internet of Things mirrors traditional IT infrastructure
- Fraud prevention: These vendors combat the ever changing techniques that fraudsters use to take over accounts and steal
- Threat intelligence: Vendors specializing in collecting and disseminating data from hacker forums, open sources, dns and other channels
- Security analytics: With much of the security sector focused on collecting alerts and logs, it is helpful to track tools and platforms that are focused on analytics separately. This is where the traditional security information and management (SIEM) reside.
- Email security: Vendors combatting spam, phishing, business email compromise (BEC) and malware
- API security
- Training: primarily for cyber ranges, virtual environments that mimic a corporate environment for red/blue teaming. Cyber ranges are used to train enterprise teams and can often be customized to use the tools the enterprise has licenses for
- Deception: tools for deploying honey pots within a network to track an attacker
- Testing: Tools used to test an enterprise's security tools and controls