IT Security Consulting

Security that stands up to real adversaries

Independent consulting for organisations that need to know where they stand — and how to improve. No vendor bias. Measurable outcomes.

🔒Confidential engagements
🇨🇭Swiss-based & operated
📋ISO 27001 / NIST CSF aligned
🎯Framework-driven methodology
📄Clear, actionable reports
What We Do

Consulting services

From initial risk assessment to post-breach remediation, we cover the full security lifecycle.

🎯

Penetration Testing

Scoped adversary simulation across network, web application, API, and social engineering vectors. Structured findings with CVSS scoring and clear remediation guidance.

📊

Security Risk Assessment

Structured risk identification against ISO 27005, NIST RMF, or your preferred framework. Quantified risk register with prioritised treatment options.

🏛️

Compliance Advisory

Gap analysis and roadmap for ISO 27001 / IEC 62443 / NIS2 / DORA / nDSG. We translate regulatory requirements into operational security controls.

🔬

Security Architecture Review

Design-level review of network segmentation, identity architecture, cloud controls, and zero-trust implementations. Written findings and workshop delivery.

🚨

Incident Response Support

On-call and retainer-based incident response. Forensic analysis, containment strategy, stakeholder communication, and post-incident lessons-learned.

🎓

Security Awareness & Training

Role-specific training for technical teams, phishing simulation programmes, and executive tabletop exercises calibrated to your threat model.

How We Work

Structured. Transparent. Results-focused.

Every engagement follows a disciplined process — no shortcuts, no guesswork.

01 / SCOPE

Define & Agree

Precise scope definition, rules of engagement, legal authorisation, and success criteria agreed in writing before work starts.

02 / ASSESS

Execute

Systematic technical assessment using industry-standard tooling and manual expert analysis against the agreed threat model.

03 / REPORT

Communicate

Clear findings: executive summary, technical detail, CVSS scores, risk ratings, and reproducible proof of concept.

04 / VERIFY

Remediate & Confirm

Post-remediation retesting to verify fixes are effective. We close the loop — not just hand over a report and disappear.

Who We Serve

Sector experience

We bring relevant context from regulated and high-stakes industries where security failures carry real consequences.

🏦 Financial Services
🏥 Healthcare & Life Sciences
⚡ Critical Infrastructure
🏭 Manufacturing & OT
☁️ SaaS & Cloud-native
🏛️ Public Sector
⚖️ Legal & Professional Services
📦 Logistics & Supply Chain
About Us

Independent. Experienced.

Fidelis IT Security is an independent Swiss IT security consultancy. We work without vendor affiliations or product commissions — our only obligation is to give you an accurate picture of your security posture and help you improve it.

Our practitioners have backgrounds spanning enterprise red team operations, SOC engineering, cloud security architecture, and regulatory compliance. We've operated in environments where mistakes have real consequences — financial services, healthcare, and critical infrastructure.

Fidelis — from the Latin for faithful and trustworthy — reflects our commitment to honest, independent advice. We deliver what we find, not what you want to hear.

Headquartered in Switzerland. Engagements delivered across DACH and Western Europe. Working languages: German and English.

Framework & Standard Alignment

🎯 MITRE ATT&CK v15
📋 ISO/IEC 27001:2022
🛡️ NIST Cybersecurity Framework
⚖️ NIS2 / DORA
🇨🇭 nDSG / DSG
🔌 IEC 62443 (OT/ICS)
☁️ CSA CCM (Cloud)

Ready to talk?

Describe your challenge and we'll come back with a frank assessment of how we can help.

contact fidelis-it.net
Response within 1 business day
All enquiries treated confidentially
Switzerland · DACH · Western Europe