Hardware pentesting, NIS2 compliance, managed cyber defence — delivered by a team that combines legal expertise, offensive security, and deep regulatory knowledge.
A preconfigured hardware security device — deployed on-site, maintained remotely by Sonvidas. Monthly security checks, firmware updates, and anomaly reports included.
We configure, harden, and ship the device. You plug it in. We monitor. Every month you receive a plain-language anomaly report — what was detected, what it means, what to do.
No IT department required. No complex setup. Built for SMEs that need enterprise-grade visibility without enterprise-grade overhead.
Fixed-price assessments. No lengthy procurement. Signed Scope of Work before any testing begins.
WPA handshake capture, rogue AP detection, open port sweep, deauth test. PDF report included within 3 days of visit.
RFID/NFC badge cloning test, door reader assessment, SubGHz gate replay. Live demo included. Report within 2 days.
Evil twin + captive portal setup, simulated phishing wave, click-rate report for management. Campaign runs 3–5 days.
Scan printers, IP cameras, smart locks, building automation. BLE + SubGHz sweep. Strong NIS2 / ENS compliance angle.
Live hardware demos for management. Badge clone, rogue hotspot, IR hijack — risk explained in plain language. No IT background needed.
Structured gap analysis against NIS2, ISO 27001, or DORA. Prioritized findings with business impact. Executive summary included.
Internal + external scope, grey box methodology. CVSS-rated findings with remediation steps. NIS2 / ISO 27001 / ENS evidence report. One re-test included.
Combined physical + network. Pi dropbox implant on-site, Flipper for physical bypass, remote exfil simulation. Full kill-chain narrative in final report.
Raspberry Pi running Suricata/Zeek on-prem. Monthly anomaly report. Optional quarterly vuln scan add-on. Low churn, easy to scale across multiple sites.
Ongoing NIS2 / ISO 27001 / DORA advisory. Regulatory updates, policy reviews, incident readiness. Quarterly management report included.
All training delivered in-house at your premises. Available in German, English, Spanish, Italian. Custom formats on request.
Live hardware demonstration for C-level and board. Badge cloning, rogue hotspot, IR device hijack — cyber risk made tangible. No IT knowledge required. Designed to trigger board-level decision-making on cybersecurity investment.
Structured full-day workshop for compliance, legal, and IT leadership. Covers NIS2 obligations, ISO 27001 control mapping, personal liability of management under §38 BSIG, and practical implementation roadmap. Includes gap assessment workbook.
Hands-on half-day training covering physical attack vectors: RFID badge cloning, tailgating, social engineering, rogue device placement. Live demonstrations with Flipper Zero. Participants learn to recognize and report physical security incidents.
Interactive full-day training for all employees. Covers phishing recognition, evil twin attacks, vishing, pretexting. Includes a live simulated phishing exercise during training. Practical decision trees for reporting. Measurable awareness uplift.
Technical full-day training for IT teams. Covers IoT attack surfaces, BLE/SubGHz vulnerabilities, network segmentation, firmware analysis basics. Live device scanning session included. Directly mapped to NIS2 supply chain and asset management requirements.
Strategic half-day briefing for C-level on AI governance frameworks (ISO 42001), regulatory obligations under DORA and NIS2, and emerging AI-specific attack vectors. Covers management liability, vendor AI risk, and practical governance decisions. Based on current academic research.
All prices exclude travel & accommodation. Multi-session and multi-language discounts available. Custom formats on request.
Two complementary profiles. One delivers strategic compliance and regulatory expertise. The other delivers hands-on technical implementation and DACH market execution.
Legal and cybersecurity background. Specialisation in NIS2, ISO 27001, ISO 42001, DORA, and critical infrastructure security. Speaker at E-world energy & water 2025 and 2026. Accepted research presenter at WINIR Conference 2026 on AI governance and regulatory fragmentation.
Hands-on technical implementation and DACH market execution. Hardware security specialist with Raspberry Pi and Flipper Zero toolstack. Native German speaker with deep understanding of Mittelstand culture, regulatory context, and client expectations in the DACH region.
All Sonvidas engagements produce evidence-ready documentation aligned with applicable regulatory frameworks.
No unsolicited proposals. Every engagement starts with a signed Scope of Work. Contact us to schedule a scoping call.