Who is Checkdone IT?

Identify your real need and share experiences

Checkdone IT is an “IT Security Software Integrator” that will help your company understand the differences between specific vendors and solutions. Based on your current environment, IT Maturity level and running solutions.

Create shortlist or Tender basics

We will show the added value of IT Security solutions and will advise you a Good, Better and Best way to solve a security challenge fitting your organisation.

Understand and set actions

On each topic we will show you what important subjects and best practices you should consider before listening to vendors. Be prepared on their questions, and know what to look for in your interest, and wider scope of IT Security. This will save you time and money, and you will understand what makes a difference before buying.

Provide proposal and sell licenses 

And if your buying, with our trusted business relationships with many vendors, we can offer a proposal that shows their commitment also to keep the world safer against Cyber Threats. We are honest and will explain you what differs. You can decide based on the shared knowledge, and if you have the time, a Proof of Concept result ensuring you will buy the right fit solution.

It is possible to deliver by or together with your contracted supplier.

Checkdone IT is specialised in

  • Selling IT Security Software & Hardware after a check of matching your needs
  • Advising in compliance frameworks like ISO27001, NEN/NTA, NIS/NIS2, BIG/BIO, GDPR and can help to create your own compliance standards. We also prepare you for your audit. And most important to keep control
  • Policy, measures and tools

Topics we like particularly

  • Identity, Strong MFA (MultiFactor Authentication), IAM (Identity and Acces Management), CIAM (Consumer Identity and Access Management), EPM (Endpoint Privilege Management), PAM (Privileged Access Management), Identity Detection and Response Solutions (IDR/UEBA), IGA (Identity Governance and Administration) and PKI (Publlic Key Infrastructure)
  • NDR (Network Detection and Response), NTA (Network Traffic Security Analytics), Vulnerability Scanning and Management Solutions (including on Prem and Vendor Managed SOC/SIEM)
  • eMail Security, Secure eMail solutions, DMARC (DKIM/SPF) and BIMI
  • EPP (Endpoint Protection Platform), EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (eXtended Detection and Respons) solutions
  • Incident response and MDR (Multivendor Managed eXtended Detection and Response) including Crisis Teams to respond on cyber threats
  • Explaining your current “Cyber State” and deliver Security Health checksHacking & Dark web intelligence and IT Security Consultancy
  • Explaining Business Needs and Help you building a strong “Cyber State” using CCM (Continuous Controls Monitoring)

We have experience in small-, larger SMB and Global Enterprise environments.

Our customers are within different branches like education, government, industry, retail, healthcare, cure, media, banking, logistics, finance etc.

We are a very fast-growing company in Benelux and always hiring the right interim expertise, depending on advice, topic, or solution, to make sure you always talk to the right people and have the right trained resources for your project. Our technical resources and interim engineers make sure you don’t spoil your time but make things work. If you are interested in IT Security or Information Security, we are there to support you.

Our video introduction is in Dutch on the left, if you like English subtitles check it out on YouTube

Vendor Pages

As you are probably searching for the companies that deliver IT security solutions, we display on this page some of them. We know all of them well since years in most cases and can explain you the differences between them for a specific topic of interest. We will not push you in a direction because of contractual obligations like some vendors demand, but you decide after our support what vendors are right fitting your company and budget in our Good, Better and Best fitting advise.

It’s indeed a lot, but IT security is an “hot topic”. We try to specify the vendors sweet spots and main focus in the different topics as displayed in the tab IT Security Themes.

Click on the topic and you will see some of the vendors that can help you, and a link to their website. They are all the best vendors of course, but let’s get in touch to explain using our requirement matrix on a topic for what to look for covering your need in a better IT Security Maturity.