Bespoke Security Assessment

Test your hardware OT/IoT and software solutions to get a holistic view of security.



What We Do

OrionX's analysts have extensive experience testing bespoke hardware and software solution such as Industrial Control System (ICS), Operational Technology (OT), Internet of Things (IoT), Automated Teller Machine (ATM) and custom hardware designs.

Our methodologies and service offerings are such that we can attack these platforms from the ground up and provide a holistic view of their security.



Why You Need This Service


Applies to all industries and security maturity levels.


Analysis with bleeding-edge techniques.


Research to protect your assets and your reputation.

Taylor made service

Based on methodology and expertise.


Expert advice in remediation, up-to-date research and training.


We find issues before others do. We are committed to your information security.

Discover how well you respond to real world attacks by persistent threat actors

Our Adversarial Services

Hardware IoT Penetration Testing

Embedded systems exist in many shapes and forms and influence our lives in a variety of ways. In the vast majority of cases the close nature and embedded nature of these systems is relied upon in a security through obscurity manner. 
OrionX has developed a methodology that analyses these types of systems at the hardware and software level, identifies input and output mechanisms and probes them for vulnerabilities.  

ATM Penetration Testing / Unattended Kiosks / Payment-related Hardware / Custom Hardware Designs

OrionX has developed a methodology that allows for a holistic assessment of an ATM implementation that includes testing of architectural, physical, network and application security controls in order to identify potential vulnerabilities. 

OrionX can perform its assessments either in a test or pre-production environment or in a live production environment, in coordination of the systems custodians. 



Operational Technology Network Penetration System

OrionX methodology allows for the structured and safe assessment of the overall architecture of Industrial Control System (ICS) while taking under consideration the sensitive nature and operational constraints of the components under scrutiny. 





Our Clients' Success Stories

dLocal case study

Cybersecurity ally for the global growth of a unicorn


PCI DSS Compliance programs

5 cont

Cloud Security Ecosystem

Rapid growth with a Cloud environment. From PCI DSS compliance programs to offensive security beyond compliance.

LOGPay case study

Security and data management for the mobility of European companies.





Increasing the security posture of critical assets and keeping operations running. Supporting real-time mobility with security services external, internal, segmentation and web application penetration testing.

What Our Clients Say

"OrionX team of Foregenix consultants are genuinely interested in helping us mature our security strategies. OrionX team is able to provide offensive services as well as security compliance and consulting at the speed that is required in our industry".
Gregor J. Kovacs

Chief Information Security Officer of LOGPay

"The team of professional consultants has the capacity and specific knowledge of cloud environments to improve the security posture of our digital ecosystem. They have provided us with orientation and training in various languages according to our needs. Foregenix has shown us to have the ability and knowledge to accompany us with PCI DSS compliance programs, training in secure code development and offensive security tests (pentesting applications, network) among other information security services beyond compliance".
Javier David

Chief Information Security Officer of DLocal

Why us?

We perform Offensive Security Services tailored to deliver effective security while transferring knowledge to help our customers mature their defensive strategy.

We can help you to conduct effective, value-for-money offensive operation services as part of a technical security assurance framework.

We are trusted, independent certified company who employs professional, ethical and highly technically competent professionals in cybersecurity.

We are a CREST member company certified in Penetration Testing. 

+12 years of experience

+12 languages

+20 countries

+1500 satisfied customers



Absolutely, we have experience in several environments, businesses and technologies. We can provide bespoke security tests to any requirement. 

Yes, we manage our own infrastructure to provide secure and stable remote access globally.


OrionX can provide software (stand-alone or cloud-based) and hardware remote-based solutions that can fit any environment.


Vulnerability Assessment is a set of predefined tests to be run 100% automated.

Penetration Testing is a human-led test conducted by an expert in cybersecurity tailored to find vulnerabilities in a targeted environment.

As adversaries are humans, it makes sense to check if their procedures, tactics and techniques can be effective against your company's environment or infrastructure.


Yes, different types of penetration tests, as well as methodologies such as black-box. white-box and grey-box assessments, are designed to test your environment. 

OrionX can guide you to the best approach scenario to test your security. 


OrionX team members are not consultants repeating a procedure. We are true experts in cybersecurity, developers, sysadmins and computer geeks with strong technical skills, solid experience and technical knowledge across a wide range of technologies. We understand customer's needs and adversary techniques. 

Your consultant is committed to providing clear and timely information to make opportune decisions and implement actions across the test execution. We understand your business and communicate actively with a legitimate sense of urgency.    


Learn more about the methodologies and application of our cybersecurity testing services for your business.



Discover all the Offensive Security Services that we can provide you to improve your defensive strategy.


Interested in learning more about Bespoke Security Assessments?


Join our Community

Subscribe to our blog and discover more about offensive tactics, techniques and procedures.