Sandline — Risk Based Security
Cybersecurity for regulated EU businesses

Cybersecurity that works.

Sandline is the European cybersecurity firm behind the Centraleyezer platform. We run red teams, penetration tests, vulnerability programmes and incident response for organisations that have to satisfy NIS2, DORA, ISO 27001, PCI-DSS, CRA and GDPR auditors.

We cover:NIS2DORAISO 27001PCI-DSSCRAGDPR
centraleyezer · finding.json
{
  "asset":     "payments-api.prod",
  "finding":   "JWT alg confusion → auth bypass",

  "cvss_v4":               7.4,
  "epss":                  0.18,
  "centraleyezer_score":   9.7,

  "factors": {
    "asset_criticality": "essential",
    "exposure":          "internet",
    "exploitable_here":   true,
    "cti_signal":        "sector-targeted",
    "react_loop_h":       4.2
  },

  "compliance": [
    "PCI-DSS 6.3.3",
    "DORA Art. 9",
    "NIS2 Art. 21"
  ],
  "sla_h":      24,
  "decision":   "fix-now"
}

Trusted by security teams in

  • Banking & Finance
  • Healthcare
  • Energy & Utilities
  • Government & Defence
  • Telecommunications
  • Manufacturing

A measurable security posture

What our engagements typically deliver inside the first six months.

60%

Reduction in critical-risk findings after a Sandline-led remediation cycle

Faster audit-evidence preparation vs. spreadsheet-based vulnerability tracking

< 24h

Median time to triage and contain a confirmed incident, on retainer

15+

Years of offensive-security and risk-management experience on the team

Why Sandline

Three differences that show up in the first call

We are not a generic MSSP. We are a small, deep, senior team — and we build our own RBVM platform.

Senior engineers only

Every engagement is led end-to-end by an engineer with 10+ years of relevant experience. We do not subcontract delivery to juniors. You speak with the person doing the work, not an account manager.

Same method, services and product

We build Centraleyezer, our RBVM platform. The six-factor contextual model that powers the product is the same model we use to score findings in pentests, red-team operations and vulnerability programmes.

Audit-ready evidence

Findings ship pre-mapped to NIS2, DORA, ISO 27001, PCI-DSS, CRA and GDPR — by article and sub-clause. Your auditor gets reusable evidence, not a report that needs translating.

How we work

From noise to clear action

A consistent three-step engagement model that anchors every Sandline project, from a one-off pentest to an ongoing managed programme.

01

Discover & scope

We map your assets, your business criticality and your regulatory drivers. We agree on the rules of engagement before we touch a system.

02

Test & score

Our engineers run the engagement and score every finding by real business risk — using the same contextual model that powers Centraleyezer.

03

Remediate & verify

We hand over a prioritised remediation plan, support fix verification, and produce the audit-ready evidence your CISO and your auditor need.

Compliance you can prove

Built for the regulatory reality

NIS2 mandates vulnerability management. DORA enforces ICT risk controls. ISO 27001 Annex A.8.8 demands it. PCI-DSS Requirement 6 enforces it. We address all of them in a single engagement model.

All compliance frameworks
Our platform

Centraleyezerbuilt by Sandline

Centraleyezer is our Risk-Based Vulnerability Management platform. It scores findings by real business risk, tracks remediation against SLAs, and produces the audit evidence NIS2, DORA, ISO 27001, PCI-DSS and CRA require.

Engagement Workspace · 90 days free

Every Sandline engagement includes a Centraleyezer SaaS deployment for 90 days where you generate reports on demand. At day 90 it either closes (your DOCX/PDF reports and attestation letter stay with you) or extends as a paid SaaS subscription if you want to keep using it.

Six-factor contextual risk score

  • DREAD

    Damage / Reproducibility / Exploitability / Affected / Discoverability

  • Asset criticality

    Per-asset business value

  • Network exposure

    Internet-facing vs internal

  • Exploitability

    In-environment, not internet-scale

  • CTI signals

    Sector-specific actor activity

  • Human-AI loop

    Adapts to your team’s response patterns

FAQ

Frequently asked questions

What does Sandline do?

Sandline is a European cybersecurity firm based in Bucharest. We run penetration tests, red team exercises, vulnerability management programmes, incident response and security training. Sandline also builds and operates the Centraleyezer Risk-Based Vulnerability Management platform.

Who will I talk to on the first call?

A senior engineer who will lead the engagement, not an account manager. We use the first half-hour to agree on scope, the regulation you have to satisfy and the systems in scope.

Do you work with EU regulations?

Yes. Every engagement is mapped to NIS2, DORA, ISO 27001, PCI-DSS, the EU Cyber Resilience Act and GDPR — by article and sub-clause. We deliver reusable audit evidence, not separate reports per framework.

How fast can we start?

Typically 2–3 weeks from SOW signature for a pentest or vulnerability assessment. Incident response retainers kick off within 5 working days.

How do you price engagements?

Fixed price per scope. We deliver a written scope note and a clear total within three working days of the first call. No hourly billing, no end-of-engagement surprises.

What is Centraleyezer?

Centraleyezer is the RBVM platform built and operated by Sandline. It scores findings by real business risk using a six-factor contextual model (DREAD, asset criticality, network exposure, in-environment exploitability, CTI signals and a Human-AI feedback loop). Documented in full at centraleyezer.io.

Do I need to use Centraleyezer to work with Sandline?

Centraleyezer is not required. We use the platform internally for scoring; the traditional deliverables (DOCX/PDF report and attestation letter) are yours to keep. On top of that, every engagement includes the Engagement Workspace — a free 90-day Centraleyezer SaaS deployment where you can generate reports on demand. After the 90 days you can extend it as a paid SaaS subscription if you want an ongoing managed programme — otherwise the deployment simply closes and the reports and attestation letter remain yours.

Do you work with SMBs?

Yes. We have a fixed-scope SMB offering, plus custom engagements for larger organisations in NIS2, DORA or PCI-DSS scope.

What languages do you work in?

English and Romanian. We will communicate in either language for the engagement and produce audit reports in both on request.

Do you offer an incident-response retainer?

Yes. The retainer includes a guaranteed response time (median under 24h to contain a confirmed incident), a named playbook with senior handlers, and NIS2 (24h / 72h / 1-month) and GDPR (72h) notification packages.

Book a 30-minute call

Tell us about the regulation you need to satisfy and the systems in scope. We will come back with a scoping note and a fixed-price proposal within three working days.

Book a consultation