The Coding Company
C# .NET, PHP, Laravel, C/C++, Open Source, Cloud, Security, Pen-test, REDHAT, LINUX

Develop, secure and manage

We are a web application developer and specialised partner offering a complete service in hosting, software development, mobile development and security solutions. At The Coding Company, we design, host, secure and support your website or app. We take care of everything for you, so you can focus on what truly matters.
About web application specialist The Coding Company
The Coding Company has been a specialised web application developer for more than 25 years. Our full-service approach allows us to guide you step by step through your entire SDLC project. Not sure where to start? Bring us in. From planning to implementation, we handle everything.
Official RedHat Partner
Why choose The Coding Company?
The Coding Company delivers outstanding service backed by more than 25 years of experience as a web application specialist and developer.
25+ jaar experience
Over the past 25 years, we have proven ourselves as professionals in our field, working with both small businesses and large enterprises.
Personalised approach
Every company has its own mission and goals. Our aim is to develop unique products that reflect them.
Growing for the future
Talented professionals help your platform grow by applying the latest technologies.
Our Services
We offer a wide range of services across the IT landscape and are the go-to internet company if you want everything handled with ease. As a web application developer, we take care of the full development of your app or website. In addition, we are a web application specialist, providing top-tier support and guidance throughout the entire process.
  • Information security
    Our servers and underlying infrastructure are hardened and demonstrably meet high security standards. Where relevant, we follow guidance from the NIST Cybersecurity Framework and FIPS standards, while maintaining a practical balance for day-to-day operations. Despite more than 25 years of experience, we continue to evolve, improving our practices and adapting proactively to new insights, standards and methodologies.

    Annual penetration tests are performed, both internally and by external parties. We use the eight classical security principles from Saltzer and Schroeder’s paper “The Protection of Information in Computer Systems” (1975) as a foundation for our security strategy. These principles are regularly reviewed and tested. Although the publication is several decades old, its relevance in today’s digital landscape remains remarkably strong.

    We also employ automated security hardening through Red Hat’s Ansible System Roles, including the implementation of CIS Benchmarks and DISA STIGs. These roles are based on recognised frameworks such as NIST 800-53 and are consistently applied to ensure uniform and reproducible security configurations across our infrastructure.
  • Securing computer systemen
    1. Economy of Mechanism
    Design security mechanisms to be as simple and transparent as possible. A clear and minimal structure makes auditing, maintenance and fault detection easier, reducing the likelihood of vulnerabilities.
    2. Principle of Least Privilege
    Every user, process and system component should have only the minimum access rights required to perform its tasks — no more. This limits potential damage in the event of misuse or compromise.
    3. Open Design Principle
    The security of a system must not rely on the secrecy of its design or implementation. Robust security should be based on transparent, publicly verifiable principles and algorithms rather than obscurity.
    4. Fail-safe Defaults
    Default access settings should deny access unless explicit permission has been granted. This minimises the risk of accidental exposure of data or functionality.
    5. Separation of Privilege
    Critical operations should require multiple independent conditions to be met (for example, multi-factor authentication). This strengthens resilience against both external attacks and insider misuse.
    6. Least Common Mechanism
    Shared mechanisms or resources between users or processes should be minimised. This prevents unintended information leakage and enhances isolation between actors within the system.
    7. Complete Mediation
    Every access request to information or resources must be checked each time it occurs, not only on initial access. This prevents previously granted permissions being reused without ongoing verification.
    8. Psychological Acceptability
    Security controls must be intuitive and user-friendly so that users are inclined to follow them correctly. Frustrating or overly complex mechanisms encourage workarounds and reduce overall security effectiveness.
    Wil je hierna ook een kortere versie voor marketingmateriaal, of juist een meer formele versie voor een auditrapport (ISO/NIST)?
  • Business applications
    We operate as a web application developer and maintain business applications, both cloud-based and non-cloud-based.
  • Cybersecurity and pentests
    Securing mobile applications and other platforms is receiving increasing attention. Building a secure system is just as important as keeping it secure. Our penetration tests follow the latest security guidelines, and we actively monitor and assess all vulnerability reports.
What do you get from us as a web application specialist?
  • Clear communication and accurate time estimates
    As a client, you want to know two things: the cost of development and the time required to build it. With this information, you stay fully in control of your budget and planning.
  • Senior software developers with design skills
    We work exclusively with senior developers who design data schemas and technical infrastructure, and who provide support with software architecture challenges. We ensure quality, durability and optimal performance.
  • Productivity enhancement
    We help you get the most out of your resources — not only in terms of performance, but also in cost efficiency and throughput.
Get in touch with us

If you want to have a mobile application or website designed, or want to elevate your existing platform with the help of a professional web application developer and specialist, we are here to assist you. We take care of everything from start to finish. Feel free to contact us for more information about our services.

Web Application Development, Enterprise Software, Cyber Security, Data Sovereinty, Software Engineering, Open Source