May 5, 2026
Updated: May 5, 2026
A procurement-focused ranking of Norway’s leading penetration testing providers for cloud, compliance, enterprise, and offensive security needs.
Mohammed Khalil

The global average cost of a data breach reached USD 4.88 million in IBM’s 2024 study, and that cost profile is the right lens for evaluating the top penetration testing companies Norway buyers use to reduce real exploitability rather than satisfy a procurement checkbox. IBM also found that compromised credentials and phishing remained two of the most common initial vectors, while Microsoft reported that password-based attacks account for more than 99 percent of observed identity attacks and highlighted AI-enabled spear phishing and deepfakes as emerging attacker techniques.
For Norwegian buyers, this sits inside a mature digital environment with rising security-management expectations. Datatilsynet states that privacy protection in Norway follows European rules through the EEA context, while the Norwegian National Security Authority publishes ICT security principles intended for both public and private organizations and explicitly notes their relevance in ICT procurement. The Norwegian government’s digital strategy also links digitalization to stronger cyber resilience and preparedness.
That does not mean every Norwegian organization has the same regulatory exposure. NIS1 is implemented in Norwegian law through the digitalsikkerhetsloven, while NSM states that NIS2 is expected later; buyers should therefore avoid assuming universal NIS2 obligations in Norway today. For finance-sensitive environments, however, the picture is firmer: Finanstilsynet says DORA introduced threat-led penetration testing expectations for critical or important functions and continues to reference TIBER-NO as a practical testing collaboration framework. This ranking is methodology-driven and not sponsored.
Penetration testing is a structured adversarial security assessment that combines automated vulnerability discovery with manual exploit validation to identify real-world attack paths, validate control effectiveness, and reduce breach probability.
Norwegian buyers often screen providers more cautiously because security decisions are tied to governance quality as much as to technical execution. NSM’s ICT Security Principles are positioned as broadly relevant across public and private organizations and specifically useful when procuring ICT services, which raises the bar for methodology transparency and defensible reporting. In parallel, NSM’s guidance on national control for ICT services argues that critical services should be evaluated with attention to dependence, control, and risk, which makes delivery model, subcontracting, and cross-border execution more material in Norway than on many generic vendor lists.
The sector mix matters as well. Finance buyers can face TIBER-NO and DORA-related testing expectations where relevant. Public-sector and infrastructure-sensitive organizations tend to apply higher caution around supplier governance. Healthcare, energy, maritime, offshore, and industrial buyers often need reporting that translates technical flaws into operational and business consequences, not just CVE lists. For cloud-native and API-heavy organizations, the key concern is whether the vendor can validate identity abuse, privilege escalation, business-logic flaws, and cloud control gaps instead of producing scan-heavy output.
The ranking weights validated exploitability above raw finding volume. Providers scored better when reviewed material evidenced manual testing depth, exploit chaining, realistic attacker simulation, cloud and API maturity, reporting clarity, remediation usefulness, and re-testing provisions. Scan-heavy models, vague methodology language, or unclear evidence handling scored lower.
The assessment also favored evidence of modern delivery relevance: application and API testing, cloud configuration and IAM testing, identity-heavy environments, red or purple team capability, and the ability to support audit-heavy environments with clear documentation. Where public material evidenced certifications or formal schemes such as ISO 27001, NCSC CHECK, CREST, PCI QSA, or NSM-related quality schemes, that improved confidence in process maturity. Where a capability was implied in marketing language but not directly evidenced, it was treated as unproven.
Norway fit was judged separately from raw technical depth. A provider could score highly on offensive skill yet still rank lower for Norway if local operating conditions were unclear, sector relevance was weakly evidenced, or cross-border delivery questions would create procurement friction. Conversely, a Norway-visible provider did not gain rank simply by being present in the market if manual exploit validation was not clearly evidenced. This methodology therefore favors providers that can support enterprise, regulated, cloud, hybrid, and public-interest environments without assuming that size alone implies technical superiority.
Most buying mistakes are structural. The first is treating automated output as equivalent to a manual pentest. The second is under-scoping identity, API, cloud, and third-party integration exposure in modern environments. The third is selecting a vendor before reviewing how findings will be written for developers, risk owners, and auditors. Providers that expose exploit paths but do not help prioritize remediation often generate more internal work than external value.
Buyers should also check retesting terms, seniority of delivery staff, and whether cloud or application testing is actually distinct from generic infrastructure testing. In Norway specifically, it is important not to confuse visible local market presence with deeper offensive capability. For some procurements, especially in finance-sensitive or infrastructure-sensitive environments, delivery governance, national-control considerations, and cross-border data handling may matter as much as the exploit depth itself.
Best Overall Penetration Testing Company in Norway in 2026: DeepStrike

Headquarters: Newark, Delaware, United States; public contact address also listed in Dubai
Founded: Not clearly evidenced in reviewed public material
Company Size: Not clearly evidenced in reviewed public material
Primary Services: Penetration testing, web application testing, mobile application testing, cloud penetration testing, continuous penetration testing, red teaming as a service
Industries Served: Technology-centric digital businesses are most visible in reviewed material; broader sector concentration should be confirmed
Why They Stand Out
DeepStrike stands out in this ranking for a manual-first delivery model, explicit cloud and IAM testing coverage, public emphasis on continuous remediation workflows, and unusually visible retesting support. Public materials describe real-time tracking through a dashboard, integrations into engineering workflows, and publicly stated unlimited retesting support. Company-authored material also references OSCP, OSWE, and CISSP credentials, but buyers should validate named staffing on the actual engagement. Editorial note: DeepStrike is included in this list based on the same evaluation criteria applied to all providers.
Norway Relevance
DeepStrike is relevant to Norwegian buyers that prioritize cloud-first, API-heavy, and software-driven environments and are comfortable with cross-border delivery. Buyers with onsite, Norwegian-language, residency, or public-sector procurement requirements should confirm those conditions in advance because no Norway office or local-language delivery evidence was clearly visible in reviewed material.
Testing Depth Model
Manual exploit chaining. DeepStrike’s public positioning is explicitly anti-scan, manual-first, and oriented around cloud misconfiguration, IAM abuse, privilege escalation, container and Kubernetes exposure, and API business-logic validation. That typically improves breach-path accuracy in modern SaaS, hybrid, and regulated environments.
Key Strengths
Potential Limitations
Best For
Cloud-first SaaS companies, API-heavy platforms, and buyers that want high manual depth with fast remediation feedback loops.

Headquarters: Oslo, Norway
Founded: 2000
Company Size: More than 400 employees
Primary Services: Penetration testing, cloud security assessment, application testing, red team testing, purple team exercises
Industries Served: Broad enterprise coverage across IT and OT, with visible healthcare and public-sector relevance
Why They Stand Out
mnemonic stands out for the strongest visible Norway market grounding in this ranking, combined with mature offensive testing breadth across application, API, cloud, red team, purple team, and TIBER-style work. It also has the clearest local office footprint and some of the strongest public evidence of public-sector relevance.
Norway Relevance
mnemonic is relevant to Norwegian buyers that prioritize local delivery, Norway-based governance familiarity, and strong reporting for enterprise and public-interest environments. Its Oslo headquarters and offices in Stavanger and Trondheim matter for buyers that prefer visible local operating presence. For finance-sensitive buyers, its TIBER work is relevant, though scope and regulator-specific suitability should still be confirmed engagement by engagement.
Testing Depth Model
Red-team oriented. mnemonic evidences traditional penetration testing, cloud and application testing, and mature red and purple team capability. The TIBER content and advanced campaign methodology indicate a provider comfortable moving beyond simple validation into realistic adversarial simulation.
Key Strengths
Potential Limitations
Best For
Enterprise, public sector, healthcare, finance-sensitive environments, and organizations that want a Norway-based shortlist option with visible offensive maturity.

Headquarters: Stockholm/Solna, Sweden
Founded: 2025 under the Reversec brand
Company Size: Not clearly evidenced in reviewed public material
Primary Services: Penetration testing, application security, network security testing, cloud security testing, red teaming, purple teaming, attack path mapping
Industries Served: Finance, public sector, manufacturing, and product-focused environments appear in reviewed material
Why They Stand Out
Reversec stands out for human-led, selective-automation testing across a wide specialist set: cloud, Kubernetes, product security, generative AI, mainframe, and network security. Its public material is unusually explicit about attack-path thinking, context-aware testing, and adapting reporting formats and tools to the client environment.
Norway Relevance
Reversec is relevant to Norwegian buyers that prioritize offensive depth in a cross-border Nordic model. It has offices across Sweden, Finland, Denmark, the UK, the US, Singapore, and Italy, but no Norway office was clearly evidenced. Buyers with onsite, language, or domestic-public-procurement constraints should confirm those conditions in advance.
Testing Depth Model
Manual exploit chaining. Reversec explicitly states that it uses automation selectively and follows a human-led, attacker-minded approach. Its attack path mapping and purple teaming materials also suggest a preference for validated paths over superficial unauthenticated testing.
Key Strengths
Potential Limitations
Best For
Compliance-heavy Nordic buyers, cloud-native platforms, and organizations that need specialist offensive testing outside a generic network-scan model.

Headquarters: Manchester, United Kingdom
Founded: 1999
Company Size: Approximately 2,200 colleagues globally
Primary Services: Penetration testing, application security, network infrastructure testing, real attack simulation AI/ML testing
Industries Served: Public and private sectors globally, with visible healthcare and government relevance
Why They Stand Out
NCC Group stands out for breadth. Its public material spans manual, semi-automated, and automated testing, application review, real attack simulation, and AI/ML security, which makes it one of the broadest enterprise assurance options in this ranking.
Norway Relevance
NCC Group is relevant to Norwegian buyers that can accept cross-border delivery and want a large European provider with formal assurance depth. No Norway office was clearly evidenced in reviewed material, so buyers with strong local-delivery requirements should confirm delivery geography, subcontracting, and data-handling structures in advance.
Testing Depth Model
Hybrid model. NCC Group explicitly offers automated, semi-automated, and manual testing, alongside red, purple, and black teaming. That gives large organizations flexibility, but scope design matters because the available depth can vary materially by engagement type.
Key Strengths
Potential Limitations
Best For
Multinational enterprises, large regulated organizations, and buyers that want formal assurance breadth and attack simulation options under one provider.

Headquarters: Stockholm, Sweden
Founded: 2005
Company Size: Around 400 employees
Primary Services: Penetration testing, threat impact assessment, IAM, cloud security, MDR, incident response
Industries Served: Private and public sectors, with visible finance, healthcare, public-sector, and critical-infrastructure relevance
Why They Stand Out
Truesec stands out for combining offensive work with visible identity, Microsoft-cloud, MDR, and incident-response depth. That makes it particularly relevant for organizations whose real exposure is tied to Active Directory, Entra, Microsoft 365, or hybrid identity sprawl rather than to classic network perimeter flaws alone.
Norway Relevance
Truesec is relevant to Norwegian buyers that can work with a Nordic cross-border provider from Sweden, Finland, or Denmark. No Norway office was clearly evidenced, but Nordic delivery capacity is visible through offices in Stockholm, Malmö, Copenhagen, Aarhus, and Espoo. Buyers with Norway-specific public-sector or residency requirements should confirm these conditions directly.
Testing Depth Model
Hybrid model. Truesec evidence standard penetration testing together with broader threat impact assessment and offensive security work. That can be valuable where buyers want traditional pentesting combined with defensive validation and identity-centric hardening.
Key Strengths
Potential Limitations
Best For
Nordic enterprises, Microsoft-heavy environments, and buyers that want offensive testing linked closely to identity and operational defense.

Headquarters: Oslo/Fornebu, Norway
Founded: 2024
Company Size: 80 employees
Primary Services: Advisory services, assessment, cloud assessments, penetration testing, incident response, SOC services
Industries Served: Cross-sector Nordic organizations; energy relevance is visible through KraftCERT membership
Why They Stand Out
Telenor Cyberdefence stands out for its visible Norwegian context, local governance familiarity, and close coupling between advisory, cloud assessment, SOC, and incident response. For buyers that want a Norway-based security partner rather than a pure offensive boutique, that may be commercially useful.
Norway Relevance
Telenor Cyberdefence is directly relevant to Norwegian buyers because its HQ is in Oslo/Fornebu, it operates in the Nordic market, and its public framework references include NSM Grunnprinsipper, ISO 27001, NIST CSF, and Microsoft cloud assessment areas such as Azure and Entra ID. Its KraftCERT membership also creates visible relevance for energy-sensitive environments.
Testing Depth Model
Hybrid model. Public material clearly evidences penetration testing within a broader assessment and advisory portfolio, but does not provide the same offensive-security detail visible from the more specialist providers above. That makes it more suitable for buyers that value governance coherence and local coordination as much as raw exploit depth.
Key Strengths
Potential Limitations
Best For
Norwegian mid-market organizations, cloud-adopting enterprises, and buyers that want local coordination across assessment, advisory, and managed security functions.
| Company | Specialization | Testing Depth Model | Best For | Norway Fit | Compliance Alignment | Ideal Organization Size |
|---|---|---|---|---|---|---|
| DeepStrike | Manual-first app, cloud, API testing | Manual exploit chaining | Cloud-first SaaS and API-heavy platforms | Cross-border delivery relevance; local delivery should be confirmed | Audit-heavy environments | SMB to enterprise |
| mnemonic | Norway-based enterprise offensive testing | Red-team oriented | Enterprise and public-interest environments | Strong visible Norway fit | Regulated-environment fit where evidenced | Mid-market to enterprise |
| Reversec | Offensive-led specialist assurance testing | Manual exploit chaining | Compliance-heavy and specialist cloud/product scopes | Nordic cross-border relevance | Formal assurance alignment | Mid-market to enterprise |
| NCC Group | Large-scale assurance and attack simulation | Hybrid model | Multinational and regulated enterprise | Cross-border delivery relevance | Formal assurance alignment | Enterprise |
| Truesec | Identity-heavy and Microsoft-centric security | Hybrid model | Nordic enterprises with hybrid identity exposure | Nordic delivery relevance | Audit-heavy environments | Mid-market to enterprise |
| Telenor Cyberdefence | Norway-based assessment, advisory, and SOC integration | Hybrid model | Buyers wanting local coordination and governance fit | Strong visible Norway relevance | Framework-aligned advisory fit | SMB to mid-market |
The most common error is equating brand size with better offensive depth. Large firms may bring more governance processes, but that does not guarantee deeper application, cloud, or identity testing. The second error is treating vulnerability scanning, PTaaS dashboards, and a real pentest as interchangeable. Dashboards can improve workflow, but they do not replace human exploit validation. The third error is ignoring the report itself. In audit-heavy or regulated environments, the real buying outcome is not just a set of findings. It is whether engineering teams can remediate efficiently and whether risk owners can defend decisions later.
A separate Norway-specific mistake is assuming visible local presence automatically solves public-sector, regulated-sector, or technical fit. It may help with procurement comfort, but buyers still need to verify named technical staff, cloud and API maturity, retesting rules, and delivery governance for cross-border execution.
Large enterprises usually need one of two models. The first is a broad provider that can align testing to multiple stakeholders, formal assurance programs, and cross-border operating structures. The second is a specialist offensive firm that can focus on cloud, identity, API, or application attack paths without the delivery overhead of a larger consultancy. The right answer depends on whether the organization’s bottleneck is technical depth or governance coordination.
SMBs generally benefit less from full red-team theater and more from sharply scoped manual testing against internet-facing applications, APIs, cloud IAM, and identity controls. In Norway, a local provider may be useful where change management, language, or in-person alignment matter. Cross-border execution is often entirely acceptable when the real need is specialist depth, clear reporting, and rapid retesting. The key is to avoid paying for organizational scale when the real requirement is exploit accuracy.
No credible public source reviewed here supports a reliable Norway-wide price benchmark, so the buying decision should be framed through cost drivers rather than notional market averages.
The major drivers are scope size, target type, and delivery depth. Application and API work usually costs more than simple perimeter validation because business logic, auth flows, and chained paths require more manual time. Cloud testing complexity rises when IAM, Kubernetes, CI/CD, serverless, or multi-cloud are in scope. Costs also change materially when buyers need retesting, attestation letters, technical readouts, custom reporting formats, or cross-team coordination for enterprise assurance. Onsite work, third-party integrations, and continuous testing models can also raise or reshape total spend.
There is no high-confidence public benchmark in the reviewed material for Norway specifically. In practice, cost is driven by scope, cloud/API complexity, manual depth, retesting terms, reporting requirements, and delivery model.
At enterprise level, buyers should expect more than scanning: scoped adversarial testing, exploit validation, prioritized findings, remediation guidance, and stakeholder-ready reporting. Higher-maturity providers may also offer red or purple team options, cloud and identity testing, and formal attestation artifacts.
No. Certifications and formal schemes help establish process quality and assessor credibility, but tools do not replace manual reasoning. The more procurement-critical question is whether the provider can validate exploit paths and communicate remediation clearly.
It depends on scope. Focused application or infrastructure assessments may be short, while more advanced threat-led exercises can run across multiple weeks; mnemonic’s TIBER material, for example, references 12 to 16 week testing windows.
Not universally for every Norwegian organization. GDPR creates security obligations, NSM notes NIS1 is implemented through Norway’s digitalsikkerhetsloven and that NIS2 is expected later, and Finanstilsynet says DORA introduces threat-led penetration testing expectations for certain finance functions. Applicability depends on sector, legal scope, and operating model.
Choose local when onsite coordination, domestic governance familiarity, or national-control concerns are material. Choose cross-border when the bigger requirement is specialist cloud, API, identity, or threat-led offensive depth and those operational conditions can be controlled contractually.

A credible shortlist for Norway should not be built around generic brand recognition. It should be built around evidence: manual testing depth, exploit chaining realism, cloud and API maturity, reporting quality, retesting terms, and delivery conditions that fit Norwegian governance and cross-border operating realities. Used correctly, a top penetration testing company's Norway evaluation is a structured procurement exercise, not a marketing comparison. On that basis, DeepStrike, mnemonic, Reversec, NCC Group, Truesec, and Telenor Cyberdefence each have a legitimate place on a 2026 shortlist, but for materially different buying scenarios.
Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today
Contact Us