What makes us different
We are the team of cyber security professionals and white-hat hackers from Ukraine. The highest qualification, flexibility and reliability are our main distinctions:
|Experience in information security. Since 2001, we have gained rich information security experience in state sector, industry, pharmacy, telecom, retail, banking, IT outsourcing, etc. Read about our penetration test business cases.|
International security certifications. The specialists of |
Absolute legitimacy and confidentiality. We value our reputation, so refuse projects without written permission of target object owner. The employees of |
|The highest customization and flexibility. Our motto is ‘professional cyber security service for any budget’. We provide even free security assessment services. Our Express Pentest service is deeper than just a vulnerability scanning, but cheaper than pentests. We study every customer's needs carefully to prepare to the project. Unlike other companies, our pre-engagement documentation includes comprehensive set of detailed penetration testing parameters. Our approach allows the customer to understand more accurately what they pay for. We have developed and continually improve our methodology during many projects. This is our know-how and our distinction from competitors.|
|The highest quality. H-X uses modern comprehensive penetration testing methodologies and tools. Besides automatic vulnerability scanning, we actually do manual work. We do not claim that automatic vulnerability scanning is a pentest, like others do. H-X not only finds vulnerabilities and not just shows how exactly hackers can exploit them, but also helps customers eliminate vulnerabilities and reduce risks. In every project, we develop suggestions for continuous improvement and track changes in security of our customers over years.|
Our competence in cyber security
We have wide experience and competence in corporate security, not only in penetration testing:
- IT Audits and Information Security Audits.
- Managed compliance with GDPR, ISO 27001, PCI DSS, HIPAA, ITIL, ISF, NIST, COBIT, etc.
- Trainings and workshops on Secure Software Development (SDLC, Secure DevOps).
- Secure Software Development Lifecycle (SDLC, Secure DevOps) management of specific software products.
- Enterprise Risk Management and IT-related Risk Management.
- Technical Vulnerability Management.
- Security Event Monitoring and Evidence Preservation.
- Security Incident Response and Investigations.
- Business Continuity Management and Disaster Recovery Planning.
- Personnel Security Awareness and Behavior Management.
You can order any on-demand hourly-based security consulting service. Feel free to send your request.
Our valid international certificates
The certificates can be verified online at the respective certification organizations.
- (ISC)2: Certified Information Systems Security Professional (CISSP)
- Offensive Security: Offensive Security Certified Professional (OSCP)
- EC Council: Certified Ethical Hacker (CEH)
- ISACA: Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM)
- PCI SSC: Payment Card Industry Professional (PCIP)
- SANS: Security-560. Training course at SANS, USA
- PECB: Certified Lead Pen Test Professional (CLPTP)