DERUUA

Website map

Map mode: short, detailed, auto.

/ Cyber security of your websites, applications, networks and organizations.
     /cyber-7 Seven stages, factors and symptoms of cyber diseases.
/about About H-X cyber security team. What makes us different. Competence. Certificates.
     /vuln-mgt How to organize a comprehensive process of vulnerability management.
/cases Business cases of the completed projects. Our customers and their references.
/services Free and paid cyber security services. Security assessment, implementation, compliance, training and other services.
     /assess Security assessment services.
          /scan Automated Security Scanning and Monitoring online.
               /scan-tou Security Scanning and Monitoring Terms of Use.
               /scan-guide Security Scanner and Monitor User Guide.
          /code-review Security Analysis of Source Code.
          /sc-audit Audit of Smart Contracts.
     /compliance Implementation and support of compliance with security standards and regulations.
          /27001 ISO 27001 Compliance Assessment Online Wizard.
          /TISAX Implementation and certification of VDA and TISAX
     /SOC Security Operations Center (SOC).
          /teamext Continuous security by Remote CISO and Cyber Security Team Extension Services.
          /web-SOC Continuous Protection of Websites.
     /appsec H-X Application Security Services: Secure Software Development Lifecycle, Security DevOps, Training and Consulting Services.
     /devs H-X Software Engineering and DevOps Team.
     /industrial Industrial IT/OT Security and SCADA Security Services.
/news Our news.
     /partnership Partnership with H-X Technologies.
     /incidents Cyber security incidents and threats.
     /career We are hiring!
/contact Contact us!
/faq FAQ (Frequently Asked Questions).
/policy Privacy and Confidentiality Policy of H-X Technologies.
/map Website map.



Follow us on the social networks:


Who we are, what we do and what we offer.

About penetration tests.


Our certificates:

(ISC)2
CISSP
ISACA
CISA
CISM
Offensive Security
OSCP
PECB
LPTP
Microsoft
Qualys
BSI