|/||Cyber security of your websites, applications, networks and organizations. |
What is penetration testing, and why this is the most effective way to ensure the information security of your websites, applications, networks and organizations. Get a free consultation right now!
|/cyber-7||Seven stages, factors and symptoms of cyber diseases. |
Cyber security is cyber health. There are stages, factors and symptoms of “diseases” of systems and organizations, similar to diseases of the body. H-X diagnoses “diseases” of systems and organizations just as specialized laboratories diagnose your health.
|/about||About H-X cyber security team. What makes us different. Competence. Certificates. |
Our competences and certificates on security and penetration testing.
|/vuln-mgt||How to organize a comprehensive process of vulnerability management. |
To avoid serious security incidents, data leakage, business disruption, money loss and damage to your reputation, you should eliminate or remediate technical vulnerabilities as soon as possible.
|/cases||Business cases of the completed projects. Our customers and their references. |
Case studies of security assessment projects and penetration tests. Logotypes of our clients and their feedbacks.
|/services||Free and paid cyber security services. Security assessment, implementation, compliance, training and other services.|
GRC services: Audits and Implementation of ISO 27001, VDA ISA, TISAX, PCI DSS, GDPR, etc.; Remote CISO and Security Team Extension and other services. IT and IT Security Services: Vulnerability Scanning, Pentests; Application Security; Website Protection, Monitoring and Incident Response; Security DevOps Express SOC; Training on Secure Software Development; Software Engineering; Security Analysis of Software Source Code; Development and Audit of Smart Contracts; Forensic Investigations.
|/assess||Security assessment services. |
Assessment of organizational and technical security. Security audits. Vulnerability scanning. Penetration testing.
|/scan||Automated Security Scanning and Monitoring online. |
Free of charge automated vulnerability scanning and cheap subscription for daily security monitoring of websites.
Usage rules of our free of charge vulnerability scanning and daily monitoring of websites.
|/scan-guide||Security Scanner and Monitor User Guide. |
Easy guidance for users of our free of charge vulnerability scanning and daily monitoring of websites.
|/code-review||Security Analysis of Source Code. |
Get an outstanding level of security with our automated and manual analysis of your source code! You never get such level of assurance with penetration testing, automated code audit or any other security activities. This service can be delivered as a separate project, in combination with white-box penetration testing or as a part of Application Security or Security Assessment services.
|/sc-audit||Audit of Smart Contracts. |
We review and verify project specifications and source code of smart contracts to assess their overall security, doing that with a focus on weaknesses and potential vulnerabilities. We complement our findings with solutions that mitigate the risk of future attacks or loopholes.
|/compliance||Implementation and support of compliance with security standards and regulations. |
ISO 27001 and PCI DSS compliance services: audits, gap analysis, development of the implementation plan, certification and maintenance.
|/27001||ISO 27001 Compliance Assessment Online Wizard. |
Check within 10 minutes to what extent your company complies with ISO 27001 and what is still needed to achieve full compliance.
|/TISAX||Implementation and certification of VDA ISA and TISAX|
We are proud that completed one of the first TISAX certification projects in Ukraine. After that, we used our experience in other TISAX implementations. We were the first and remain the best!
|/SOC||Security Operations Center (SOC). |
Security is not a state, but a process. It is impossible to ensure security once and forever, but it must be maintained and improved constantly. We offer you a continuous subscription for our Security Operations Center as a Services (SOCaaS). We also help large companies build their own Security Operations Centers.
|/teamext||Continuous security by Remote CISO and Cyber Security Team Extension Services. |
Ensure your continuous security using subscription to our Remote CISO and Cyber Security Team Extension Services. Add our certified security specialists, security officers and data protection officers to your team for short or long projects. We can work for you or for your customers on your behalf. You are welcome to use our flexible team extension services!
|/web-SOC||Continuous Protection of Websites. |
Website Protection, Monitoring and Incident Response services are delivered by our Security Operations Center (SOC). Initial security hardening employs state of the art security solutions and methods for your website. Subsequent round-clock security monitoring is a proper complement to the initial hardening and to one-time security assessment and penetration testing, because their effect for your security becomes out-of-date quickly, unlike constant monitoring.
|/appsec||H-X Application Security Services: Secure Software Development Lifecycle, Security DevOps, Training and Consulting Services. |
Would you like to improve security of your software products, build secure software development processes and manage security during the whole software life cycle? Our expertise both in software development and in information security serves as a solid ground for delivering professional Secure Software Development Lifecycle (Secure SDLC) consulting services.
|/devs||H-X Software Engineering and DevOps Team. |
Our software development team performs security development and other software development tasks for our customers.
|/industrial||Industrial IT/OT Security and SCADA Security Services. |
Security assessment of industrial IT and OT infrastructure. Security assessment of SCADA systems. Security hardening of industrial IT and OT systems. Disaster recovery and Business Continuity Management at industrial enterprises. Personnel education at industrial enterprises.
|/forensic||Security Incident Response. Forensic Investigations. |
Our experts help mitigate and cease cyber attacks and other computer incidents, restore data and normal operations. Specialists of H-X Technologies take into account your business goals to choose the right incident response strategy and give corresponding priorities to your data integrity or confidentiality, your business continuity, identification of the attackers or their prosecution. We provide detailed forensic examination and analysis of computers, hard drives, mobile devices and digital media. We know how to investigate difficult cases and employ cutting-edge techniques such as analysis of Random-Access Memory (RAM), registry, shadow volumes, timeline analysis and other methods.
|/news||Our news. |
News about our services and other events.
|/partnership||Partnership with H-X Technologies. |
Earn with us while selling penetration tests and other cyber security services!
|/incidents||Cyber security incidents and threats. |
News about cyber attacks, breaches, threats, vulnerabilities, exposures, other cyber incidents, and other security industry events.
|/career||We are hiring! |
We are looking for experienced cyber security practitioners: penetration testers, analysts, compliance managers, etc.
|/contact||Contact us! |
Contact us about your needs on security services, partnership or other questions or suggestions.
|/faq||FAQ (Frequently Asked Questions). |
What is behind penetration testing, why it is important and how to persuade people.
|/policy||Privacy and Confidentiality Policy of H-X Technologies. |
How we value your privacy and confidentiality.
|/map||Website map. |
List of web pages of this site.