Awardo

H-X Technologies
Cosmic reliability in IT We assess, develop, implement, certify and maintain secure systems. We teac
0.00
Company description

Security audit and testing
SECURITY AUDIT AND TESTING
Assess, with our help, the security of your systems, networks, cloud application infrastructure, source code, personnel, and the company in general. Penetration tests, vulnerability analysis, risk assessment, and mitigation recommendations. Incident investigation.

Security implementation
SECURITY IMPLEMENTATION
Apply our expertise to protect your clouds, SCADA and OT systems, servers, and telecommunications. We perform efficient hardening of systems, protect against DoS/DDoS attacks and other security incidents.

Application security
APPLICATION SECURITY
Pay attention to the secure software development lifecycle, the security of your applications and services, and the security skills of your developers and testers. We certify applications according to the ASVS security standard.

Security compliance
SECURITY COMPLIANCE
Get a competitive edge and meet your customers’ expectations with our audit, implementation, and certification services in accordance with ISO 27001, TISAX, SOC 2, PCI DSS, GDPR, and other regulations.

Application Development and DevOps
APPLICATION DEVELOPMENT AND DEVOPS
Take advantage of our unique competencies in secure software development, smart contracts, virtualization, and DevOps. We automate and optimize business processes while ensuring their security.

Security training
SECURITY TRAINING
Learn about our employee awareness programs, psychological security, secure coding, penetration testing, and industrial information security training.

Managed security
MANAGED SECURITY
Continuously maintain the security of your systems and your entire organization with our SOC Services, Managed Compliance, Virtual CISO, Website Security, Managed Threat Detection and Response, and Threat Intelligence.

Services

Security audit and testing
SECURITY AUDIT AND TESTING
Assess, with our help, the security of your systems, networks, cloud application infrastructure, source code, personnel, and the company in general. Penetration tests, vulnerability analysis, risk assessment, and mitigation recommendations. Incident investigation.

Number of employees
10 - 49
Country
Top Similar Companies
H-X Technologies
0.00
Cosmic reliability in IT We assess, develop, implement, certify and maintain secure systems. We teac
Security audit and testing SECURITY AUDIT AND TESTING Assess, with our help, the security of your systems, networks, cloud application infrastructure, source code, personnel, and the compan […]
 
RMail
0.00
RMail®, Track, Prove, Encrypt, E-Sign, Certify.
RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delive […]
 
Essential Tech
0.00
We are leaders in flexibility, usability, and support
Essential Tech is a Brisbane-based Managed IT services provider dedicated to providing organizations with better technology services. We partner with small-to-medium-sized businesses across […]