Website map
Map mode: short, detailed, auto.
/ | Cybersecurity of your applications, websites, networks, and organizations What is penetration testing, and why it is the most effective way to ensure the information security of your websites, applications, networks, and organizations. Get a free consultation right now! |
/cyber-7 | Seven analogies between cyber and physical diseases Cybersecurity is cyber health. There are stages, factors, and symptoms of “diseases” affecting systems and organizations, similar to diseases of the body. H-X diagnoses “diseases” affecting systems and organizations just as specialized laboratories diagnose diseases in your body. |
/about | About H-X cybersecurity team. What makes us different. Company management. Competence. Certificates Our competences and certificates on security and penetration testing. |
/vuln-mgt | How to organize the full cycle of information security vulnerability management To avoid serious security incidents, data leakage, business disruption, money loss and damage to your reputation, you should eliminate or remediate technical vulnerabilities as soon as possible. |
/cases | Case studies of completed projects. Our customers and their testimonials Case studies of security assessment projects and penetration tests. Logos of our clients and their feedbacks. |
/services | Security assessment, implementation, compliance, training, and other services. Free and paid cybersecurity services GRC services: Audits and Implementation of ISO 27001, VDA ISA, ENX TISAX®, PCI DSS, GDPR, etc.; Remote CISO and Security Team Extension and other services. IT and IT Security Services: Vulnerability Scanning, Pentests; Application Security; Website Protection, Monitoring and Incident Response; Security DevOps Express SOC; Training on Secure Software Development; Software Engineering; Security Analysis of Software Source Code; Development and Audit of Smart Contracts; Forensic Investigations. |
/assess | Information security assessment services Assessment of organizational and technical security. Security audits. Vulnerability scanning. Penetration testing. |
/scan | Vulnerability Scanning and Monitoring online Free of charge, automated vulnerability scanning and a cheap subscription for daily security monitoring of websites. |
/scan-tou | Terms of Use for Vulnerability Scanner Usage rules for our free of charge Vulnerability Scanner. |
/scan-guide | Vulnerability Scanner User Guide Easy guidance for users of our free of charge Vulnerability Scanner. |
/code-review | Security Analysis of Source Code Get an outstanding level of security with our automated and manual analysis of your source code! You never get such a level of assurance with penetration testing, automated code audit or any other security activities. This service can be delivered as a separate project, in combination with white-box penetration testing or as a part of Application Security or Security Assessment services. |
/sc-audit | Smart Contract Audit We review and verify project specifications and source code of smart contracts to assess their overall security, with a focus on weaknesses and potential vulnerabilities. We complement our findings with solutions that mitigate the risk of future attacks or loopholes. |
/compliance | Implementation and managed compliance with ISO 27001, PCI DSS, VDA ISA, and other security standards and regulations ISO 27001 and PCI DSS compliance services: audits, gap analysis, development of the implementation plan, certification and maintenance. |
/iso-27001-checklist | ISO 27001 Compliance Assessment Online Wizard Check within 10 minutes the extent to which your company complies with ISO 27001 and what is still needed to achieve full compliance. |
/TISAX | Implementation of VDA ISA and ENX TISAX® Implement the VDA ISA security standard, pass the audit and obtain ENX TISAX® certification, and find new opportunities in the automotive industry. |
/VDA-TISAX | Details on implementation of VDA ISA and obtain ENX TISAX® certification We are proud that we have completed one of the first ENX TISAX® certification projects in Ukraine. After that, we used our experience in other ENX TISAX® implementations. We were the first and remain the best! |
/check-TISAX | VDA ISA and ENX TISAX® Compliance Assessment Online Wizard Check within 30 minutes to what extent your company complies with the requirements of VDA ISA standard and ENX TISAX® mechanism. |
/pci-dss-gdpr | Implementation and managed compliance with PCI DSS, GDPR, and other security regulations and standards PCI DSS and GDPR compliance services: audits, gap analysis, development of the implementation plan, certification and maintenance. |
/SOC | Security Operations Center (SOC) Security is not a state but a process. It is impossible to ensure security once and for all, but it must be maintained and improved constantly. We offer you a continuous subscription for our Security Operations Center as a Service (SOCaaS). We also help large companies build their own Security Operations Centers. |
/teamext | Cybersecurity Team Extension Services and Continuous security by Remote CISO Ensure your security non-stop using a subscription to our Remote CISO and Cybersecurity Team Extension Services. Add our certified security specialists, security officers, and data protection officers to your team for short or long projects. We can work for you, or your customers on your behalf. You are welcome to use our flexible team extension services! |
/website-SOC | Continuous Protection of Websites Website Protection, Monitoring, and Incident Response services are delivered by our Security Operations Center (SOC). Initial security hardening employs state of the art security solutions and methods for your website. Subsequent round-the-clock security monitoring goes hand-in-hand with the initial hardening and one-time security assessment and penetration testing, which quickly become obsolete without constant monitoring. |
/training | Application Security Training and Consulting Services The application security training and consulting service is delivered in the form of workshops, lectures, tests and consultations for managers and team leads, software architects and analysts, software developers, and software testers. |
/appsec | Application Security: Security DevOps, Secure Software Development Lifecycle, Training and Consulting Services Would you like to improve the security of your software products, build secure software development processes and manage security during the whole software life cycle? Our expertise both in software development and in information security serves as a solid foundation for delivering professional Secure Software Development Lifecycle (Secure SDLC) consulting services. |
/devs | Software Engineering and DevOps Services Our software development team performs security development and other software development tasks for our customers. |
/industrial | Industrial IT/OT Security and SCADA Security Services Security assessment of industrial IT and OT infrastructure. Security assessment of SCADA systems. Security hardening of industrial IT and OT systems. Disaster recovery and Business Continuity Management in industrial enterprises. Personnel education in industrial enterprises. |
/ICS-calc | Industrial IT/OT Audit Calculator Estimate in minutes how much time and money it will cost to conduct an industrial IT and OT information security audit of your enterprise. |
/forensic | Cybersecurity Incident Response and Information Security Forensic Investigation services Our experts help mitigate and stop cyber attacks and other computer incidents, restore data and normal operations. H-X Technologies' Specialists take into account your business goals to choose the right incident response strategy while properly prioritizing among data integrity, confidentiality, business continuity, identification of the attackers or their prosecution. We provide detailed forensic examination and analysis of computers, hard drives, mobile devices, and digital media. We know how to investigate difficult cases and employ cutting-edge techniques such as analysis of Random-Access Memory (RAM), registry, shadow volumes, timeline analysis, and other methods. |
/news | Our news News about our services and other events. |
/incidents | Cybersecurity incidents, threats, and industry news News about cyber attacks, breaches, threats, vulnerabilities, exposures, other cyber incidents, and other security industry events. |
/partnership | Doing business with H-X Technologies We offer a wide range of opportunities for us to collaborate, from selling penetration testing to new joint ventures. |
/career | We are hiring! We are looking for experienced cybersecurity practitioners: penetration testers, analysts, compliance managers, etc. |
/contact | Contact us! Contact us about your needs concerning security, about doing business together or any other questions or suggestions. |
/faq | FAQ (Frequently Asked Questions) What is behind penetration testing, why it is important and how to persuade potential buyers. |
/policy | Privacy and Confidentiality Policy How we value your privacy and confidentiality. |
/map | Map of this website List of web pages on this site. |
Follow us on the social networks:
Who we are, what we do and what we offer.