www.h-x.technology Open in urlscan Pro
104.21.51.36  Public Scan

Submitted URL: http://service.h-x.technology/
Effective URL: https://www.h-x.technology/
Submission: On December 05 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST /#wpcf7-f117-o1

<form action="/#wpcf7-f117-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;"> <input type="hidden" name="_wpcf7" value="117"> <input type="hidden" name="_wpcf7_version" value="5.8.3"> <input type="hidden" name="_wpcf7_locale" value="en_US"> <input type="hidden" name="_wpcf7_unit_tag"
      value="wpcf7-f117-o1"> <input type="hidden" name="_wpcf7_container_post" value="0"> <input type="hidden" name="_wpcf7_posted_data_hash" value=""> <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AFcWeA5yj7d5pNYqmwJiSuYpVhrrnfi81p6HfnN_B0Fu33ZfGDWCkZnItvb-hWY2I5ce0JHxBXZ54HRa7v7E_aiWByzifTF1_oUYIqFeuDzNeUp1QN1lnC3NzRrlcDaC8aKIykzTNPHkt0txyRzBU-AWygimJYTA0zw_N_hRWm57NmqzHZ2t1xOQF7gwxGXJ4Vgr1ZGtGsShiQ9N3rzuaPCU45PC-LeS8nyaugiuY26oVce8QcrfmWtC4HANFp-XvTdFZxS_TGR4A9_A97zo57nZaUMHuN-oMNSG5Mm853_oo5_vpjNVdz8eP_LhlMuvXdXyqHjqOFW6qdOwqyDOvyGryTRtV9C7GxF8_KttTHJ-yK7s08YJh69LTLYn6T99hSHhAnsq_oDRMVzioM_dSQK1PK8vHXNRhivfW1rTpLglyH9zAVOpuQy5cYTzFGZMsXOcKmBbqOGZD3Hr1CvjlHzk8Gs8kMB_BRyOnp1K3pFXy1GOPDuvl2MebksN5OjeH44w2eD-iQ0jGQv3vGVdf3ols01RieJ60C0i27ep1JaAC8tiQtj0P0hFlqd98qq_3RPUVGm9xuz_9KEl8j3MH1r-sVTALwTUhg">
  </div>
  <p><span class="wpcf7-form-control-wrap" data-name="user-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Name" value="" type="text"
        name="user-name"></span><br> <span class="wpcf7-form-control-wrap" data-name="user-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" aria-required="true"
        aria-invalid="false" placeholder="Email" value="" type="email" name="user-email"></span><br> <span class="wpcf7-form-control-wrap" data-name="x8"><textarea cols="40" rows="10"
        class="wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Message" name="x8"></textarea></span><br> <button
      class="btn blue submit wpcf7-form-control wpcf7-submit">Send</button> </p>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

GET https://www.h-x.technology/

<form role="search" class="search" method="get" action="https://www.h-x.technology/"> <input type="text" class="search_input" value="" name="s" required=""> <button type="submit" class="search_button"></button> </form>

POST /#wpcf7-f117-o2

<form action="/#wpcf7-f117-o2" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;"> <input type="hidden" name="_wpcf7" value="117"> <input type="hidden" name="_wpcf7_version" value="5.8.3"> <input type="hidden" name="_wpcf7_locale" value="en_US"> <input type="hidden" name="_wpcf7_unit_tag"
      value="wpcf7-f117-o2"> <input type="hidden" name="_wpcf7_container_post" value="0"> <input type="hidden" name="_wpcf7_posted_data_hash" value=""> <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AFcWeA5yj7d5pNYqmwJiSuYpVhrrnfi81p6HfnN_B0Fu33ZfGDWCkZnItvb-hWY2I5ce0JHxBXZ54HRa7v7E_aiWByzifTF1_oUYIqFeuDzNeUp1QN1lnC3NzRrlcDaC8aKIykzTNPHkt0txyRzBU-AWygimJYTA0zw_N_hRWm57NmqzHZ2t1xOQF7gwxGXJ4Vgr1ZGtGsShiQ9N3rzuaPCU45PC-LeS8nyaugiuY26oVce8QcrfmWtC4HANFp-XvTdFZxS_TGR4A9_A97zo57nZaUMHuN-oMNSG5Mm853_oo5_vpjNVdz8eP_LhlMuvXdXyqHjqOFW6qdOwqyDOvyGryTRtV9C7GxF8_KttTHJ-yK7s08YJh69LTLYn6T99hSHhAnsq_oDRMVzioM_dSQK1PK8vHXNRhivfW1rTpLglyH9zAVOpuQy5cYTzFGZMsXOcKmBbqOGZD3Hr1CvjlHzk8Gs8kMB_BRyOnp1K3pFXy1GOPDuvl2MebksN5OjeH44w2eD-iQ0jGQv3vGVdf3ols01RieJ60C0i27ep1JaAC8tiQtj0P0hFlqd98qq_3RPUVGm9xuz_9KEl8j3MH1r-sVTALwTUhg">
  </div>
  <p><span class="wpcf7-form-control-wrap" data-name="user-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Name" value="" type="text"
        name="user-name"></span><br> <span class="wpcf7-form-control-wrap" data-name="user-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" aria-required="true"
        aria-invalid="false" placeholder="Email" value="" type="email" name="user-email"></span><br> <span class="wpcf7-form-control-wrap" data-name="x8"><textarea cols="40" rows="10"
        class="wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Message" name="x8"></textarea></span><br> <button
      class="btn blue submit wpcf7-form-control wpcf7-submit">Send</button> </p>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

Text Content

CONTACT US


FOR YOUR CONVENIENCE, USE THIS FORM:




Send


Thank you!
Your email has been sent
Contacts
+39-345-449-11-16
 * en
 * ru
 * ua
 * de

I'm under attack!

 * Company
   * About us
     * What makes us different
     * History and mission
     * Values and Codes of Ethics
     * Sustainability
   * Certificates and competence
   * Our business cases and clients
   * Customer references
   * Career
   * Doing business with us
   * Contacts
   * News
 * Services
   * Security audit and testing
     * Penetration testing
     * Red Team – test your incident response
     * Security compliance audit
     * Security audit of source code (SAST)
     * Audit of smart contracts
     * Configuration audit and cloud security assessment
     * SCADA and ОТ audit
     * Incident investigation and forensics
   * Security implementation
     * Business Continuity Management as a service
     * Server hardening
     * DDoS protection and Performance Testing
     * Implementation of cloud security
     * Protection of telecommunications
     * Security of SCADA and industrial IT/OT
   * Application security
     * Security audit of source code (SAST)
     * Secure Software Life Cycle
     * Product, service and DevOps security
     * ASVS certification
     * Application security training
   * Security compliance
     * Security compliance audit
     * ISO 27001 implementation and certification
     * SOC 2 implementation and report
     * VDA ISA and ENX TISAX implementation
     * PCI DSS implementation
     * GDPR implementation and DPO service
     * NIS 2 Cybersecurity Directive
     * ASVS certification
   * Application Development and DevOps
     * Software development
     * DevOps
     * Development of smart contracts
     * Virtualization
   * Security training
     * Awareness programmes
     * Application security training
     * Training for cybersecurity specialists
     * Industrial security training
   * Managed security
     * Managed compliance
     * Security experts as a service and Virtual CISO
     * Protection of websites
     * Managed threat detection and response
     * SOC as a Service
     * Threat intelligence
 * Solutions
   * Free online security assessment services
     * Website Security Scanner
     * Smart contract security analyzer
     * ISO 27001 audit online
     * VDA ISA and ENX TISAX audit online
     * SCADA/ICS audit calculator
   * Cryeye Multi-engine Security Monitoring
   * SIEM/SOC implementation
   * SOC as a Service
   * Business Automation
 * Resources
   * Industries
     * Protection of industrial infrastructure from cyber attacks
     * Online store security
     * Automotive cybersecurity
     * Audit of banking systems
     * Cybersecurity for medical institutions
     * Cybersecurity of telecommunications
     * Security services for applications and SaaS
     * Information security companies
     * Cyber threat protection for small businesses
     * Protecting your enterprise from cyber threats
   * Web3 and blockchain
   * General presentation
   * Project Reports and Certificates
   * Blog

I'm under attack!
 * en
 * ru
 * ua
 * de


IT AND WEB3 SECURITY SERVICES

We assess, develop, implement, certify and maintain secure systems. We teach
security. Add our deep IT and cybersecurity expertise to your projects.

Contact us


 * ABOUT US


 * PARTNERSHIP


 * SERVICES


 * BLOCKCHAIN




SECURITY OPERATIONS CENTER

Security audit and testing

Penetration testing

Incident investigation

Monitoring and response

Сloud security

Application security

Security training

Security compliance



OFFERS TO CLIENTS

Information security companies Web3 and Blockchain Security services for
applications and SaaS Cybersecurity of telecommunications Cybersecurity for
medical institutions Audit of banking systems Automotive cybersecurity Online
store security Protection of industrial infrastructure from cyber attacks
Protecting your enterprise from cyber threats Cyber threat protection for small
businesses Information security companies Web3 and Blockchain Security services
for applications and SaaS Cybersecurity of telecommunications Cybersecurity for
medical institutions Audit of banking systems Automotive cybersecurity Online
store security Protection of industrial infrastructure from cyber attacks
Protecting your enterprise from cyber threats Cyber threat protection for small
businesses Information security companies Web3 and Blockchain Security services
for applications and SaaS Cybersecurity of telecommunications Cybersecurity for
medical institutions Audit of banking systems Automotive cybersecurity Online
store security Protection of industrial infrastructure from cyber attacks
 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7
 * 8
 * 9
 * 10
 * 11




SECURITY AUDIT

Configuration audit and cloud security assessment SCADA and industrial IT&ОТ
audit Incident investigations and cyber forensics Red Team, Blue Team and Purple
Team
Get a complete picture of what can be improved in the settings of your server,
network or cloud infrastructure for efficient hardening. Read more.
Delegate assessing the security of your manufacturing infrastructure's critical
elements to industrial IT security certified professionals. Read more.
Prepare in advance for investigations. If it’s not possible to prevent an
incident, then at least help to protect your legal rights competently. Read
more.
Get a complete understanding of how prepared your security department is for
real threats. Improve efficiency even more with Blue Team and Purple Team
approaches. Read more.
Gain a significant market and competitive advantage by complying with
international security standards for your organization. Start by auditing the
security of your organization.
Get the most realistic assessment of your staff and systems' security. Learn
more about modeling the hackers' and social engineers' actions.
Get a level of security assurance unattainable with an external penetration test
or any other security measure. Learn more about code security auditing.
Check your smart contract to avoid financial and reputational damage due to
attacks, overflows, race-conditions, access violations and other security
issues. Read more.
Security compliance Penetration testing Audit of application code Audit of smart
contracts


CUSTOMERS' FEEDBACK

We are very pleased that we have had the opportunity to work with such a team of
professionals as H-X Technologies. Everything was done according to the
conditions specified in the statement of works and was done exactly on schedule.
Both the security assessment process itself and the provided reports showed a
high level of professionalism.
Sergey Krivich
Head of Information Security, BI Group
Since 2020, "H-X Technologies" has been providing information security services
to JSC KB "PrivatBank," within which tasks related to formal compliance with
international information security requirements are successfully addressed. We
recommend the "H-X Technologies" team as a provider of high-quality information
security services.
Ostrovsky Krzysztof Peter
Head of Department
We express our gratitude to the reliable contractor, the H-X Technologies team,
for the high-quality and timely completion of the security assessment of DTEK's
information resources, as well as for their contribution to DTEK's cyber
resilience. The project results are comprehensive and accurate, and the reports
are well-structured and clear.
Yuriy Shatylo
Head of the Information Security Department
After the diagnosis and securing the platform, we gained the confidence to
launch it, thanks to H-X Technologies. The team thoroughly guided us during the
audit phase. Overall, we were impressed by the team's customer-centric approach
throughout.
Sergej Polovnikov
Director of Engineering at NATEC
H-X have provided us with high-quality information security assessment and
penetration testing services. All the processes concerning negotiations,
development of technical specifications, and coordination were carried out at a
high professional level. The quality of the provided services meets our
requirements, and the detailed reporting also confirms the good quality of the
provided services.
Mykola Traknov
Director, IT SmartFlex (subsidiary of Vodafone Ukraine)
The H-X Technologies team provided information security services for Foodkom LLC
(TM Velyka Kyshenya, Velmart, etc.). The team successfully assessed the
information security of the IT infrastructure, and consulted on information
security. We recommend H-X Technologies as a reliable provider of professional
information security services.
Sergii Kurinny
Deputy Director General for Security and Information Systems, Foodkom
After one successful test, the end-client ordered another, demonstrating H-X
Technologies' expertise and quality. Communication was consistent and responsive
throughout. They managed the projects well and didn't let anything fall through
the cracks. They are a competitively priced partner.
Reto Kaeser
CTO, astarios
They’re efficient and show a sense of urgency. Even under tight deadlines, they
don’t compromise the quality of their work. We’re happy with the work that
they’ve provided. We turned over H-X Technologies’ reports to some of our
customers, and they were impressed. Feedback has been positive. Our customers
feel confident that our product is secure.
Kirsti Wennberg
Operations Director, Favro
The H-X team has completed a technical security assessment of one of our
products, and we've been surprised by the high-quality results. They've helped
us to improve the quality of our development and testing processes.
Viktoriia Pogrebniak
IT Manager, FluentPro
We were facing serious challenges related to our customers'
requirements for formal compliance with international and industry information
security standards. The H-X team very quickly helped us to evaluate and fill the
current organizational and technical gaps, and they continue to help.
Artem Savotin
Managing Director, Ameria
The H-X team has conducted a detailed project planning to assess the security of
our infrastructure. They have shown a creative approach, and have properly
implemented the security assessment plan. The security assessment has provided
valuable information on the priorities to enhance our company's security,
including strategic objectives and tactical activities.
Dmytro Dniprovskyi
Information Security Manager, Intecracy Group
We are very pleased that we have had the opportunity to work with such a team of
professionals as H-X Technologies. Everything was done according to the
conditions specified in the statement of works and was done exactly on schedule.
Both the security assessment process itself and the provided reports showed a
high level of professionalism.
Sergey Krivich
Head of Information Security, BI Group
Since 2020, "H-X Technologies" has been providing information security services
to JSC KB "PrivatBank," within which tasks related to formal compliance with
international information security requirements are successfully addressed. We
recommend the "H-X Technologies" team as a provider of high-quality information
security services.
Ostrovsky Krzysztof Peter
Head of Department
We express our gratitude to the reliable contractor, the H-X Technologies team,
for the high-quality and timely completion of the security assessment of DTEK's
information resources, as well as for their contribution to DTEK's cyber
resilience. The project results are comprehensive and accurate, and the reports
are well-structured and clear.
Yuriy Shatylo
Head of the Information Security Department
After the diagnosis and securing the platform, we gained the confidence to
launch it, thanks to H-X Technologies. The team thoroughly guided us during the
audit phase. Overall, we were impressed by the team's customer-centric approach
throughout.
Sergej Polovnikov
Director of Engineering at NATEC
H-X have provided us with high-quality information security assessment and
penetration testing services. All the processes concerning negotiations,
development of technical specifications, and coordination were carried out at a
high professional level. The quality of the provided services meets our
requirements, and the detailed reporting also confirms the good quality of the
provided services.
Mykola Traknov
Director, IT SmartFlex (subsidiary of Vodafone Ukraine)
The H-X Technologies team provided information security services for Foodkom LLC
(TM Velyka Kyshenya, Velmart, etc.). The team successfully assessed the
information security of the IT infrastructure, and consulted on information
security. We recommend H-X Technologies as a reliable provider of professional
information security services.
Sergii Kurinny
Deputy Director General for Security and Information Systems, Foodkom
After one successful test, the end-client ordered another, demonstrating H-X
Technologies' expertise and quality. Communication was consistent and responsive
throughout. They managed the projects well and didn't let anything fall through
the cracks. They are a competitively priced partner.
Reto Kaeser
CTO, astarios
They’re efficient and show a sense of urgency. Even under tight deadlines, they
don’t compromise the quality of their work. We’re happy with the work that
they’ve provided. We turned over H-X Technologies’ reports to some of our
customers, and they were impressed. Feedback has been positive. Our customers
feel confident that our product is secure.
Kirsti Wennberg
Operations Director, Favro
The H-X team has completed a technical security assessment of one of our
products, and we've been surprised by the high-quality results. They've helped
us to improve the quality of our development and testing processes.
Viktoriia Pogrebniak
IT Manager, FluentPro
We were facing serious challenges related to our customers'
requirements for formal compliance with international and industry information
security standards. The H-X team very quickly helped us to evaluate and fill the
current organizational and technical gaps, and they continue to help.
Artem Savotin
Managing Director, Ameria
The H-X team has conducted a detailed project planning to assess the security of
our infrastructure. They have shown a creative approach, and have properly
implemented the security assessment plan. The security assessment has provided
valuable information on the priorities to enhance our company's security,
including strategic objectives and tactical activities.
Dmytro Dniprovskyi
Information Security Manager, Intecracy Group
We are very pleased that we have had the opportunity to work with such a team of
professionals as H-X Technologies. Everything was done according to the
conditions specified in the statement of works and was done exactly on schedule.
Both the security assessment process itself and the provided reports showed a
high level of professionalism.
Sergey Krivich
Head of Information Security, BI Group

See all


CERTIFICATES




NEWS

25 Nov 2023
We are enhancing the security level in Web3
Read
4 Oct 2023
Our work in the field of talent development and career building
Read
2 Oct 2023
Our updated ISO 27001 online wizard
Read

See all


CONTACT US

Schedule a 15 minute call


AS AN OPTION, USE THIS FORM:




Send


Thank you!
Your email has been sent
 * Home
 * Success stories
 * About us
 * Doing business with H‑X Technologies
 * Career
 * Privacy Policy
 * Common Frequently Asked Questions

 * 
 * * English
   * Русский
   * Українська
   * Deutsch

© H-X Technologies
 * Information Security services
 * Free online security assessment services
 * Free website security scan
 * Penetration testing
 * Free security analysis of smart contracts
 * Audit of smart contracts
 * ISO 27001 compliance checklist
 * ISO 27001 certification

+39-345-449-11-16
info@h-x.technology
540504 Romania, Targu Mures, Aleea Covasna 6, ap. 7
San-Francisco, New York, Toronto, Montreal, Reykjavík, Copenhagen, Dresden,
Vienna, Turin, Warsaw, Bucharest, Kyiv, Odesa, Chernivtsi, Doha, Dubai, Astana,
Almaty
 * News
 * Blog
 * Contact us


This website, like any other well developed website, uses cookies.
Agree Details