Solutions

Innovative cyber security solutions

Discover our full range of innovative cybersecurity solutions that can be tailored to your specific needs. From advanced protection to data management, we offer customized solutions for your business.

Cyber Security & Protection

Detection, protection and investigation systems against cyber-attacks for workstations, servers, email, web, mobile.
With Secure

With Secure EPP & EDR

Cyber Attack Detection Protection and Investigation

Palo Alte Networks

Palo Alto Cortex XDR – a comprehensive cyber threat protection, detection and response platform

Forcepoint

Forcepoint Web Security

Trellix

Trellix Complete Endpoint Business –

Detecție, Protecție și Investigație atac cibernetic 

Fortinet

FortiEmail Protection

NGFW, Web Application Firewall

Protection system for the entire IT infrastructure - perimeter security: IDS/IPS, DDos Protection, Sandboxing, web application firewall, Load Balancer, Access Policy Manager
F5

F5 – Advanced Web Application Firewall, Load Balancer, APM

Palo Alto Networks

Palo Alto NGFW – Next Generation Firewall, ATP, URL Filtering, SD-WAN; VPN, Sandboxing

Forcepoint

Forcepoint NGFW – Next Generation Firewall, ATP, URL Filtering, SD-WAN; VPN, Sandboxing, ZTNA – Zero Trust Network Access 

CISCO

CISCO Firepower NGFW – Next Generation Firewall, ISE (Identity Services Engine), Umbrella

Fortinet

FortiGate NGFW – Next Generation Firewall, VPN

Cloudflare

Cloudflare Cloud Web Application Firewall

Data Security & Auditing & SIEM

Analyze, audit and correlate network and application logs of information systems
Trellix

Trellix SIEM –  Security Information and Event Management

Splunk

Splunk SIEM – collects, normalizes and analyzes security data from various sources and applications

Netwrix

Netwrix Auditor & Change Tracker

ArcSight

ArcSight SIEM – Security Information and Event Management & SOAR

Fortinet

FortiSIEM – SIEM –  Security Information and Event Management

Data Protection & Classification, DRM, IRM

Information classification systems, data leakage protection, online and offline monitoring and tracking of information: endpoint, mail, web, network and archive. Information or document lifecycle control system.
Trellix

Trellix DLP – Data Loss Prevention

Forcepoint

Forcepoint Data Security – DLP, Discovery & Classification, Encryption, User and Entity Behavior Analytics, Insider Threat Protection

Fortra

Fortra Boldon James – Data Classification

Fortra

Fortra Digital Guardian DLP – Data Loss Prevention & Forensics

SealPath

SealPath – DRM (Digital Rights Management) & IRM (Information Rights Management)

Teramind

Teramind UAM- User Activity Monitoring & DLP – Data Loss Prevention

Back-up, Archiving, Restore, Disaster Recovery

Archiving, backup, disaster recovery systems. Backup can be done at database, archive, virtualized machines, physical servers, mail, workstations, cloud
Veeam

Veeam Backup Suite – Backup & Replication, ONE, Backup for Microsoft Office 365

Dell

Dell Data Protection Suite – Back-up, Archiving, Restore, Disaster Recovery, NetWorker, Avamar, Data Domain

Nakivo

Nakivo Backup & Replication

Acronis

Acronis Cyber Backup, Cyber Protect, Cyber Files, Disaster Recovery 

Vulnerability Managment

Vulnerability scanning system for internal and external infrastructure, web, applications to predict cyber-attacks and identify IT infrastructure vulnerabilities.
With Secure

With Secure Elements Vulnerability Management – infrastructure & web scanner

Tenable

Tenable Nessus Professional, SecurityCenter (SC) și Tenable.io

Acunetix

Acunetix web vulnerability scanner

Rapid7

Rapid7 – Vulnerability Insight and Management

Qualis

Qualys Vulnerability Management / QualysGuard – identify, track and remediate vulnerabilities in IT infrastructure

MFA, PAM, Identity & Access Management

Multi Step Authentication (MFA), Privileged Access Management (PAM), Identification and Access Management (IAM), Password Manager
Thales

Thales Authentication – strong cryptographic techniques and MFA – Multi-Factor authentication

OneSpan

OneSpan 2FA – Two-Factor Authentication & MFA – Multi-Factor Authentication

Cyberark

Cyberark PAM – Privileged Access Management

Delinea

Delinea PAM – Privileged Access Management

Mobile Device Management, Mobile Protection

Mobile Device Management, Unified Endpoint Management, Mobile Device Protection, Business Application
Ivanti

Ivanti UEM – Unified Endpoint Management & MDM – Mobile Device Management

BlackBerry

BlackBerry MDM – Mobile Device Management

Teamwire

Teamwire Business Manager, Local Mobile Employee Communication

Network Security Policy, Monitoring, Inventory

Network traffic monitoring at application, system, asset level. Monitoring interdependent processes between them. Software and hardware infrastructure audit and inventory, risk analysis, network topology.
TeamViewer

TeamViewer Remote Access, Monitoring and support

Lansweeper

Lansweeper – complete visibility into IT, OT and IoT assets infrastructure

Riverbed

Riverbed APM – Application Performance Management & NPM Network Performance Management

Axence

Axence: Integrated IT management, asset network software, help desk, smartime, user management

Dynatrace

Dynatrace – Unified Observability and Security Automated, Scalable, Secure — Drive business transformation with contextual analytics, AI, and automation

Netscout

Netscout – Network Performance & Security — Improve and Secure Service, Network, and Application Performance Anywhere and Everywher

SolarWinds

SolarWinds – Observability and IT Management Platform

Encryption & HSM

Point-to-point traffic encryption, symmetric and asymmetric encryption, level 3 plus, level 4, HSM
Thales

Thales Security Modules (HSMs), nShield hardware security modules & payShield payment HSMs

Certes Network

Certes Network – Zero Trust Infrastructure with security management & protection for Layer 2, Layer 3 si Layer 4 networks. Quantum encryption Layer 4

Perimeter 81

Perimeter 81 SASE – Secure Access Service Edge, Global Backbone Network, Private Access

Application Delivery Management

Information system dedicated to analyzing the integrity of developed applications, security of development platforms and applications developed on them, static and dynamic performance testing. Information security testing of any type of application
Opentext

Opentext – Fortify on Demand – security app vulnerability management (static & dynamic)  

Dynatrace

Dynatrace ADM – Application Delivery Management, Application Security, Application Vulnerability Analytics

DDoS Protection

Systems to prevent volumetric attacks - Distributed Denial of Service
Arbor by Netscout

Arbor Adaptive DDoS Defense Platform, Cyber Threat and Adaptive DDoS Mitigation, Network Visibility, backed by industry-leading threat intelligence

F5

F5 DDoS Attack Protection for Application

Cloudflare

Cloudflare Application & Network DDoS protection

SOC, Security Assessment, Penetration Testings

SOC services, Security assessment, Penetration testing. IT Security Penetration Testing involves a specialized IT security testing team to test the security of an IT infrastructure, taking a similar approach to cybercriminals.
Palo Alto XPANSE

Palo Alto XPANSE – active attack surface management solution – discover, learn about and respond to unknown risks in all connected systems and exposed services

Palo Alto Unite 42

Palo Alto Unite 42 it is a global threat intelligence team and research organization. It specializes in identifying, analyzing, and combating emerging cyber threats, including advanced persistent threats (APTs), malware campaigns, and cyber attacks targeting organizations worldwide.

XONTECH

Penetration Testing – Black Box, White Box, Grey Box

Fortra PhishLabs

Fortra PhishLabs – Digital Risk Protection – protects your organization’s critical digital assets and data from online threats including brand abuse, account takeover, social media scams, data leakage, and advanced email attacks

IT solutions and systems

PCs, Laptops, Ruggedized equipment

Dedicated business equipment for everyday work both in and out of the office for graphics professionals. Robust and durable equipment that can be used even in harsh outdoor environments and conditions such as military, industrial or even outdoors.
Dell

Dell PC, Laptops – Vostro, Latitude, Precision, XPS

HP

HP – PC, Laptops – EliteBook, Zbook

Getac

Getac Tablets & Laptops – Series B, S, X

Servers

Server tower, rack-mount, blade, hyperconverged, storage, networking and networking & cloud computing.
Dell

Dell Power Edge

HPe

HPe ProLiant

CISCO

CISCO UCS – Unified Computing Systems

Storage

Information storage, archiving and deduplication systems
Dell

Dell EMC Unity, PowerStore, PowerVault, SC Series (Compellent), Isilon, PowerMax

HPe

HPe StoreVirtual, 3PAR StoreServ, MSA (Modular Storage Array), StoreEasy, StoreOnce, Storage

NEC

NEC HYDRAstor, M Series, NS Series, D Series, E Series.

Routing, Switching, Wi-Fi Systems

Routing, switching and Wi-Fi systems
CISCO

Catalyst Series Switches, Nexus Series Switches, ISR (Integrated Services Router), Catalyst 9000 Series Switches, Catalyst 8000 Series Edge Platforms

Extreme Networks

ExtremeRouting SLX Series & VSP Series, ExtremeSwitching X465 Series & X870 Series, Extreme Fabric Automation, WiNG AP 7600 Series, AP 7632, AP 560 Series

HPE

HPE Aruba

Mikrotik

Mikrotik RouterBOARD, Router Switch CRS, CSS, RB, RBD, MikroTik cAP ac, hAP ac lite, mAP Lite, BaseBox, SXT, LHG, wAP ac

Cyber Range platform

A virtual or physical system that simulates real cyber security conditions and provides a framework for training and testing security skills.
Keysight

Keysight – Cyber Resilience with Simulated Attacks, Fight Cyberattacks in a Real-Life Setting, Gain Confidence Knowing You’re Ready for Attackers, tailored Training to Fit Your Team’s and Network Needs

Cyberbit

Cyberbit Cyber Range Attack Simulation, Live Fire Attacks, in the Cloud, Training with the Tools You Use Daily, Cyber Lab, Cyber Crisis Simulator

Cyber & Air Defence

Cyber & Air Defense involves the integration and close cooperation between cyber and aerospace forces to ensure coordinated and effective action against technological and air threats
Dat Con

Dat Con Mobile Surveillance Systems, Electro Optical Heads – Multi Sensors, Portable Observation Systems – Bopas, Early Fire Detection Systems, Anti Drone Systems – LYNX,

Dat Con

Dat Con Defence – Anti Drone LYNX, Commander Sight Lotus, Weapon Station Sights – EOS

Body Worn Camera & Face Recognition

Body-worn video recording systems. Static and dynamic face-based identification and authentication solutions
Getac Video

Getac Body-worn cameras, Getac In-Car cameras (front, inside, back)

NEC

NEC Face Recognition, NeoFace Watch, Iris Recognition, Fingerprint Identification

Video Analytics, NVR, AVL

Video data analysis and interpretation solutions (object identification and tracking, motion detection, behavior analysis and facial recognition)
Milestone

Milestone XProtect VMS (Video Management Software), XProtect Smart Client, XProtect Mobile, XProtect Add-ons

Getac Video

Getac Enterprise Data Management

Interactive / Video conferencing systems

Video conferencing systems and interactive tables, video wall, controller
Horion

Horion interactive Table 65”, 75”, 86”, 98”

Sharp

Sharp Interactive Displays, digital signage, boardroom, video walls

Telephony / DECT

Telephone system Analog, Digital, IP, DECT, Unified Communications
NEC

NEC PBX (Private Branch Exchange) – SV9000 Series, SL2100, UNIVERGE 3C, SL1100, NEC DECT

Gigaset

Gigaset DECT (Digital Enhanced Cordless Telecommunications), N870 IP PR, N510 IP PRO, DX800A, DX600A ISDN, DE900 IP PRO

Other IT platforms and solutions

Operating systems, databases, Windows licenses, Office, Exchange, editing programs and remote connection
Microsoft

Microsoft Windows, Office Suite, Microsoft 365, Azure, Windows Server, Exchange, SQL, Sharepoint

Adobe

Adobe Photoshop, Illustrator, InDesign, Premiere Pro, After Effects, Acrobat

TeamViewer

TeamViewer Remote Access, TeamViewer Meetings, eamViewer Remote Management, TeamViewer IoT

ABBYY

ABBYY FineReader, FlexiCapture, Vantage, FineReader Server

ISO Management Systems Consultancy & Certification

ISO certification
TUV Austria

TUV Austria Certificare ISO 9001, 27001, 14001, 45001, 22000, 13485, 28000, 15733, 13816

QSCERT

QSCERT Certificare ISO 9001, 27001, 14001, 45001, 22000, 50001

Training courses, Training - IT

Services and training courses with international certification in the fields of IT, Cyber Security, Business, Management, Sales, Marketing
XONTECH ACADEMY

Cyber Security, IT, Business, Leadership, Lean & Agile, Management, Vânzări, Marketing

Secure your business now with Xontech!

Please enable JavaScript in your browser to complete this form.