We are a full service

Value Added distributor
for it security soLutions

brands we represent

Layered Endpoint Security for physical, virtual and cloud environments. Advanced threat protection with patented machine learing, firewall, device- and application control, web content filtering, MS Exchange protection, encryption and patch management. Available for Managed Service Providers as multi-tenant cloud solution.
Complete Endpoint Protection by the German pioneer of antimalware software. Superior detection through dual-engine technology, firewall, device- and application control, web content filtering and patch management. Offers mobile device management, Windows, OS/X, Linux support and network monitoring.
Award winning antimalware solution with proven detection, prevention and repair. Protection for Windows based systems, servers and Microsoft Exchange. Managed with choice of consoles offering additonal optional functionalities.
Comprehensive Email Security with SPAM filtering, archiving, email encryption and continuity. Advanced threat protection, content filtering and in-depth auditing ensure safe email traffic.
Data leakage prevention through layered device- and application control, encryption and web security. Interactive security awareness training and detailed reporting guarantee compliance.
SecureSafe is a digital data and password safe  using double encryption and zero knowledge architecture to provide the highest level of privacy protection. Data inheritance and files sending and sharing completes this solution.
Sending and receiving files securely via email. Complete audit trail of file downloads. The Outlook plugin makes this solution user-friendly and allows to enforce complianced and automated stripping of large files.

Years in Business

Product lines

reseller partners

Protected Endpoints

doing business with us

Contronex, Inc. specializes in the distribution of IT security software solutions to resellers and managed service providers in the United States and Canada.  We have developed our unique SecureValue Partner Program to make it easier for you to purchase the products your clients’ need, without all of the hassle that you have come to expect from an IT distributor.
If your company is looking for IT security products, we are here to help.  Utilizing our partner network, we will help you get connected with a local reseller that can assist you in getting the right products to meet your needs.  If we don’t have a partner in your area, our experienced team members will help you do a needs analysis and ensure you are getting the solution that is best for your company.

industry news

Apple users can download all the data the company has on them

Unless you’ve been living under a rock this entire time, you’ve probably heard and already been blasted with emails related to GDPR, the EU’s data privacy regulation. Companies must keep customers informed about how their data is processed and assure them that they will from now on do their best to protect it. Apple is […]

read more

The best (and most secure) chat apps

The growing importance of chat applications can easily be seen by the number of attempts to infiltrate them (or to scam users). The most recent is that of the Russian government which, on more than one occasion, asked Telegram to give it the encryption…

read more

The best (and most secure) chat apps

The growing importance of chat applications can easily be seen by the number of attempts to infiltrate them (or to scam users). The most recent is that of the Russian government which, on more than one occasion, asked Telegram to give it the encryption…

read more

The enemy in your chip – new CPU exploit discovered

Remember Spectre and Meltdown? The two caused quite some trouble for, well, basically everyone owning a computer due to the fact that the security hole was not in some program but in the processors itself. Now that the dust has finally settled for Inte…

read more

Smart Phishing Defence

If you take a closer look at phishing URLs for a while, you are able to identify them at a glance. There are typical patterns in phishing URLs which appear repeatedly. Those cases, in which certain patterns can be observed are generally well-suited to …

read more

Help! GDPR or Phishing Mail?

The GDPR is almost upon us! Thanks to countless mails everyone – including you, your parents, your dog and yes, even cybercriminals – will have a hard time missing it. The latter is why you should be extremely careful nowadays when it comes…

read more
Our commitment is quite unique and entwines three simple concepts:

Integrity, Reliability and Commitment to service