Our Commitment to Partners during COVID-19

Adjusting to remote work brings challenges.  There is nothing more important than the care and well-being of our partners, their families, their customers, and our internal team members.
We are here to help you with the proper tools and guidance. Our team is fully operational and ready to support you in the very best way we can. We want to be connected with you and we want to be productive during this time.

Please take consistent care of yourselves and your loved ones. Be safe, be sensitive to others, and let us be strong together.

We are a full service


brands we represent

Layered Endpoint Security for physical, virtual and cloud environments. Advanced threat protection with patented machine learning, firewall, device- and application control, web content filtering, MS Exchange protection, encryption, patch management, email security and EDR. Available for Managed Service Providers as multi-tenant cloud solution.

Unified endpoint management delivers IT and security leaders the technology needed to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With Watson™, MaaS360 is the only platform that delivers an AI approach to UEM to enable endpoints, end users, and everything in between — including apps, content, and data.

Complete Endpoint Protection by the German pioneer of antimalware software. Superior detection through dual-engine technology, firewall, device- and application control, web content filtering and patch management. Offers mobile device management, Windows, OS/X, Linux support and network monitoring.

Blue Shield Umbrella is a cloud-based security solution with real-time threat prevention. All internet traffic is verified on the DNS level with AI based algorithms. Traffic gets scanned and blocked before it can reach the corporate network. The solution is multi-tenant and MSP enabled. 

Comprehensive Email Security with SPAM filtering, archiving, email encryption and continuity. Advanced threat protection, content filtering and in-depth auditing ensure safe email traffic.

Award winning antimalware solution with proven detection, prevention and repair. Protection for Windows based systems, servers and Microsoft Exchange. Managed with choice of consoles offering additonal optional functionalities.
Sending and receiving files securely via email. Complete audit trail of file downloads. The Outlook plugin makes this solution user-friendly and allows to enforce complianced and automated stripping of large files.
SecureSafe is a digital data and password safe  using double encryption and zero knowledge architecture to provide the highest level of privacy protection. Data inheritance and files sending and sharing completes this solution.

Years in Business

Product lines

reseller partners

Protected Endpoints

doing business with us

Contronex, Inc. specializes in the distribution of IT security software solutions to resellers and managed service providers in the United States and Canada.  We have developed our unique SecureValue Partner Program to make it easier for you to purchase the products your clients’ need, without all of the hassle that you have come to expect from an IT distributor.
If your company is looking for IT security products, we are here to help.  Utilizing our partner network, we will help you get connected with a local reseller that can assist you in getting the right products to meet your needs.  If we don’t have a partner in your area, our experienced team members will help you do a needs analysis and ensure you are getting the solution that is best for your company.

industry news

COVID Vaccine Maker AstraZeneca Targeted by Alleged North Korean Hackers

Reuters today is running a story saying “suspected” North Korean hackers have targeted employees at British drugmaker AstraZeneca in an attempt to infect their computers with malware. The company is one of the leading groups developing a promising COVID-19 vaccine. Two people with knowledge of the matter who asked to remain anonymous said the hackers […]

read more

Fertility Patients’ Sensitive Personal Information Stolen During Ransomware Attack

Fertility Patients' Sensitive Personal Information Stolen During Ransomware AttackUS Fertility network took two months to go public about attack. Health information of patients may be at risk. Fertility clinics across the United States have been struck by a ransomware attack that has not only encrypted networks, but also stolen patients’ sensitive personal and medical information. US Fertility, a network of fertility clinics which […]

read more

Every Day Should Be International Computer Security Day

For the past 32 years, Computer Security Day has been held every November 30 to remind internet users of the importance of protecting all internet-connected devices, and personal and business information from malicious attacks and unauthorized access to data. This year we’re celebrating a bit early, as a means to raise awareness and provide meaningful […]

read more

Home Depot Hiring Security Chief Six Years After Major Security Incident

Home Depot has agreed to pay $17.5 million as part of a multistate lawsuit settlement following a cyber incident that occurred six years ago. As part of the settlement, the home improvement retailer is finally hiring its first chief information security officer (CISO). A press release from the New York Attorney General’s office says the […]

read more

Phishing Technique Trends

The basic idea behind phishing has not changed since the 90s, however, the delivery tactics and techniques are constantly evolving.
In this article we outline current trends in phishing techniques. These include abuse of legitimate file hosting services, geo-fencing, automatically loading the victims company and/or email provider logo on the phishing website and asking the victim for the password multiple times.

Der Beitrag Phishing Technique Trends erschien zuerst auf Hornetsecurity.

read more

FBI Warns of Spoofed Domains Imitating their Website

Cyber actors have spoofed legitimate FBI websites in an effort to trick people, possibly by disseminating false information or gathering credentials, according to an FBI advisory. Spoofing official domains, whether they belong to private companies or public institutions, is just one of many steps cybercriminals take before launching an attack. In this situation, the FBI […]

read more
Our commitment is quite unique and entwines three simple concepts:

Integrity, Reliability and Commitment to service

Contronex Privacy Policy