We are a full service

MANAGED IT SECURITY SOLUTIONS DISTRIBUTOR

brands we represent

Layered Endpoint Security for physical, virtual and cloud environments. Advanced threat protection with patented machine learning, firewall, device- and application control, web content filtering, MS Exchange protection, encryption, patch management, email security and EDR. Available for Managed Service Providers as multi-tenant cloud solution.

Unified endpoint management delivers IT and security leaders the technology needed to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With Watson™, MaaS360 is the only platform that delivers an AI approach to UEM to enable endpoints, end users, and everything in between — including apps, content, and data as a complete solution integrated with Contronex SecureValue UEM.

The automated cyber awareness solution for MSPs. usecure’s admin-lite, cloud-based, multi-tenant platform is designed to be seamlessly added to your MSP solution stack, helping you to reduce your clients’ user-related security incidents, boost service value and drive MRR. Includes security awareness training, simplified policy manager, phishing simulator and dark web monitoring.

Blue Shield Umbrella is a cloud-based security solution with real-time threat prevention. All internet traffic is verified on the DNS level with AI based algorithms. Traffic gets scanned and blocked before it can reach the corporate network. The solution is multi-tenant and MSP enabled. 

Complete Endpoint Protection by the German pioneer of antimalware software. Superior detection through dual-engine technology, firewall, device- and application control, web content filtering and patch management. Offers mobile device management, Windows, OS/X, Linux support and network monitoring.

Comprehensive Email Security with SPAM filtering, archiving, email encryption and continuity. Advanced threat protection, content filtering and in-depth auditing ensure safe email traffic.

Sending and receiving files securely via email. Complete audit trail of file downloads. The Outlook plugin makes this solution user-friendly and allows to enforce complianced and automated stripping of large files.
SecureSafe is a digital data and password safe  using double encryption and zero knowledge architecture to provide the highest level of privacy protection. Data inheritance and files sending and sharing completes this solution.

Years in Business

Product lines

reseller partners

Protected Endpoints

doing business with us

Contronex, Inc. specializes in the distribution of IT security software solutions to resellers and managed service providers in the United States and Canada.  We have developed our unique SecureValue Partner Program to make it easier for you to purchase the products your clients’ need, without all of the hassle that you have come to expect from an IT distributor.
If your company is looking for IT security products, we are here to help.  Utilizing our partner network, we will help you get connected with a local reseller that can assist you in getting the right products to meet your needs.  If we don’t have a partner in your area, our experienced team members will help you do a needs analysis and ensure you are getting the solution that is best for your company.

industry news

Control Panel Version 6.21.1.0

Enhancements Email actions from the “Email Live Tracking” module are now logged in the “Auditing 2.0” module. Improvements In the “Spam and Malware Protection” module, the user check for LDAP mailboxes has been integrated into the general user check option “Control Panel”. Hence, the “LDAP” option has been removed. An error during the synchronization of […]

Der Beitrag Control Panel Version 6.21.1.0 erschien zuerst auf Hornetsecurity.

read more

To pay or not to pay?

Recently, several magazines have repeatedly covered how to protect against and recover from ransomware attacks. However, many companies and individuals are left with the question of whether they would pay in the event of a potential future ransomware a…

read more

An overview of malware hashing algorithms

VirusTotal’s “Basic Properties” tab alone lists eight different hashes and supports even more to use them for queries and hunt signatures. Hashes are important for malware analysis, as well as identification, description and detection. But why do so ma…

read more
Our commitment is quite unique and entwines three simple concepts:

Integrity, Reliability and Commitment to service

Contronex Privacy Policy