MANAGED IT SECURITY SOLUTIONS DISTRIBUTOR
Contronex is a cybersecurity distributor that specializes in providing SaaS security solutions to managed service providers. Our goal is to help MSPs secure their clients’ networks and data by offering a wide range of advanced security solutions, including threat detection and response, endpoint protection, unified endpoint management and security awareness training. With our comprehensive offerings and dedicated support team, we make it easy for MSPs to protect their clients from cyber threats and meet industry standards.
our product profolio
Layered Endpoint Security for physical, virtual and cloud environments. Advanced threat protection with patented machine learning, firewall, device- and application control, web content filtering, MS Exchange protection, encryption, patch management, email security and EDR. Available for Managed Service Providers as multi-tenant cloud solution.
Unified endpoint management delivers IT and security leaders the technology needed to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With Watson™, MaaS360 is the only platform that delivers an AI approach to UEM to enable endpoints, end users, and everything in between — including apps, content, security and data as a complete solution.
The automated cyber awareness solution for MSPs. usecure’s admin-lite, cloud-based, multi-tenant platform is designed to be seamlessly added to your MSP solution stack, helping you to reduce your clients’ user-related security incidents, boost service value and drive MRR. Includes security awareness training, simplified policy manager, phishing simulator and dark web monitoring. Asses your customers exposure with the Human Risk Report feature.
Built as a Pre-Boot-Authentication (PBA) system Secure Disk for BitLocker is a small security operating system that is loaded prior the start of Windows. It offers additional boot features and full management of the underlaying Windows encryption. The BitLocker add-on eliminates all limitations of BitLocker
Years in Business
doing business with us
More than 150,000 traffic controllers spread across the continental US run a
vulnerable software that has yet to be patched, despite warnings of the dangers,
a security researcher has discovered.
When most people think of vulnerable devices connected to the internet, traffic
controllers or traffic lights aren’t top of mind. But the truth is that many
such devices are online for ease of management. Like any other hardware device,
though, these devices, even traffic lights, can have vulnerabiliti
Tax season is a prime time for scam artists and cybercriminals to wage targeted
attacks against taxpayers to steal personal data and conduct identity theft
According to the FTC, tax-related identity theft is most common during tax
filing season, which this year began on Jan. 23 in the US. With tax-related
identity theft reports up 45% from pre-pandemic levels, Americans need to remain
vigilant to avoid becoming another identity theft statistic while they prepare
their 2023 tax returns.
Pro-Russian group Killnet hit numerous European hospitals, including the
University Medical Center Groningen (UMCG) in the Netherlands, with massive DDoS
attacks, crashing their websites.
Killnet made its name in recent years by attacking online resources in countries
that supported Ukraine’s defense against the Russian invasion. They started
small by hitting websites belonging to various authorities, but eventually
worked their way up by targeting airports and even the US Treasury
A cyberattack against the National News Agency of Ukraine (Ukrinform) was likely
the work of UAC-0082 (Sandworm), a group likely operating under Russia’s Main
Department of the General Staff of the Armed Forces (GRU), according to
Sandworm is likely a Russian cyber military unit responsible for numerous
attacks over the years, including the release of the infamous NotPetya malware.
Its main goal is to compromise and disrupt infrastructure, which is exactly the
goal of the
Security experts developed a new exploit that lets users unenroll
enterprise-managed Chromebooks to skirt restrictions organizations impose on the
use of their devices.
The exploit, dubbed “Shady Hacking 1nstrument Makes Machine Enrollment Retreat,”
or Sh1mmer, was developed by Mercury Workshop Team researchers and involves
modifying publicly leaked RMA shims.
Schools and organizations usually enroll devices such as Chromebooks to make
them easier to manage centrally. Administrators can perfor
Enhancements The new features Secure Links and QR Code Analyzer are available for Advanced Threat Protection. Secure Links replaces URL Rewriting. If a user opens a link in an email, Secure Links analyzes the link and either redirects the user to the web page or blocks it. The QR Code Analyzer scans the target link […]
Integrity, Reliability and Commitment to service