Hexiosec is the new name for Red Maple Technologies. Find out more
here
.
☰
Platform
Transfer
Hexiosec Transfer
Send and receive large files securely using end-to-end encryption.
Sign in
|
Try It
|
Pricing
Secure End-to-End Sharing
Create and request secure and private file transfers.
Protect Outlook Attachments
Encrypt your email attachments with seamless Outlook integration.
Attack Surface Management
Hexiosec ASM
Asset discovery and testing.
Sign in
|
Try It
|
Pricing
Asset Discovery
Discover your attack surface
Cyber Risk Management
Track and manage your risks with Hexiosec ASM's built-in Kanban board
Detailed Data
Gain unprecedented access to the underlying scan data
Vulnerability Detection
See what hackers can see, and where you are vulnerable
Reporting
Download reports for executive level reporting or more detailed data exports
Evolving Threat Landscape
Let Hexiosec ASM keep on top of the evolving threat landscape
Services
Our Services
Services Home
We solve your cyber security challenges
Secure Digital Transformation
We build secure platforms, systems, and applications
Online Discovery Services
Discover internet assets and resources
Technical Security Testing
Test the security of your applications, networks, infrastructure and devices
Cyber Security Improvement
We can evaluate and improve your company's cyber security
Your Requirements
Help You Safely Use the Cloud
We can build you a new, secure cloud infrastructure
Help Manage Your Cloud Security
Securely maintain your cloud infrastructure, applications and services
Help You Build Applications Securely
We can help you systematically build secure applications with best practices
Security Test Your Application
Our technical testing evaluates the security of an application, service or infrastructure
Protect Your Devices
We can test and improve your device security configuration
Client Stories
Testing Microsoft 365 Configuration Security
Testing a Giant Corporate Network
Protecting Software Intellectual Property
Finding and Testing Online Assets
Delivering 40% Cloud Cost Savings
Building a Secure Cloud Infrastructure
See all...
Solutions
Case Studies
Client Stories
How we've helped our clients with cyber and engineering challenges
Formula 1 Case Study
How Hexiosec helped an F1 team secure their attack surface
Use Cases
Inform Lead Qualification
Find out about your potential leads to start meaningful conversations
Manage Your Attack Surface
Check your company's online attack surface and keeping scanning it for new vulnerabilities
Managed Service Providers (MSPs)
Differentiate your services and increase revenue with cybersecurity services
Secure File Transfer
Adding end-to-end encryption to daily consulting communications
Technical Due Diligence
Check a company's security posture up front with a one-time scan of their attack surface
Third-Party Supply Chain Risks
Measure the risks of your vendors and third-party supply chain
Resources
Resources
Product Documentation
Get the most out of Hexiosec products using our documentation
Open Source
The engineering projects we have made open source
Videos
Learn about our company and products
LinkedIn User Community
Come and join the Hexiosec user community
API Documentation
ASM API Documentation
Integrate Hexiosec ASM data into your tools, products and services
Transfer API Documentation
Programmatically share files securely
Blogs
Featured Blog
Even Cheaper Private Kubernetes
Read more...
Blogs
New ASM Features and Improvements | December 2024
How To Prepare For A Safer Christmas
New ASM Features and Improvements | November 2024
Even Cheaper Private Kubernetes
Testing Smart Device Privacy - Our Work for Which?
We've Rebranded to Hexiosec
An Introduction to DORA & How ASM Supports Compliance
Managing Apple Devices in Microsoft 365 With Intune
See all...
Company
Get in Touch
Contact Us
Get in touch about Hexiosec
About Us
Our People
Meet the Hexiosec team
History
Company background and the history of our products & services.
Careers
Current vacancies
News
Latest News
Latest News and Announcements
Contact Us
Platform
Hexiosec ASM
Asset discovery and testing.
Hexiosec Transfer
Send and receive large files securely using end-to-end encryption.
Asset Discovery
Discover your attack surface
Cyber Risk Management
Track and manage your risks with Hexiosec ASM's built-in Kanban board
Detailed Data
Gain unprecedented access to the underlying scan data
Vulnerability Detection
See what hackers can see, and where you are vulnerable
Reporting
Download reports for executive level reporting or more detailed data exports
Evolving Threat Landscape
Let Hexiosec ASM keep on top of the evolving threat landscape
Secure End-to-End Sharing
Share files securely and privately with anyone, or invite them to send files to you
Protect Outlook Attachments
Encrypt your email attachments with seamless Outlook integration.
Services
Services Home
We solve your cyber security challenges
Secure Digital Transformation
We build secure platforms, systems, and applications
Online Discovery Services
Discover internet assets and resources
Technical Security Testing
Test the security of your applications, networks, infrastructure and devices
Cyber Security Improvement
We can evaluate and improve your company's cyber security
Help You Safely Use the Cloud
We can build you a new, secure cloud infrastructure
Help Manage Your Cloud Security
Securely maintain your cloud infrastructure, applications and services
Help You Build Applications Securely
We can help you systematically build secure applications with best practices
Security Test Your Application
Our technical testing evaluates the security of an application, service or infrastructure
Protect Your Devices
We can test and improve your device security configuration
Solutions
Client Stories
How we've helped our clients with cyber and engineering challenges
Formula 1 Case Study
How Hexiosec helped an F1 team secure their attack surface
Inform Lead Qualification
Find out about your potential leads to start meaningful conversations
Manage Your Attack Surface
Check your company's online attack surface and keeping scanning it for new vulnerabilities
Managed Service Providers (MSPs)
Differentiate your services and increase revenue with cybersecurity services
Secure File Transfer
Adding end-to-end encryption to daily consulting communications
Technical Due Diligence
Check a company's security posture up front with a one-time scan of their attack surface
Third-Party Supply Chain Risks
Measure the risks of your vendors and third-party supply chain
Resources
Product Documentation
Get the most out of Hexiosec products using our documentation
ASM API Documentation
Integrate Hexiosec ASM data into your tools, products and services
Transfer API Documentation
Programmatically share files securely
Open Source
The engineering projects we have made open source
Videos
Learn about our company and products
LinkedIn User Community
Come and join the Hexiosec user community
Blogs
Company
Contact Us
Get in touch about Hexiosec
Our People
Meet the Hexiosec team
History
Company background and the history of our products & services.
Careers
Current vacancies
Latest News
Latest News and Announcements
Blogs
The latest news and updates from the Hexiosec team
Filters
Learning
Expert Insights
ASM
Hexiosec ASM Features
Hexiosec Transfer
News & Announcements
Reset Filters
No blogs found
We couldn't find any blogs matching your search. Try removing some filters.
Product Features
New ASM Features and Improvements | December 2024
Tim Cowell
9 January 2025
3 minute read
Expert Insights
How To Prepare For A Safer Christmas
Luke Gardner
11 December 2024
5 minute read
Product Features
New ASM Features and Improvements | November 2024
Oliver Sanders
5 December 2024
4 minute read
Learning
Even Cheaper Private Kubernetes
Rich Young
4 December 2024
14 minute read
Learning
Testing Smart Device Privacy - Our Work for Which?
Scott Lester
5 November 2024
6 minute read
Product Features
New ASM Features and Improvements | October 2024
Tim Cowell
31 October 2024
4 minute read
Product Features
New ASM Features and Improvements | September 2024
Tim Cowell
14 October 2024
3 minute read
News & Announcements
We've Rebranded to Hexiosec
David Griffiths
30 September 2024
6 minute read
Product Features
New ASM Features and Improvements | August 2024
Tim Cowell
3 September 2024
5 minute read
Product Features
New ASM Feature - Apache Backports Reporting
Tim Cowell
31 August 2024
4 minute read
Product Features
New ASM Features and Improvements | July 2024
Tim Cowell
7 August 2024
3 minute read
Product Features
New ASM Features and Improvements | June 2024
Tim Cowell
28 June 2024
2 minute read
Product Features
New ASM Features and Improvements | May 2024
Nicola Chapman
31 May 2024
3 minute read
Expert Insights
An Introduction to DORA & How ASM Supports Compliance
David Griffiths
17 May 2024
3 minute read
Product Features
New ASM Features and Improvements | April 2024
Nicola Chapman
29 April 2024
3 minute read
Learning
Managing Apple Devices in Microsoft 365 With Intune
Scott Lester
24 April 2024
5 minute read
Product Features
New ASM Features and Improvements | March 2024
Nicola Chapman
28 March 2024
3 minute read
Expert Insights
The Rise of Cyber Crime as a Service
David Griffiths
18 March 2024
5 minute read
Expert Insights
Check Your Business's Email Security: Download Our Essential Guide Now!
David Griffiths
15 March 2024
2 minute read
Attack Surface Management
The Cyber Security Issues Facing The Legal Sector
Scott Lester
5 March 2024
6 minute read
Product Features
New ASM Features and Improvements | February 2024
Nicola Chapman
29 February 2024
2 minute read
Expert Insights
Using HTTP Security Headers In Web Application Security
Rob Stemp
28 February 2024
2 minute read
Product Features
New ASM Features and Improvements | January 2024
Nicola Chapman
26 January 2024
4 minute read
Learning
What Is Attack Surface Management?
Geoff Norton
14 December 2023
6 minute read
Learning
What Is an External Attack Surface?
Scott Lester
13 December 2023
3 minute read
Learning
What Is Hexiosec ASM?
David Griffiths
13 December 2023
5 minute read
Learning
Analysing IoT Device Network Traffic with VMware Bridge
Naz Markuta
12 December 2023
8 minute read
Product Features
New ASM Features and Improvements | November 2023
Nicola Chapman
6 December 2023
2 minute read
Expert Insights
Hype or Reality: Will Quantum Computing Break Encryption?
Rob Stemp
23 November 2023
5 minute read
Learning
What policies do I need in place as a small business?
Claire Gurney
15 November 2023
9 minute read
Product Features
New ASM Features and Improvements | October 2023
Nicola Chapman
7 November 2023
4 minute read
Learning
Vulnerability Identification: Key Concepts And Terms Explained
Lauren Palmer
24 October 2023
3 minute read
Learning
Abusing DLL Hijacking vulnerabilities in Windows Electron apps
Naz Markuta
18 October 2023
9 minute read
Expert Insights
The Power of Automated Asset Discovery Done Well
Rob Stemp
12 October 2023
5 minute read
Expert Insights
ASM: The Missing Piece In Your Cyber Security Strategy
David Griffiths
6 October 2023
8 minute read
Product Features
New ASM Features and Improvements | September 2023
Tim Cowell
2 October 2023
3 minute read
Attack Surface Management
Scanning All UK Local Authorities - Our Work With The CCoE
Rob Stemp
2 October 2023
3 minute read
Learning
Getting Started with Microsoft Intune - Part 2
Scott Lester
27 September 2023
7 minute read
Getting Started with Microsoft Intune - Part 1
Scott Lester
14 September 2023
8 minute read
Product Features
New ASM Features and Improvements | August 2023
Nicola Chapman
4 September 2023
2 minute read
Learning
Microsoft 365 Email Protections Settings For Administrators
Scott Lester
23 August 2023
7 minute read
Learning
How to Safely Check Suspicious Emails
Scott Lester
10 August 2023
9 minute read
News & Announcements
Hexiosec ASM Is Now Available Through Emerge Digital
Luke Gardner
8 August 2023
2 minute read
Product Features
New ASM Features and Improvements | July 2023
Nicola Chapman
1 August 2023
2 minute read
Product Features
New ASM Features and Improvements | June 2023
Nicola Chapman
1 July 2023
2 minute read
Learning
Setting up Guest Account Access in Microsoft 365
Scott Lester
22 June 2023
6 minute read
Hexiosec Transfer
The MOVEit Hack - The Insecurity of Security Products
Scott Lester
12 June 2023
4 minute read
Learning
Hunting for Bitwarden master passwords stored in memory
Naz Markuta
8 June 2023
12 minute read
Product Features
New ASM Features and Improvements | May 2023
Nicola Chapman
1 June 2023
4 minute read
Product Features
Simplify Your Cyber Risk Management with Actions
Nicola Chapman
26 May 2023
2 minute read
Expert Insights
NIS Regulation Changes Impact On Managed Service Providers
David Griffiths
9 May 2023
5 minute read
Product Features
New ASM Features and Improvements | April 2023
Nicola Chapman
3 May 2023
3 minute read
Product Features
Get The Most Out Of Your Hexiosec ASM Notifications
Nicola Chapman
24 April 2023
4 minute read
Product Features
New ASM Features and Improvements | March 2023
Nicola Chapman
4 April 2023
2 minute read
Product Features
New ASM Features and Improvements | February 2023
Geoff Norton
28 February 2023
3 minute read
News & Announcements
Hexiosec ASM Used for Which? Banking Survey
David Griffiths
10 February 2023
1 minute read
Product Features
New ASM Features and Improvements | January 2023
Tim Cowell
9 February 2023
4 minute read
Attack Surface Management
Identifying Vulnerabilities In Boa Web Servers
Lauren Palmer
8 February 2023
1 minute read
Attack Surface Management
Testing The Cyber Security Of UK Banks With Which?
Luke Gardner
7 February 2023
5 minute read
Learning
Discovering Vulnerabilities In The Iris Mobile App & API
Naz Markuta
9 January 2023
3 minute read
Product Features
New ASM Features and Improvements | December 2022
Luke Gardner
6 January 2023
3 minute read
Product Features
New ASM Features and Improvements | November 2022
Tim Cowell
7 December 2022
4 minute read
Learning
Go Big Int (or go home)
Scott Lester
30 November 2022
5 minute read
Learning
Parental Protections Pose Problems for PlusNet Pixel Patching
Martin Hassack
28 November 2022
4 minute read
Learning
Are Big Companies Getting Email Security Right?
Scott Lester
21 November 2022
8 minute read
Product Features
New ASM Features and Improvements | October 2022
Oliver Sanders
1 November 2022
3 minute read
Learning
1 Million Websites - How Many Use Security.txt?
Naz Markuta
26 October 2022
11 minute read
Attack Surface Management
Testing 25 of The Biggest UK Consumer Brands for Which?
Scott Lester
22 September 2022
7 minute read
Product Features
New ASM Features and Improvements | September 2022
Lauren Palmer
9 September 2022
2 minute read
Learning
Getting started with the Windows Sandbox
Scott Lester
7 September 2022
4 minute read
Expert Insights
How Secure Is Your Supply Chain?
Luke Gardner
1 September 2022
2 minute read
Learning
Protect Your Domains From Email Spoofing & Phishing Attacks
Naz Markuta
24 August 2022
3 minute read
Learning
Email Security Basics - Ensuring Deliverability
Scott Lester
11 August 2022
12 minute read
Learning
Analysing Mobile App Network Traffic with mitmproxy and StrongSwan
Naz Markuta
27 July 2022
9 minute read
Hexiosec Transfer
Why we should stop using email attachments
Martin Hassack
8 June 2022
6 minute read
Learning
Avoiding MFA Mistakes With Microsoft 365
Scott Lester
3 May 2022
8 minute read
Learning
Preventing S3 Bucket Misconfigurations in AWS
Martin Hassack
28 February 2022
6 minute read
Expert Insights
Cyber Security Resolutions for Business Owners
Rob Stemp
4 January 2022
3 minute read
Expert Insights
Key Decisions to Increase Start-Up Success
Rob Stemp
13 December 2021
4 minute read
Learning
IONOS Digital Transformation Case Study
Luke Gardner
9 December 2021
1 minute read
Learning
Lessons for Securing Your Microsoft 365 Mailboxes
Scott Lester
29 November 2021
7 minute read
Expert Insights
The Value of Small Teams for Optimised Efficiency
Rob Stemp
20 October 2021
4 minute read
Learning
Automating Testing of TLS Connections
Lauren Palmer
17 September 2021
6 minute read
Hexiosec Transfer
Building a Better File Sharing Application
Rich Young
23 August 2021
6 minute read
Expert Insights
Cyber Security Tips For SMEs - Video Interview
Rob Stemp
20 July 2021
1 minute read
Learning
Smashing the Smishers
Scott Lester
29 June 2021
11 minute read
Learning
Kubernetes For Digital Transformation - Webinar
David Griffiths
3 June 2021
1 minute read
Expert Insights
The Insecurity Of ISP Routers: Our Work With Which?
Scott Lester
6 May 2021
4 minute read
Expert Insights
Passwords - How much do they matter?
Scott Lester
19 March 2021
6 minute read
Learning
Tips & Tricks For Using WSL & Windows Terminal
Scott Lester
17 February 2021
5 minute read
Expert Insights
A New Cyber Security Mindset for 2021
Rob Stemp
10 February 2021
6 minute read
Expert Insights
A Look Back at Cyber Security in 2020
Rob Stemp
1 January 2021
7 minute read
Learning
Hardware Security Modules - A Step Forward in Cyber Security?
Scott Lester
16 December 2020
10 minute read
Learning
Affordable Kubernetes for Personal Projects
David Griffiths
10 December 2020
13 minute read
Learning
So Macho - A look at Apple executable files
Scott Lester
2 December 2020
11 minute read
Expert Insights
Digital Transformation: Not Just Adopting New Technology
Geoff Norton
18 November 2020
7 minute read
Expert Insights
British Airways Fined Over 2018 Hack - Was It Enough?
Rob Stemp
20 October 2020
3 minute read