Hexiosec is the new name for Red Maple Technologies. Find out more
here
.
☰
Platform
Transfer
Hexiosec Transfer
Send and receive large files securely using end-to-end encryption.
Sign in
|
Try It
|
Pricing
Secure End-to-End Sharing
Create and request secure and private file transfers.
Protect Outlook Attachments
Encrypt your email attachments with seamless Outlook integration.
Attack Surface Management
Hexiosec ASM
Asset discovery and testing.
Sign in
|
Try It
|
Pricing
Asset Discovery
Discover your attack surface
Cyber Risk Management
Track and manage your risks with Hexiosec ASM's built-in Kanban board
Detailed Data
Gain unprecedented access to the underlying scan data
Vulnerability Detection
See what hackers can see, and where you are vulnerable
Reporting
Download reports for executive level reporting or more detailed data exports
Evolving Threat Landscape
Let Hexiosec ASM keep on top of the evolving threat landscape
Services
Our Services
Services Home
We solve your cyber security challenges
Secure Digital Transformation
We build secure platforms, systems, and applications
Online Discovery Services
Discover internet assets and resources
Technical Security Testing
Test the security of your applications, networks, infrastructure and devices
Cyber Security Improvement
We can evaluate and improve your company's cyber security
Your Requirements
Help You Safely Use the Cloud
We can build you a new, secure cloud infrastructure
Help Manage Your Cloud Security
Securely maintain your cloud infrastructure, applications and services
Help You Build Applications Securely
We can help you systematically build secure applications with best practices
Security Test Your Application
Our technical testing evaluates the security of an application, service or infrastructure
Protect Your Devices
We can test and improve your device security configuration
Solutions
Case Studies and Testimonials
Formula 1 Case Study
How Hexiosec helped an F1 team secure their attack surface
Secure Cloud Build Case Study
How Hexiosec took a security-conscious investment fund onto the cloud
Use Cases
Inform Lead Qualification
Find out about your potential leads to start meaningful conversations
Manage Your Attack Surface
Check your company's online attack surface and keeping scanning it for new vulnerabilities
Managed Service Providers (MSPs)
Differentiate your services and increase revenue with cybersecurity services
Secure File Transfer
Adding end-to-end encryption to daily consulting communications
Technical Due Diligence
Check a company's security posture up front with a one-time scan of their attack surface
Third-Party Supply Chain Risks
Measure the risks of your vendors and third-party supply chain
Resources
Resources
Product Documentation
Get the most out of Hexiosec products using our documentation
Open Source
The engineering projects we have made open source
Videos
Learn about our company and products
LinkedIn User Community
Come and join the Hexiosec user community
API Documentation
ASM API Documentation
Integrate Hexiosec ASM data into your tools, products and services
Transfer API Documentation
Programmatically share files securely
Blogs
Latest Blog
We've Rebranded to Hexiosec
Read more...
Featured Blogs
Smart Device Privacy
5 November 2024
New ASM Features and Improvements | October 2024
31 October 2024
New ASM Features and Improvements | September 2024
14 October 2024
We've Rebranded to Hexiosec
30 September 2024
New ASM Features and Improvements | August 2024
3 September 2024
Managing Apple Devices in Microsoft 365 With Intune
24 April 2024
See all...
Company
Get in Touch
Contact Us
Get in touch about Hexiosec
About Us
Our People
Meet the Hexiosec team
History
Company background and the history of our products & services.
Careers
Current vacancies
News
Latest News
Latest News and Announcements
Contact Us
Platform
Hexiosec ASM
Asset discovery and testing.
Hexiosec Transfer
Send and receive large files securely using end-to-end encryption.
Asset Discovery
Discover your attack surface
Cyber Risk Management
Track and manage your risks with Hexiosec ASM's built-in Kanban board
Detailed Data
Gain unprecedented access to the underlying scan data
Vulnerability Detection
See what hackers can see, and where you are vulnerable
Reporting
Download reports for executive level reporting or more detailed data exports
Evolving Threat Landscape
Let Hexiosec ASM keep on top of the evolving threat landscape
Secure End-to-End Sharing
Share files securely and privately with anyone, or invite them to send files to you
Protect Outlook Attachments
Encrypt your email attachments with seamless Outlook integration.
Services
Services Home
We solve your cyber security challenges
Secure Digital Transformation
We build secure platforms, systems, and applications
Online Discovery Services
Discover internet assets and resources
Technical Security Testing
Test the security of your applications, networks, infrastructure and devices
Cyber Security Improvement
We can evaluate and improve your company's cyber security
Help You Safely Use the Cloud
We can build you a new, secure cloud infrastructure
Help Manage Your Cloud Security
Securely maintain your cloud infrastructure, applications and services
Help You Build Applications Securely
We can help you systematically build secure applications with best practices
Security Test Your Application
Our technical testing evaluates the security of an application, service or infrastructure
Protect Your Devices
We can test and improve your device security configuration
Solutions
Formula 1 Case Study
How Hexiosec helped an F1 team secure their attack surface
Secure Cloud Build Case Study
How Hexiosec took a security-conscious investment fund onto the cloud
Inform Lead Qualification
Find out about your potential leads to start meaningful conversations
Manage Your Attack Surface
Check your company's online attack surface and keeping scanning it for new vulnerabilities
Managed Service Providers (MSPs)
Differentiate your services and increase revenue with cybersecurity services
Secure File Transfer
Adding end-to-end encryption to daily consulting communications
Technical Due Diligence
Check a company's security posture up front with a one-time scan of their attack surface
Third-Party Supply Chain Risks
Measure the risks of your vendors and third-party supply chain
Resources
Product Documentation
Get the most out of Hexiosec products using our documentation
ASM API Documentation
Integrate Hexiosec ASM data into your tools, products and services
Transfer API Documentation
Programmatically share files securely
Open Source
The engineering projects we have made open source
Videos
Learn about our company and products
LinkedIn User Community
Come and join the Hexiosec user community
Blogs
Company
Contact Us
Get in touch about Hexiosec
Our People
Meet the Hexiosec team
History
Company background and the history of our products & services.
Careers
Current vacancies
Latest News
Latest News and Announcements
Latest News
Latest News and Announcements
Read our latest news and announcements on our
blog!