Welcome to Hexicor

We are a leading technology solutions provider. In the fast-paced world of technology, it’s crucial for your business to stay ahead. At Hexicor, we’re dedicated to this principle, guided by our motto “Together Technology.”

At Hexicor, we are committed to boosting your business with secure, agile solutions that focus on exceptional human experiences. Our offerings span unified communications mobility, data & networks, IT services, and cyber security. Each service is crafted to integrate smoothly into your operations, mitigate risks, and empower you to reach your fullest potential.

About Hexicor

Hexicor will guide you in making well informed decisions about your communications and ensuring solutions suit your requirements. Our solutions are energy efficient and are designed with business, users and the environment in mind, helping you to reduce your carbon footprint, increasing your productivity and reduce your business costs.

Our Solutions

At Hexicor, we excel in bringing people and technology together through our comprehensive range of solutions. From Unified Communications and mobility to data and networks, IT services, and cyber security, our offerings are designed to enhance collaboration, ensure seamless connectivity, and protect your business. Discover how Hexicor’s innovative solutions can drive your business forward.

Our Partners

As a market leader, Hexicor collaborates with innovative, like-minded businesses to deliver best-practice voice, vision, and data solutions. 

By fostering strong relationships with our partners, we ensure that you receive the highest level of customer care, service, and technical support. Together with our trusted partners, we are committed to providing cutting-edge solutions that drive your business success.

Hexicor Blogs

Our blogs play a crucial role in bringing the latest technology news and solutions to our customers. At Hexicor, we are dedicated to keeping you informed about industry trends, innovative technologies, and best practices. Through our insightful and timely blog posts, we aim to empower you with the knowledge you need to stay ahead in the ever-evolving tech landscape.

Hexicor Media

At Hexicor, we are committed to keeping you informed and engaged through a variety of multimedia content. We produce an insightful podcast, publish detailed brochures and engaging videos, and offer a range of news articles. Our diverse content ensures that you have access to the latest information, industry trends, and valuable insights, helping you stay ahead in the ever-evolving world of technology.

Contact Us

At Hexicor, we greatly value our customers and are always happy to assist with any inquiries you may have. Your satisfaction is our top priority, and we are committed to providing exceptional customer service and support. Whether you have questions about our solutions, need technical assistance, or simply want to learn more about what we offer, please don’t hesitate to reach out. We look forward to hearing from you and helping you achieve your business goals.

Email: info@hexicor.com.au
Phone: 1800 888 555

QUEENSLAND  |  SOUTH AUSTRALIA  |  NORTHERN TERRITORY

Please enable JavaScript in your browser to complete this form.

If you are an existing Azentro Customer please call 1800 888 555
alternatively please complete the form below

Please enable JavaScript in your browser to complete this form.

If you are an existing Calibre One Customer please call
1300 422 542 (select Option 2 fo Support)

Please enable JavaScript in your browser to complete this form.

Once You’ve Spoken To An Engineer: Activate Remote Assistance!

Our engineers can assist you remotely as long as you have a functioning internet connection. This page is where we start that process and there are a number of ways support can be initiated.

Once instructed by your support person Press the big red button:

Please enable JavaScript in your browser to complete this form.

Hexicor

Cyber Security

Cyber Security solutions defend your digital landscape with advanced threat detection, prevention strategies, and resilient technologies, safeguarding your data and infrastructure against evolving cyber threats.

Secure Today, Success Tomorrow: Ensuring Your Business's Safety with Hexicor's Advanced Cyber Security Solutions.

At Hexicor, we understand that security might not always be the primary focus for businesses—until a crisis strikes. With the rise in cyber threats, including sophisticated viruses, phishing scams, and various forms of IT-related fraud, it has never been more crucial to fortify your defences. 

 

Cyber Security Monitoring

Hexicor’s comprehensive Cyber security services are designed to protect your IT infrastructure through a meticulous process of monitoring, detection, and advisory support. We structure the programme into essential steps and include an optional component for ongoing security management.

Device Security Management - Microsoft Intune
Step 1: Onboarding and Shaping Up

The initial phase of our cybersecurity approach focuses on enhancing the security of your Office 365 tenancy. Despite Office 365’s robust default security settings, optimal protection requires specific configurations tailored to your organisation’s needs.

This is where Hexicor’s expertise comes into play. We utilise the Microsoft Office 365 Scorecard System to assess and improve your tenancy’s security score, aiming for a minimum of 75% of the maximum possible score. This scoring system is dynamic, adapting over time as new features and threats emerge, ensuring that your setup remains up-to-date and secure.

Step 2: Monitor, Detect & Advise

Our advanced monitoring tools are at the core of our cybersecurity strategy. We employ a range of techniques to detect and respond to various threats, including:

Suspicious Logins: Detection of logins from IP addresses known for malicious activities, which could indicate compromised accounts.

Impossible Travel: This utilises machine learning to detect when login activities occur from geographically distant locations in an impossibly short period, suggesting unauthorised access.

Activity from Infrequent Countries: Alerts are triggered when there is activity from a country not recently or ever associated with your users, following an initial 7-day learning period.

Brute Force Attacks: Monitoring for excessive login attempts, which are often indicative of an attack on user accounts.
Suspicious Email Volumes: Detection of unusually high email volumes that may suggest spamming activity or a compromised account.

Creation of Forwarding Rules and Suspicious Email Rules: Alerts for new inbox rules that forward emails or perform other suspicious actions, which could be signs of a breached account.

In addition to these monitoring actions, our advisory process involves promptly addressing detected issues. Our Network Operations Centre (NOC) engineers record and manage incidents through Hexicor’s ticket system, taking immediate action to mitigate threats.

Step 3: Optional

Ongoing Reviews, Audits, and Risk Assessments:  Recognising that cybersecurity is an evolving challenge, Hexicor offers optional ongoing reviews and audits. These are designed to periodically reassess your security posture against the latest threats and compliance requirements. Our suggested bi-annual reviews ensure that your security strategies and implementations remain robust and compliant.

This detailed framework ensures that Hexicor not only establishes a fortified cybersecurity environment, but also maintains vigilant monitoring and rapid response capabilities to continuously safeguard your digital assets.

Security Awarenesss Training

Despite advanced security technology, your users are always the final line of defense. Are your employees prepared? Notably, 91% of successful data breaches start with spearphishing attacks, targeting specific organisations or individuals to gain unauthorised access to sensitive information.

The Importance of Security Awareness

Consider the following questions:

  • Has your organisation suffered a data breach?
  • How often do your users click on phishing links?
  • How frequently are your workstations infected?
  • Do you need to comply with regulations (PCI, HIPAA, etc.)?
  • What measures are you currently taking to train and test your users?

Effective security awareness training significantly reduces the likelihood of falling victim to phishing attacks.

Training Duration and Frequency

Hexicor offers a customised training solution that includes on-premises security seminars, online training videos, weekly newsletters, and gamified training to ensure the content is engaging and retained. Security is an ongoing journey, not a destination. Training must evolve with the threat landscape, and Hexicor tailors it to current threats, reducing business risks.

  • Online Videos: 2-45 minutes, typically taken monthly or bimonthly.
  • On-Premises Seminars: Tailored to each business, typically 45–60 minutes, conducted annually.

Why Choose Hexicor?

Hexicor serves nearly 2,000 customers, ranging from small to large corporations and government organisations. We monitor the threats these entities face daily. Our dedicated security team provides 24×7 infrastructure monitoring. Additionally, we have developed an in-house Cloud Intelligence Solution to proactively stop brute-force attacks.

Included with Your Training

In addition to Hexicor’s tailored training, you receive a Platinum Security Licence from KnowBe4, a Gartner-selected market leader.

This licence includes:

  • Unlimited phishing security tests
  • Automated security awareness programme
  • Security hints and tips
  • Access to Level I, II, and III training (700+ video modules, games, posters, and newsletters)
  • Automated training campaigns
  • Phish Alert Button
  • Phishing Reply Tracking
  • Active Directory Integration
  • Industry Benchmarking
  • Virtual Risk Officer
  • Advanced Reporting
  • Vishing security test (voice phishing)
  • Smart Groups
  • Security Roles
  • USB Drive Test
  • AIDA (AI-driven simulated multi-faceted social engineering attack using email, phone, and SMS)

Device Security Management - Microsoft Intune

Modern businesses aim to offer employees the flexibility to work on desktops or mobile devices, whether in the office or out in the field. IT managers and service providers must secure and manage equipment that is no longer confined to a single location.

Enhancing Modern Business Flexibility

Modern businesses aim to offer employees the flexibility to work on desktops or mobile devices, whether in the office or out in the field. IT managers and service providers must secure and manage equipment that is no longer confined to a single location.

Recognising this challenge, Microsoft launched Intune (now known as Endpoint Manager) in 2011 to address the enterprise mobility management (EMM) needs of the modern workplace. With over 200 million devices managed, Intune collects data on more endpoints than most other enterprise solutions.

 

What Intune Offers

Hexicor uses Intune to provide management tools that help provision, deploy, manage, and secure endpoints such as desktops, mobile devices, and applications across an enterprise. Intune integrates with Office 365 and Azure AD for superior device management and infrastructure control.

Intune simplifies the management of various devices, protecting corporate data while allowing employees to work on either corporate or personal devices. Despite its close tie to Windows 10 and other Microsoft products, it combines mobile device management with mobile application management and can manage hardware running various operating systems.

 

Device Management with Intune

Intune allows for flexible device management:

Organisation-Owned Devices: Full control, including settings, features, and security, is possible when devices are enrolled in Intune. Policies can enforce requirements for passwords, VPN connections, threat protection, and more.

Personal Devices (BYOD): Users can enrol their devices for full access to organisational resources or use app protection policies for limited access (e.g., email or Microsoft Teams) with multi-factor authentication (MFA).

When devices are enrolled and managed in Intune, administrators can:

  • Inventory enrolled devices accessing organisational resources.
  • Ensure devices meet security and health standards (e.g., block jailbroken devices).
  • Push certificates for easy access to Wi-Fi or VPN.
  • Generate compliance reports.
  • Remove organisational data from lost, stolen, or unused devices.

 

Application Management with Intune

Mobile application management (MAM) in Intune protects organisational data at the application level. It works on both corporate and personal devices.

Administrators can:

  • Assign mobile apps to user groups and devices.
    Configure apps with specific settings and update existing ones.
  • Track app usage and generate reports.
    Perform selective wipes to remove only organisational data from apps.
  • App protection policies in Intune:
  • Use Azure AD identity to separate organisational data from personal data.
  • Restrict user actions like copy-paste, save, and view on personal devices.
  • Apply additional protection layers on enrolled devices or devices managed by other MDM services.

 

Additional Security with EMS

Intune can be used alongside other services like EMS, providing mobile app security beyond the basic features included in operating systems and applications.

Licensing and Deployment

Microsoft Intune is available as a standalone product, as part of the Enterprise Mobility Suite, or within Microsoft 365 Bundles. Licensing can be purchased directly through Hexicor or billed monthly via Telstra.

Deployment Services

Hexicor assists with Intune deployment through the following steps:

  • Customised migration planning.
  • Support options for Intune, Office 365, or the entire IT environment.
  • Utilisation of Telstra Technology Funds for deployment costs if billed through Telstra.

Intelligent Cloud Protection

RDPGuard is a host-based intrusion prevention system (HIPS) designed to protect Windows servers from brute-force attacks on various protocols and services (RDP, FTP, IMAP, POP3, SMTP, MySQL, MS-SQL, IIS Web Login, ASP.NET Web Forms, MS Exchange, RD Web Access, VoIP/SIP, etc.).

RP Guard & Hexicor Guard

RDPGuard
RDPGuard is a host-based intrusion prevention system (HIPS) designed to protect Windows servers from brute-force attacks on various protocols and services (RDP, FTP, IMAP, POP3, SMTP, MySQL, MS-SQL, IIS Web Login, ASP.NET Web Forms, MS Exchange, RD Web Access, VoIP/SIP, etc.).

It monitors server logs for failed login attempts, blocking the attacker’s IP address after a set number of failed attempts. This method is crucial for safeguarding servers against brute-force password-guessing attempts, a common method used by attackers. While RDPGuard is effective for reactive protection, for a more comprehensive solution that is both proactive and reactive, consider Hexicor Guard.

Hexicor Guard
Hexicor identified that relying solely on a product like RDPGuard was insufficient for our customers. Though RDPGuard blocks attacks reactively, it can place a heavy load on servers, especially if botnets are used. Botnets are networks of computers targeting specific devices. To address this, Hexicor developed Hexicor Guard, the first fully Cloud Intelligence Solution.

Hexicor Guard is a cloud-based solution leveraging data collected from RDPGuard and advanced analytics to block up to 80% of external intruders, significantly reducing server load. The agent connects to Hexicor’s cloud intelligence platform every 15 minutes to update the list of bad actors, ensuring rapid protection across all clients. If a new threat is identified for one customer, others are protected within 30 minutes. Our Cloud Intelligence Solution has amassed over 300,000 records, been analysed in Microsoft Azure, and been distilled to a manageable size for the Hexicor Guard agent.

Site Access & Control

Physical security has long been considered a tedious topic, yet it remains crucial for any organisation. Modern technology and the Internet of Things (IoT) have revolutionised physical security, making it easier than ever to secure your physical office.

The Evolution of Physical Security

What is Access Control?
Access control is a vital part of your overall security strategy. Hexicor offers a managed door access control system that integrates with your Office365 cloud tenancy, allowing centralised control of office doors, locks, and elevator access. Key benefits of a cloud-based control system include:

Remote Management: Configure access for offices across cities, states, or countries from a single cloud control panel.
Flexible Access Methods: Users can access doors using smartphones (Apple and Android), fobs, or swipe cards.
Real-Time Control: Manage your operations from anywhere with a mobile-friendly dashboard.

 

Importance of Access Control

Access control systems provide quick, convenient access for authorised individuals while restricting access for unauthorised people. They are essential for:

Compliance: Pull compliance reports on demand to meet health data (HIPAA), credit card data (PCI), or cyber standards (SOC2) regulations.
Visitor Experience: Create a modern, impressive experience for visitors and clients.
IP/Data Protection: Monitor and control access to facilities housing sensitive data or expensive products.

 

Kisi Door Access Control Systems
Hexicor partners with Kisi, a cloud-native physical access security company. Kisi’s platform integrates with Office 365, allowing customers to manage physical and virtual security with a single set of user credentials. Key features include:

  • Mobile Access: Use Bluetooth on iPhones and NFC on Android devices to unlock doors.
  • Integration: Connect Kisi with CRM or Active Directory for automatic provisioning of access rights.
  • Offline Functionality: Hybrid mode allows door unlocking even when offline.
  • SSO and SAML 2.0 Integration: Use company-managed identity services to unlock doors.
  • Lockdown Feature: Prevent unlock events during lockdown mode.
  • Access Sharing: Authorise administrators to send mobile keys to new employees.
  • Digital Visitor Log: Keep event logs in one place with real-time updates.
  • Guest Passes: Send temporary keys to guests and visitors with set activation and expiration times.
  • Multiple Locations Management: Easily manage multiple locations and administrators from a mobile dashboard.
  • Hardware Management: Manage critical electronic components from the dashboard.

Kisi’s platform offers a cloud management portal, wall readers, and a Kisi controller per site. Hexicor can assist with quoting, fitting, and deploying these devices and integrating your Office 365 platform with Kisi.

 

Where to Start
Hexicor can conduct an audit of your physical access and security needs, provide consultation, and design a solution tailored to your business. For more information, contact us today!

Shielding your business with cutting-edge protection and expertise, ensuring your digital security in an ever-evolving threat landscape.

Scroll to Top