linkedIn

Twitter

Facebook

Instagram

Youtube

PROVEN TECHNOLOGIES

Business Focus

Authentication Networking Perimeter & Internal Security Professional Services Unified Storage & Backup Endpoint Security Security Management Infrastructure Monitoring
  • Next Generation Firewall
  • Unified Threat Management
  • Advanced Threat Prevention
  • Web Application Security
  • Email Security
  • Web Content Security
  • Data Encryption
  • File Integrity Monitoring
  • Network Forensic
  • Deception Technology
  • Cloud Application Security
  • Data Leakage Protection
  • Data Classification
  • Behavior and Anomaly Detection
  • Information Right Management
  • Security Vulnerability Assessment
  • Software Source Code Security Testing
  • Denial of Service Protection
  • SSL Interception
  • Penetration Testing
  • Database Firewall
  • Configuration Auditing and Compliance
  • Web Application Firewall
  • Mobile Device Management
  • Mobile Application Security and Wrapping
  • Hotspots
  • Network Admision Control
  • User and Endpoint Behavior Activity Monitoring
  • Security Information and Event Management
  • Network and System Monitoring
  • Security Orchestration and Automation
  • Network Security Policy Management
  • Server Room Environment Monitoring
  • Video Surveillance Analytics and Management
  • KVM and Displays
  • Design
  • Consultancy
  • Implementation
  • Support
  • Upgrade
  • Fine-Tuning
  • Maintenance
  • Identity and Access Management
  • Multi Factor Authentication
  • Single Sign on
  • Privilege Access Management
  • Network Access Management
  • Network Attached Storages
  • Storage Area Networks
  • Video Recording Storages
  • LTO Tape Media
  • Tape Drives and Automation
  • RDX Storages
  • Data Backup, Archiving, Replication and Recovery Software
  • Secure Wireless
  • Switching
  • Application Delivery Controllers
  • Wide Area Network Optimization and Acceleration
  • Software Defined Wide Area Network
  • IP Address Management
  • Network Admision Control
  • Content Delivery Networking
  • Advance Endpoint Security
  • Data Leakage Protection
  • Sever Virtual Patching
  • User and Endpoint Behavior Activity Monitoring
  • Network Access Control
  • Next Generation Firewall
  • Unified Threat Management
  • Advanced Threat Prevention
  • Web Application Security
  • Email Security
  • Web Content Security
  • Data Encryption
  • File Integrity Monitoring
  • Network Forensic
  • Deception Technology
  • Cloud Application Security
  • Data Leakage Protection
  • Data Classification
  • Behavior and Anomaly Detection
  • Information Right Management
  • Security Vulnerability Assessment
  • Software Source Code Security Testing
  • Denial of Service Protection
  • SSL Interception
  • Penetration Testing
  • Database Firewall
  • Configuration Auditing and Compliance
  • Web Application Firewall
  • Mobile Device Management
  • Mobile Application Security and Wrapping
  • Hotspots
  • Network Admision Control
  • User and Endpoint Behavior Activity Monitoring
  • Security Information and Event Management
  • Network and System Monitoring
  • Security Orchestration and Automation
  • Network Security Policy Management
  • Server Room Environment Monitoring
  • Video Surveillance Analytics and Management
  • KVM and Displays
  • Design
  • Consultancy
  • Implementation
  • Support
  • Upgrade
  • Fine-Tuning
  • Maintenance
  • Identity and Access Management
  • Multi Factor Authentication
  • Single Sign on
  • Privilege Access Management
  • Network Access Management
  • Network Attached Storages
  • Storage Area Networks
  • Video Recording Storages
  • LTO Tape Media
  • Tape Drives and Automation
  • RDX Storages
  • Data Backup, Archiving, Replication and Recovery Software
  • Secure Wireless
  • Switching
  • Application Delivery Controllers
  • Wide Area Network Optimization and Acceleration
  • Software Defined Wide Area Network
  • IP Address Management
  • Network Admision Control
  • Content Delivery Networking
  • Advance Endpoint Security
  • Data Leakage Protection
  • Sever Virtual Patching
  • User and Endpoint Behavior Activity Monitoring
  • Network Access Control

Connex is an innovative value-added IT distributor focused on technology areas of every part of the business IT infrastructure through system integrators, resellers and consultants.

Connex is an innovative value-added IT distributor focused on technology areas of every part of the business IT infrastructure through system integrators, resellers and consultants.

newsletter

Get the latest news and promotions directly to your inbox.

© 2019 - Connex All Rights Reserved

Design and Develop by GUI Solutions Lanka