EYEONIX

Trust and Integrity


The Innovation Company

About Us


About Us
EYEONIX SA , founded in 2000 , is a software factory with a vast experience in Secure Communications, C3i systems , Command and Control Centres  and Cyber Defence for National Security , Defence, Law Enforcement and Home Land Security.
EYEONIX SA is a NATO SECRET and EURO SECRET CERTIFIED company and a NATO Certified manufacturer.
EYEONIX SA is producing high end technology solutions for Governmental Agencies that are certified and distributed globally from a Multinational Global Leader in Telecommunications and Electronics.
EYEONIX SA is a company striving for innovation at the highest technological peak. EYEONIX SA is a selected partner for some of the most respectful companies in the area of Artificial Intelligence Cyber Defence, E2E Encrypted Calls and NATO TOP SECRET Systems that are used from European Governments for Inter-Agency communications.
EYEONIX SA is TRACE certified and registered in the European Transparency Registrar. EYEONIX SA is acknowledged as "Best Supplier" for Follow On Support Services by Overseas Government Defense Agencies.

ETHOS AND SOCIAL RESPONSIBILITY


Trust - Integrity - Transparency    We strongly believe that for excellence in corporate sustainability and governance is strongly bounded with ethos and values that must be vivid in the corporate related ecosystem of shareholders, employees, customers, partners and society. Ethos is culture, state-of-mind, DNA and way of living and behaving. Ethos creates strong relationships, commitment and spins the wheel with continuity and unity, Ethos for Customers and Partners Honesty, trust, integrity and commitment requires continuity in quality assurance and   use unexpected situations or problems for a better tomorrow. We seek partners and suppliers who sustain and cherish these values and create a very supportive chain of business continuity.

 Supporting authorities We strongly believe that we have to support the Agencies and Organizations who are working sleepless day and night in order to keep our society and our country safe and secure. Our commitment to continuous support includes sharing experience, donating necessary systems or accessories that are valuable for the daily operations and the continuous protection of our fellow citizens. Supporting the Community Besides business individuals working for the corporate excellence,we are active citizens who believe in supporting communities who need our assistance.

EXECUTIVE TEAM


Nickos Chatzis

President of the Board

George Strouzakis

Chief Executive Officer

Andreas Katsigiannis

General Manager

Kiros Iosifidis

Chief Information Officer

ENCRYPTION


NATO TOP SECRET NATO SECRET EURO SECRET

SECURE INTER-NETWORK ARCHITECTURE

EYEONIX SA IS THE EXCLUSIVE PARTNER OF SECUNET IN GREECE

SECUNET


SINA

The modern workplace needs to be increasingly flexible.There are high expectations in terms of convenience, security and efficiency. However, the reality often looks quite different: regulations regarding internet use and the daily handling of data and documents which serve the required security often are at the expense of convenience and productivity.

Learn More

SINA WORKSTATION

The SINA Workstation is a crypto-client that can be used either mobile or stationary. Users move securely and conveniently in their familiar work environment (e.g. Microsoft Windows) at all times - online and offline, at the office or on the go. The parallel operation of several guest systems enables users to work in different security domains (e.g. in restricted networks and the internet at the same time). With this integrated security concept, the SINA Workstation offers much more than a conventional cryptographic device: smartcards, VPN, hard drive encryption, interface control and a secure operating system. Guest operating systems such as Microsoft Windows or Linux and all sensitive data are isolated in their own cryptographic file systems and always stored safely.

Learn More

SINA GATEWAYS AND ETHERNET ENCRYPTORS

Data connections can be encrypted at layer 2 or 3 of the ISO/OSI layermodel. SINA L2 Boxes are particularly suited to the rapid and secure transfer of large quantities of data, for example in mirrored data centres, as they produce no overhead and thus offer the highest possible security and full performance with minimum latency. They are therefore preferred for time-critical applications and heavily utilised connections. Layer 2 encryption is protocol-independent. The encryption at layer 3, on the other hand, is protocol-dependent (IP-based) and thus more flexible in terms of device selection. This means that more complex environments can be mapped at layer 3. It is possible to configure security connections with gateways, stationary and mobile clients. Encryption can be made at both layers with SINA as point-to-point, point-to-multipoint and multipoint-to-multipoint connections. Public authorities and corporations can select the encryption method best suited to their specific application. Unlike the SINA Box, the SINA One Way is not a cryptographic component. The SINA One Way is a black/red gateway. It consists of a data diode and two peripheral proxies used as transfer computers. The SINA One Way allows data transfers in one direction only from a public or lower-level "black" source network to a higher-level "red" target network. The system enables, for instance, the transfer of public data found on the Internet to a SECRET network.

Learn More

SINE L3 NATO SECRET

As a VPN gateway, the SINA L3 Box is a key component of the central IT infrastructure in high-security networks. The data exchange between the SINA components is securely transmitted via encrypted VPN tunnels. SINA L3 Boxes connect public authority or corporate networks via the Internet. In addition, access to (terminal) servers by SINA clients is provided via pre-switched SINA L3 Boxes, which serve as cryptographic network accesspoints. The holistic security concept of the SINA L3 Box comprises a secure SINA OS system platform, smart card technology, IPSec-protected communication and scaled and configured hardware compliant with approval standards. The SINA L3 Boxes are approved in various configurations for the transmission of classified material up to and including German SECRET, NATO SECRET and SECRET UE/EU SECRET. They are used, for example, to protect the IVBV and IVBB networks of the German Federal Administration or to ensure secure communication between all of the Ministry of Foreign Affairs' German embassies and the central network nodes in Berlin and Bonn.

Learn More

SECUSUITE FOR GOVERNMENT

E2E ENCRYPTED FULL DUPLEX VOICE CALLS

EYEONIX SA IS THE EXCLUSIVE PARTNER OF SECUSMART IN GREECE

E2E ENCRYPTED FULL DUPLEX VOICE CALLS


SecuSUITE for Government

SecuSUITE for Government is a multi-platform solution for end-to-end encryption of voice calls and text messages. Available on iOS and Android™, it connects calls quickly, keeps them secure and ensures excellent voice quality. It works globally, across network barriers and across all mobile networks. Deployed securely on premise (or hosted in a certified third-party data centre or a data centre trusted by the client), it can be managed centrally and end users can be enabled over the air.

Learn More

CYBER DEFENSE


ARTIFICIAL INTELLIGENCE CYBER DEFENSE

CREATORS OF AUTONOMOUS RESPONE

EYEONIX SA IS AUTHORISED PARTNER OF DARKTRACE IN GREECE

ARTIFICIAL INTELLIGENCE CYBER DEFENSE


Autonomous Response Fight back with cyber AI

The Enterprise Immune System is the world’s most advanced machine learning technology for cyber defense. Inspired by the self-learning intelligence of the human immune system, this new class of technology has enabled a fundamental shift in the way organizations defend themselves, amid a new era of sophisticated and pervasive cyber-threats. The human immune system is incredibly complex and continually adapts to new forms of threats, such as viral DNA that constantly mutates. It works by learning about what is normal for the body, identifying and neutralizing outliers that do not fit that evolving pattern of normality. Darktrace applies the same logic to cloud, enterprise, and industrial environments. Powered by machine learning and AI algorithms, Enterprise Immune System technology iteratively learns a unique ‘pattern of life’ (‘self’) for every device and user on a network, and correlates these insights in order to spot and stop emerging threats that would otherwise go unnoticed. Like the human immune system, the Enterprise Immune System does not require previous experience of a threat or pattern of activity in order to understand that it is potentially threatening. It works automatically, without prior knowledge or signatures, detecting and fighting back against subtle, stealthy attacks inside the network — in real time.

Learn More

CYBER CORE SUITE

UNIFIED PLATFORM FOR CYBER SECURITY

CYBER CORE


CYBER CORE

Cyber core is a unified platform that delivers the most innovative, complete, powerful and state-of- the-art solution in the marketplace, combining suites and technologies that result to the total security of the defended ecosystem and the immediate alert and protection of the system administrator against all existing fast and slow, instantaneous or zero-day attacks to the infrastructure or the endpoints

Learn More

TWO FACTOR AUTHENTICATION

2FA SECURE SIGN

2FA SECURE SIGN IN


SECURE SIGN IN

Protects against phishing, man-in-the-middle and replay attacks with strong authentication Incorporates FIDO-certified security protocols, including public key cryptography/ infrastructure (PKI) Ensures security key and biometric information never leave the mobile device; no server-side secrets or link-ability between services or accounts.Facilitates higher user adoption: no need to remember passwords, no manual typing Works with smartphones that consumers/employees use every day. Delivers a consistent user authentication experience to access various services

Learn More

SECURE DOCUMENT RIGHTS MANAGEMENT

RIGHTS SERVER , RIGHTS MANAGER

SECURE DOCUMENT RIGHTS MANAGEMENT


Secure Document Rights Management

RightsManager enables best document security practices by allowing you to encrypt documents locally, so there is no need to upload unencrypted documents to an unknown server or file sharing site. You maintain complete control of your source files at all times.Once your files are encrypted, go ahead and share files securely through all the normal channels—email, website, intranet, cloud storage sites or removeable media. Recipients authenticate through a client/server interaction, denying access to any unauthorized recipients. With granular permissions policies for access, editing, printing and sharing, you can ensure recipients can only see what they need to.

Learn More

SECURE EMAIL SERVER

ON PREMISES SOLUTION

MAIL,CHAT,VIDEOCALLS, TEAM CHAT

SECURE MAIL SERVER


Secure professional email with own domain Mail, Calendar, Files, Chat, Videocalls

Email is where most work starts these days. And where it eventually concludes. So it only makes sense to have it integrated with other components making up the overall context. Plan a meeting right from your email. Find a contact when composing your calendar event. Send an email from a team chat room. Edit a document right in the conversation where it’s been shared

Learn More

SUSPECT RECOGNITION


FACE SUSPECT RECOGNITION FOR PUBLIC SAFETY

FROM CELLPHONES AND CAMERAS

SUSPECT RECOGNITION


BIOMETRIC SUSPECT RECOGNITION

Facial recognition and person identification from thousands of cameras and mobile devices. City streets, airports and railway stations, subway, transportation hubs, malls and government establishments, event venues and stadiums. Accuracy of more than 95% allows reliable identification of wanted individuals, even if they try to avoid surveillance cameras by looking away or covering their face. The ability to enroll an unlimited number of photos, per individual, further improves identification accuracy.

Learn More

UAS AND COUNTER DRONE


UAS LONG RANGE


LONG RANGE UAS

UAV operation allows for seamless flight with minimum human interference and error. We beat industry standards in flying, command and information delivery. Our UAS is simple, ergonomic, heavy-duty and efficient. We provide a range of payload solutions and integrate any required.

Learn More

THE CHOICE OF US SPECIAL FORCES

EYEONIX SA IS THE EXCLUSIVE PARTNER OF AEROVIRONMENT IN GREECE

TACTICAL sUAS


TACTICAL sUAS

When the mission is critical and danger looms ahead, the most powerful weapon we can give our warfighters is information. To protect themselves, protect civilian life, and tailor their response to the threat, commanders and troops on the ground need superior tactical intelligence, surveillance and reconnaissance (ISR) - and they need it on demand. Our portfolio of small, unmanned aircraft systems (UAS) meet that demand, delivering systems with unrivaled flexibility and capability.

Learn More

EYEONIX SA IS THE EXCLUSIVE PARTNER OF FORTEM TECHNOLOGIES IN GREECE

COUNTER DRONE


Holistic solution for securing, detecting and counter measurements

At a time when airspace is becoming more crowded, safety and security must be achieved both to guard against the threat of drones being used for criminal and terrorist purposes—and in order to unleash the untold benefits of myriad drone-based services— CDP is the airspace awareness and security platform that provides all the tools necessary to create safe skies. CDP provides the best end-to-end solution possible for the detection, intention determination and integrated response and reporting of drone-based attacks. No other solution globally controls the technology end-to-end to affect a robust and maintainable solution that works. CDP is a comprehensive platform for airspace awareness and security that provides three essential elements of airspace management. Comprehensive coverage: The ability to detect all airborne objects day and night within a protected airspace and discern between threats and non-threats. Safe mitigation options: An integrated response to airspace breaches or potential threats with various levels of severity. Powerful, easy-to-use management: Built to scale for growing coverage, SkyDome provides a simple user interface for configuration and real-time mobile alerts and complete airspace history to recover quickly from an incident.

Learn More

EYETAC TARGETING PLATFORM


EYETAC TARGETING PLATFORM

TARGETING DIRECTLY FROM DRONE VIDEO

EYETAC


EYETAC TACTICAL TARGETING PLATFORM

EYETAC is proven platform and its modules are heavily tested in NATO and military camps. EYETAC is fully interoperable with Aerovironment’s sUAVs, Airbus Optronics LRFs, i-BEAM ,BFT radios , Extant IDM TDLs , L3 Rovers. EYETAC forwards targeting data achieved via the 4DAR process , directly to various Ground ,Maritime and Avril weapon platforms. EYETAC transmits the targeting data to A/C , H/P, MLRS battalions or any platform that can accept geographic coordinates for targeting purposes. EYETAC UDL is the only universal data link that can be installed in any legacy aerial platform, converting it form a no-datalink a/c or h/c to a fully enabled data striking unit.

Learn More

UNIFIED COMMUNICATIONS


COMMAND AND CONTROL CENTER

UNIFIED COMMUNICATIONS PLATFORM

OPERATIONAL,TACTICAL,STRATEGICAL

UNIFIED COMMUNICATIONS


Governmental Unified Communications , Command and Control Center & Active Intelligence Systems

Ultra security & encryption features , TOP SECRET Level On premises solution Future proof technologies Works with any IP (Thuraya Sat certified) Joint operations enabled Centralized and local agency operations World wide operations and intelligence Map tools. Unlimited Groups, Users, Dynanic Groups Voice, Text, Documents,Video, Photo , Location etc Speechless communication They system has successfully passed multiple penetration tests and cyber-attacks by a number of agencies in numerous countries. The offered smartphone devices offer paramount security, unbreakable by government or private attackers, intruders, interceptors and any threat physical or electronic Total control of the customized communications system in terms or licenses and sublicensees. The system is operating exclusively by the assigned administrator(s) without any intervention from any company or individual Training and guidance on national algorithm (proprietary or existing) integration in the Samsung smartphones. The government agency proceeds to the integration in a totally autonomous and self-managing manner after completion of support and guidance courses

Learn More

INTERSUITE

Brings advantages of modern Unified Communications into Command & Control room environments, taking all the security and availability requirements into account. Combines different communication infrastructures with easy to use GUIs (Graphic User Interfaces) based on modern WEB software technologies. UCP user interface allows the adoption of customer specific workflows. Intersuite closes the communications gap between non-compliant systems and sub-systems and therefore puts users of existing legacy systems to interact with the modern Command Ecosystem.

Learn More

STAND ALONE MOBILE SOLUTION

The Standalone Mobile Solution consists of a private 4G/LTE/WIMAX/ network and the appropriate end-points (computers, tablets, smartphones) that create a communication network with a radius of about 10-15 Kilometers from the mobile deployment asset (fixed or mobile). The Solution includes the UCP Server, 4G / LTE / WIMAX base-station, satellite connectivity, 200 terminals and all the necessary components. Apart from local private 4G network real-time satellite connectivity allows complete remote control from a remote location (e.g. Communication Headquarters, theater of operations etc.).

Learn More

INTEGRATION WITH SAMSUNG SDS EMM HIGH SECURITY AND SAMSUNG KNOX

Simplify policy management EMM lets you apply comprehensive access and control policies across apps and devices. Our EMM solution boasts the highest security standards, with validations from NIAP/CC, and the NSA CSFC program. Monitor mobile security compliance EMM’s Admin Console provides a single pane dashboard view of activity, devices, and security violations across your organization. Ensure safe data communications The Secure Push Channel for server-to-device communications skips cumbersome VPN systems by using TLS-secured data channels, providing quick data transfers and industry-leading delivery success rates.Government-grade protection Knox is a multi-layered platform built into the hardware and software of Samsung's latest devices. Knox constantly verifies the integrity of the device through a chain of security checks that begin at the hardware level and extend to the operating system, and detects any tampering to ensure your data is always secure

Learn More

GTS SERVER


ADVANCED GTS SERVER

LAW ENFORCEMENT ON PREMISES EDITION

GTS SERVER


GTS SERVER AND TRACKING FOR LAW ENFORCEMENT AGENCIES

Special edition for Law Enforcement agencies.The application can be hosted in-the-cloud, centrally, or at the customer’s premises, to address the issue of data confidentiality Very flexible, configurable and scalable feature set, for organizations of any size or industry. Intuitive, multilingual and customizable user interface

Learn More

TRANSMISSION DETECTION


 

CELLPHONES AND TRANSMISSION DEVICES DETECTION

DETECTS ALL FREQUENCIES

PORTABLE SOLUTION FOR LAW ENFORCEMENT AVAILABLE

TRANSMISSION DETECTION


CELLPHONES AND TRANSMISSION DEVICES DETECTION

Accurate Detection - Future Proof - Multiple Alert Options. Deploy as a portable or network device with adjustable range.Zone Protectora and Zone Manager deliver real time protection with actionable intelligence. Active Monitoring Technology enables our customers to secure and protect their facilities, assets, and information worldwide.Zone Protector alerts and notifies as soon as a signal is detected. Secure classified information throughout your facility

Learn More

OIL MARKING AND FRAUD DETECTION


OIL MARKING FRAUD DETECTION SOLUTION

TURNKEY SOLUTION FOR GOVERNMENTAL AGENCIES

EYECHIPHER


OIL MARKING

Novice patented marker technology which relies on SERS (Surface Enhanced Raman Spectroscopy) for detection. Uses ≥1 of a range of unique molecules at ppb (parts per billion) levels to mark fuel. Not possible to detect molecules with normal analytical techniques. Patented rights for producing stable silver colloidal nano-particles to increase the sensitivity of analysis by 5-6 times. Convenient for both Lab and Field Use. Specially developed SERS instrument. The markers can be detected with portable field instruments, which run on batteries or mains power. All SERS markers can be measured at one time and the analysis is specific to used markers. The results can be analyzed in the lab for detailed evaluation. The result of the analysis is clear, decisive (2- 3 mins/test) and fast.

Learn More

EYEONIX AND THE RECORDS HUB COLLABORATION


EYEONIX SA AND THE RECORDS HUB SA PROCEDURES PROVIDE OPTIMUM CONTROL WHICH ELIMINATES OPERATIONAL RISK

EYEONIX AND THE RECORDS HUB


WWW.THERECORDSHUB.COM

THE RECORDS HUB S.A., is a company with a portfolio of solutions including Secure Storage, Secure Digitization of Documents and Secure Document and Records Information Management, GDPR & DPO Services, and Consulting.THE RECORDS HUB S.A. ensures that its customers are provided Tailor-Made quality solutions and answers, intended to their sustainable operation and growth, as they align their operations to current and future requirements. During internal inspections and risk assessments, THE RECORDS HUB S.A. provides for and indicates solutions to cover against any weaknesses or risks that may appear, in order to eliminate gaps and provide the maximum possible security in information management, in a timely and valid manner, both in ex ante control, but also in ex post intervention for all procedures. Our aim is to protect customer prestige and achieve a competitive advantage for the customer, coupled with considerable economic benefit.

Learn More

EYEONIX ACADEMY

FOR NATIONAL SECURITY , LAW ENFORCEMENT DEFENCE AND INTELLIGENCE

SOME OF THE COURSES ARE ALSO AVAILABLE TO CORPORATIONS AND PRIVATE SECTOR COMPANIES

EYEONIX ACADEMY


CRANFIELD UNIVERSITY , DEFENCE AND SECURITY. DEFENCE ACADEMY OF UNITED KINGDOM

Cranfield is one of the world’s leading universities for defence and security education, research and consultancy. Addressing the changing needs of an evolving sector, we provide specialist knowledge to industry, security and emergency services, military, governments and NGOs, underpinning defence and security sector reform around the world. As a postgraduate academic provider to the UK’s Ministry of Defence, it offers a unique gateway to delivering practical education and solutions that make a real difference to the lives of military, security and civilian personnel.

Learn More

CRANFIELD UNIVERSITY , DEFENCE AND SECURITY COURSES

Defence and Security courses specialisation streams : Engineering Tools for both military and civilian applications require specialist engineering expertise, to adapt conventional engineering techniques for deployment in this industry. Ranging from surveillance to communication systems through to guided weapon systems, this group of courses will provide you with the skills you need in an engineering career in the defence or security sectors.Technology Technology is becoming an increasingly important aid to information in a modern defence and security setting. Designing appropriate technology to support the effective collection of data to deploy appropriate technology systems requires extensive expertise. Choose from subjects ranging from operational research through to application modelling and simulation to gain the critical skills needed to manage complex challenges in this growing sector.

Learn More

EYEONIX ACADEMY SHORT COURSES


RADAR PRINCIPLES

GOVERNMENT ONLY

ADVANCED RADAR

GOVERNMENT ONLY

RADAR ELECTRONIC WARFARE

GOVERNMENT ONLY

CYBER ATTACK

GOVERNMENT / CORPORATE

Contact Us


  • 34 Vourvachi Str. 11743 ,Athens , Greece
  • EYEONIX SA