Support
Support centralises customer enquiries into a single, organised system. Define departments to route tickets to the right teams, tag issues by service type for SLA tracking, and customise the submission form to capture exactly the information need.
Tasks
The Customers screen gives you a consolidated view of all your customer organisations, letting you see at a glance how many are active, add new records, import bulk data and drill into individual customer details.
Projects
The Customers screen gives you a consolidated view of all your customer organisations, letting you see at a glance how many are active, add new records, import bulk data and drill into individual customer details.
Contracts
Provides a centralised view for managing your organisation’s contracts. Quickly add new entries, apply filters, visualise contract distribution, and drill into detailed records.
Sales Configuration
Configure your currencies, tax rates, product catalogue, subscription plans and payment modes in one unified guide—so your quoting, invoicing and recurring billing workflows are accurate, compliant and ready to launch.
Leads
Leads serves as your central command for advancing a prospect through every stage of the sales cycle. Here you can instantly view and edit contact and company details, update status, assign tasks or set reminders, and draft proposals.
Customers
The Customers screen gives you a consolidated view of all your customer organisations, letting you see at a glance how many are active, add new records, import bulk data and drill into individual customer details.
Quick Start Guide
This walkthrough covers the essentials for enabling any necessary modules, connecting to your data source and running your first workflow, so you can dive straight into achieving real results. No fluff, no jargon: just the clear, step-by-step instructions you need to get up and running fast.
Cybersecurity Services

Cybersecurity Services Statement of Work Updated: 16 Jun 2025 Effective Date {effective date} SOW # {sow reference number} Customer {Customer} Customer Contact {Customer Contact Name} {Customer Contact Email} {Customer Contact Phone No} Customer Contract Information Ixonn Contact {Ixonn Contact Name} {Ixonn Contact Email} {Ixonn Contact Phone No} Payment Basis {pre-pay / time-materials / fixed-price} Invoice Schedule {weekly / monthly / other} Acceptance Payment Terms Billing Information Subcontractor Information 1. Description This Statement of Work (“SOW”) is entered into between Ixonn (“Provider”) and [Customer Name] (“Customer”) for the execution of Ixonn Cybersecurity Services, with the objective to assess, enhance, and/or support the cybersecurity posture of the Customer’s environment based on the agreed scope of work. This Statement of Work (SOW) outlines the scope, deliverables, schedule, and responsibilities associated with the provision of Cybersecurity services, as explicitly defined in the accompanying Appendix and Order Form. 2. Service Scope The services described in this SOW may include one or more of the following cybersecurity service categories. Items marked as Included will be delivered as part of this engagement. Items marked as Excluded may be proposed separately upon request.: Item Ref. Service Item Service Included Excluded ICS-01 Penetration Testing Simulated cyberattack on networks, applications, APIs, or infrastructure { ___ } { ___ } ICS-02 Vulnerability Assessment Scan and analyse systems for known vulnerabilities { ___ } { ___ } ICS-03 Security Risk Assessment Risk identification and prioritisation for systems and processes { ___ } { ___ } ICS-04 Compliance Gap Analysis Evaluation of compliance posture (e.g., ISO 27001, SOC 2, PCI-DSS) { ___ } { ___ } ICS-05 Cloud Security Review Assessment of cloud architecture (AWS, Azure, GCP) { ___ } { ___ } ICS-06 Security Architecture Review Review and recommendations of existing security designs { ___ } { ___ } ICS-07 Incident Response Readiness Review and/or development of incident response capabilities { ___ } { ___ } ICS-08 Phishing Simulation Simulated phishing campaign to assess user awareness { ___ } { ___ } ICS-09 Security Policy Review Review of organisational security policies and procedures { ___ } { ___ } ICS-10 Security Awareness Training Delivery of training sessions or modules { ___ } { ___ } 3. Service Deliverables The services described in this SOW may include one or more of the following cybersecurity service categories. Items marked as Included will be delivered as part of this engagement. Items marked as Excluded may be proposed separately upon request. Item Ref. Service Item Deliverable description ICS-01 Penetration Testing Penetration test report, Executive summary, Technical findings, Risk ratings, Recommendations. ICS-02 Vulnerability Assessment Vulnerability scan report, List of identified vulnerabilities with severity, Remediation guidance. ICS-03 Security Risk Assessment Summary of key risks, Likelihood and impact matrix, Mitigation roadmap. ICS-04 Compliance Gap Analysis Compliance checklist, Gaps analysis summary, Required actions. ICS-05 Cloud Security Review Cloud configuration findings, Control gaps, Secure design recommendations. ICS-06 Security Architecture Review Analysis of security design and recommendations. ICS-07 Incident Response Readiness Evaluation of response readiness and proposed improvements. ICS-08 Phishing Simulation Metrics report, User responses, Follow-up awareness plan. ICS-09 Security Policy Review Annotated feedback on policies with improvement recommendations. ICS-10 Security Awareness Training Presentation, Training recordings, Staff surveying. 4. General Scope Assumptions 4.1. Customer Access and Cooperation: a) Timely and unrestricted access to necessary personnel, systems, and data b) Granting of appropriate security clearances and system privileges c) Provision of required network access d) Acknowledgment that access delays may impact project timeline 4.2. Customer Project Management: a) Assignment of dedicated, experienced project manager as primary point of contact b) Empowerment of project manager to make decisions and allocate resources c) Coordination of internal stakeholders by Customer project manager d) Management of organisational change and timely completion of Customer-owned tasks 4.3. Remote Work Execution: a) Performance of implementation services primarily through remote means b) Use of secure, industry-standard collaboration and remote access tools c) Customer’s assurance of network infrastructure compatibility with remote work d) Mutual agreement required for any on-site work, subject to additional costs 4.4. Customer Hardware and Third-Party Software Responsibilities: a) Customer’s sole responsibility for procuring necessary hardware and infrastructure b) Customer’s obligation to obtain and maintain required third-party software licenses c) Ixonn’s provision of specifications for required components d) Customer’s accountability for procurement and performance of these elements 5. Customer Obligations 5.1. Dedicated Project Management: a) Appointment of a dedicated project manager with requisite authority b) Oversight of all Customer-side aspects of the implementation c) Internal resource allocation and stakeholder management d) Primary liaison with Ixonn’s implementation team 5.2. Stakeholder Availability: a) Ensuring availability of key stakeholders and subject matter experts b) Participation in crucial project activities (e.g., workshops, reviews, testing) c) Advance scheduling of key personnel participation d) Acknowledgment that unavailability may impact project timelines 5.3. Timely Information Provision: a) Prompt and comprehensive responses to all information requests b) Provision of detailed business process documentation c) Sharing of necessary data samples and system access credentials d) Understanding that delays may affect project milestones 5.4. Deliverable Review and Approval: a) Timely review and feedback on all project deliverables b) Adherence to agreed-upon timeframes specified in the project schedule c) Designation of personnel with authority to approve deliverables d) Ensuring availability for review sessions and sign-off meetings 6. Schedule The implementation schedule will be customised based on the specific service offering and Customer requirements. A sample schedule template is provided below: Item Ref. Service Item Duration Start Date End Date ICS-01 Penetration Testing 2 weeks {TBD} {TBD} ICS-02 Vulnerability Assessment 5 business days {TBD} {TBD} ICS-03 Security Risk Assessment 7 business days {TBD} {TBD} ICS-04 Compliance Gap Analysis 5 business days {TBD} {TBD} ICS-05 Cloud Security Review 4 business days {TBD} {TBD} ICS-06 Security Architecture 5 business days {TBD} {TBD} ICS-07 Incident Response Readiness 4 business days {TBD} {TBD} ICS-08 Phishing Simulation 7 business days {TBD} {TBD} ICS-09 Security Policy Review 3 business days {TBD} {TBD} ICS-10 Security Awareness Training 2 business days {TBD} {TBD} 7. Estimated Time and Effort The professional services fees are based on
Acceptable Use Policy

Acceptable Use Policy Legal Updated:22 May 2025 Print this Page This Acceptable Use Policy (“Policy”) is an integral part of the IXONN Online Platform Subscription Agreement. It outlines the rules, guidelines, and restrictions governing the use of IXONN’s Online Services. This Policy is designed to ensure a safe, secure, and productive environment for all users of our platform. 1. Purpose This Acceptable Use Policy (“Policy”) outlines the rules and guidelines for using IXONN’s Online Services and intendts to: a) Protect the integrity, security, and availability of our Online Services; b) Safeguard the rights and interests of IXONN, our customers, and other users; c) Ensure compliance with applicable laws and regulations; and d) Maintain the quality and reliability of our services. 2. Prohibited Activities Users of IXONN Online Services must not engage in any of the following activities: a) Unauthorised Access: Attempting to gain unauthorised access to the Online Services backend systems; using automated tools or exploiting system vulnerabilities to bypass access controls; or sharing access credentials to avoid additional user fees. b) Malicious Content: Using the Online Services to store, transmit, or distribute malicious code, including viruses, worms, or trojans; or uploading or sharing content that is illegal, harmful, threatening, abusive, or otherwise objectionable. c) Security Violations: Conducting security scans or penetration tests on the Online Services without prior written permission from IXONN; or attempting to circumvent or disable any security features of the Online Services. d) Service Interference: Using the Online Services in a way that interferes with or disrupts the integrity of the platform or other users’ data; or overloading the system with excessive API calls or data transfers beyond reasonable usage limits. e) Billing Circumvention: Disabling, tampering with, or attempting to circumvent any billing mechanism that meters usage; or manipulating usage data or using automated tools to artificially reduce measured usage. f) Intellectual Property Infringement: Using the Online Services to infringe upon or violate the intellectual property rights of others; or distributing copyrighted material without proper authorisation. g) Illegal Activities: Using the Online Services for any illegal purpose or in violation of any applicable local, state, national, or international law. 3. Data Protection and Privacy Users must: Ensure that their collection and use of Customer Data complies with all applicable data protection and privacy laws; and obtain necessary consents from data subjects for the processing of their personal data through the Online Services. 4. Account Security Users are responsible for: Maintaining the confidentiality and security of their authentication credentials; creating strong, unique passwords and enabling multi-factor authentication where available; and promptly reporting any suspected misuse of accounts or security incidents to IXONN. 5. Third-Party Usage Users may not: Rent, lease, lend, resell, transfer, or host the Product, or any portion thereof, to or for third parties without explicit authorisation from IXONN. 6. Compliance Monitoring IXONN reserves the right to: a) Monitor compliance with this Policy; b) Investigate any suspected violations; and c) Take appropriate action, including suspension or termination of services, in cases of severe or repeated violations. 7. Reporting Violations If you suspect any violation of this Acceptable Use Policy, please report it immediately to our support team at abuse@ixonn.com. 8. Policy Updates IXONN may update this Policy from time to time. Users are responsible for regularly reviewing the Policy to ensure compliance with the most current version. 9. Consequences of Violation Violation of this Policy may result in: a) Suspension or termination of access to the Online Services; b) Legal action in cases of severe or repeated violations; and/or c) Liability for any damages caused to IXONN or other users as a result of the violation. By accessing or using IXONN’s Online Services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy, and you agree to comply with this Acceptable Use Policy. This Policy applies to all users, including customers, their affiliates, end users, and any third parties granted access to the Online Services.