Founder and CEO of The Records Hub S.A
President of EYEONIX S.A.
Chief Technology Officer of EYEONIX S.A.
Our facilities 2.000s.q.m are designed to accommodate individual project based processes of Storage and Indexing conducted in secure access controlled areas.Our state-of-the-art warehouse is fully compliant with the Fire Department Regulations.The boxes are placed on pallets which are nylon wrapped and then are placed on steel custom-made shelves which can only be accessed by our warehouse lifting truckLearn More
Regulation (EU) 2016/ 679 - GDPR applies to all organizations who collect and process personal data Non-compliance with the Regulation may lead to fines.Learn More
Process of digitization of records with capacity of more than a 1.000.000 images per day No matter the volume of your propject, our ofered scanning services can meet any of your needs.Learn More
The Records Hub S.A. destruction services is Security Approval 5 (NATO approved). The Records Hub S.A. can shred paper, cardboard, optical media (CDs/DVDs/Blu-rays), Floppy-disks, Blu-ray, credit cards and carton boxes.Learn More
Cyber core is a unified platform that delivers the most innovative, complete, powerful and state-of- the-art solution in the marketplace, combining suites and technologies that result to the total security of the defended ecosystem and the immediate alert and protection of the system administrator against all existing fast and slow, instantaneous or zero-day attacks to the infrastructure or the endpointsLearn More
The Enterprise Immune System is the world’s most advanced machine learning technology for cyber defense. Inspired by the self-learning intelligence of the human immune system, this new class of technology has enabled a fundamental shift in the way organizations defend themselves, amid a new era of sophisticated and pervasive cyber-threats.Learn More
RightsManager enables best document security practices by allowing you to encrypt documents locally, so there is no need to upload unencrypted documents to an unknown server or file sharing site. You maintain complete control of your source files at all times.Once your files are encrypted, go ahead and share files securely through all the normal channels—email, website, intranet, cloud storage sites or removeable media.Learn More
Protects against phishing, man-in-the-middle and replay attacks with strong authentication Incorporates FIDO-certified security protocols, including public key cryptography/ infrastructure (PKI) Ensures security key and biometric information never leave the mobile device; no server-side secrets or link-ability between services or accounts.Facilitates higher user adoption: no need to remember passwords, no manual typing Works with smartphones that consumers/employees use every day. Delivers a consistent user authentication experience to access various servicesLearn More
Email is where most work starts these days. And where it eventually concludes. So it only makes sense to have it integrated with other components making up the overall context. Plan a meeting right from your email. Find a contact when composing your calendar event. Send an email from a team chat room. Edit a document right in the conversation where it’s been sharedLearn More
With CONNECT we bring the power of Command , Control and Communications at the palm of a smartphone, tablet or wearable.Group or private Communications, in a walkie-talkie stylish manner, that was famous in Police and Military technologies, is now properly sized to fit in the needs and enhanced requirements of all the hierarchy of enterprisesLearn More
The ultimate solution for end-to-end encryption of voice calls and text messages. Available on iOS and Android™, it connects calls quickly, keeps them secure, and ensures excellent voice qualityLearn More
Accurate Detection - Future Proof - Multiple Alert Options. Deploy as a portable or network device with adjustable range.Zone Protectora and Zone Manager deliver real time protection with actionable intelligence. Active Monitoring Technology enables our customers to secure and protect their facilities, assets, and information worldwide.Zone Protector alerts and notifies as soon as a signal is detected. Secure classified information throughout your facilityLearn More
Novel patented marker technology which relies on SERS (Surface Enhanced Raman Spectroscopy) for detection. Uses ≥1 of a range of unique molecules at ppb (parts per billion) levels to mark fuel. Not possible to detect this with normal analytical techniques.Learn More
EN - Cookies
H TheRecordsHub.com χρησιμοποιεί cookies για να βελτιώσει την εμπειρία σας στην ιστοσελίδα. Η τεχνολογία που ονομάζεται "cookies" είναι ένα στοιχείο των δεδομένων που ένας ιστοχώρος μπορεί να στείλει στο πρόγραμμα περιήγησής σας, το οποίο μπορεί στη συνέχεια να αποθηκεύσετε στο σύστημά σας. Μερικές σελίδες του site χρησιμοποιεί cookies έτσι ώστε να μπορούμε να σας εξυπηρετήσουμε καλύτερα όταν επιστρέψετε στην ιστοσελίδα μας. Μπορείτε να ρυθμίσετε τον browser σας να σας ειδοποιεί όταν λαμβάνετε ένα cookie, δίνοντας την ευκαιρία να αποφασίσει αν θα την αποδεχθεί ή όχι.
Η εταιρεία The Records Hub S.A. έχει εφαρμόσει Σύστημα για την Αντιμετώπιση της Δωροδοκίας σύμφωνα με το πρότυπο ISO 37001. Έχουν καθιερωθεί διαδικασίες και κανονισμοί που αποτρέπουν και απαγορεύουν τη δωροδοκία στις εργασίες της στην Ελλάδα και στο εξωτερικό. The company The Records Hub S.A. has in place a System against Bribery in accordance with ISO 37001 standard. Procedures and rules are in place in order to avoid and inhibit bribery in its operations in Greece and abroad.Learn More
ISO 9001:2015 - Quality Management System ISO 27001:2013 - Information Security Management System / ISO 22301:2014 - Business Continuity Management System / ISO 30301:2011 - Information and Documentation / Management System for Records / ISO/TR 13028:2010 - Information and Documentation - Implementation Guidelines for Digitization of Records / ISO 14001:2015 - Environmental Management System / OHSAS 18001:2007 (ISO 45001:2018) - Occupational Health and Safety Management / ISO 37001:2016 - Anti-bribery Management System / NATO Secret industrial security classification / NATO certified manufacturer / NATO Communications and Information Agency registered / NATO Foracs registered / NTC certified telecom operator / TRACE certified§UN accredited supplier / NASA approved vendor and partner / European Defense Agency registered / European Commission Transparency registered / European Telecommunications Standards Institute registered / DUNS Registered