+45 53 67 65 63

Tonsbakken 16-18, 2. sal
DK-2740 Skovlunde


Consultancy & Services

Privileged Access Management

We provide services pertaining to design, documentation, implementation, management and operatations of solutions based on XTON Access Manager.

XTON Access Manager

Simplified management of Privileged Access.
XTON Access Manager is an agent less solution which deliver Privileged Access Management, Privileged Session Management and Privileged Job Management. The main features and functionality are;

  • Share Privileged and Root Access with Remote Contractors
  • Periodically Rotate Privileged Account Passwords
  • Limit the number of privileged accounts
  • Monitor and Record Privileged Sessions
  • Maintain Strong Passwords for Privileged Accounts
  • Discover Privileged Accounts
  • Delegate Execution of Privileged Commands
  • Multi-Factor Authentication for All or Selected Groups or Users
  • Store and Share Security Keys and Certificates with Users

Founded in 2017 with market disruption in mind, Xton Technologies brings a modern approach to enterprise privileged access management. 

As the first completely agentless PAM solution on the market, Xton Access Manager (XTAM) combines all the features of a traditional enterprise grade solution in one platform at a competitive price point.
It can be installed in minutes and works on-premise, in the cloud or in hybrid environments. XTAM provides complete control for privileged passwords, secrets, certificates and documents to meet audit and compliance requirements.
From both within and beyond the firewall, XTAM secures and protects privileged credentials against malicious or accidental access.
Xton Technology’s unique market approach - one platform, modern architecture, agile development and commitment to customer support - eliminates unnecessary complexities often associated with traditional PAM solutions.


We deliver consultancy across business verticals and to companies of any size, added here is an excerpt of past assignments.

Cyber Defence Centre (CDC)
Expansion of an existing CDC running 8x5 operations to support 24x7 operations in order to better supports its constituency. Deliveries included tooling and procedures.

Outsourced Security Operations Centre (SOC)
Conduct a RFP and select a vendor to run the SOC. Deliveries included RFP material, evaluation, selection of the vendor.
Endpoint Detection and Response
Solution Design of an EDR solution supporting more than 30.000 endpoints. Deliveries included initial implementation and handover to operations.

CSIRT Handbook
Define the structure for a new CSIRT Handbook, including framework, governance, and incident management. The client is now Acreddited by Trusted Introducer.

AWS Architecture and Security Design
Design review and guidance for an AWS single region, multiple availability zones environment. Utilising both AWS and 3rd party security components and solutions.

Use Case Management
SIEM use case management. Deliveries were governance and integration to existing processes.

Security Assessment and Improvements
Facilitate security and threat assessments for clients. Using the NIST Cybersecurity framework as reference model. Deliveries include management report with recommendations and prioritised list of improvements.

IT Security Manager
The Security Manager, assisting the CIO with manitaining the right security posture, both on the day to day challenges, and more long term goals.

Design and Review in General
Assistance with design and review of architectures on-premise and cloud, for infrastructure and security services. Both on a technical and procedural level.


itsika is a small Danish consultancy specialised in delivery of services within the areas of Security Operations, Security Architecture and Privileged Access Management. We deliver our services to companies of any size and across business verticals.