Vulnerability assessment
Onsite security audit
Penetration Testing
Intrusion detection systems
Virtual Private Networking
Computer Forensic Analysis
Other security related services

As additional services we can offer:
Mail Server
File server
Web Server
PHP/MySQL applications
OS Installations
Antivirus, Antispam Software

For more info just click on the arrow.
Vulnerability Assesment

Vulnerability assessment is a process in which we systematically examine the security asset of an critical infrastracture, the interconnected systems on which it relies, its information or product to determine the adequacy of security measures, identify security weknesses that could be exploited, evaluate the effectiveness of additional security measures or alternatives and verify the adequacy of such measures after implementation.
Onsite Security Audit

At location (customers places) we systematically examine the whole infrastructure and interconnected systems and try to determine the adequacy of security measures and policies applied.
Penetration Testing

Penetration testing is a portion of security testing in which penetrators attempt to circumvent the security features of a system. The penetrators may be assumed to use all system design and implementation documentation, which may include listings of system source code, manuals, and circuit diagrams. The penetrators work under no constraints other than those that would be applied to ordinary users.
Intrusion Detection Systems

Intrusion Detection Systems are a real-time security sentry that monitor and analyze the network datastream in search of an intrusion, break-in attempt or any type of attack activity signatures that have been deemed unauthorized, and then alarm and react to the activity.

A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. Basically, a firewall, working closely with a router program, filters all network packets to determine whether to forward them toward their destination. A firewall is often installed away from the rest of the network so that no incoming request can get directly at private network resources.

The area within the firewall is called the demilitarized zone, or DMZ. Often, a single machine in the DMZ is allowed access to both internal and external computers. The computer in the DMZ is directly interacting with the Internet, so strict security measures on it are required.
Virtual Private Network - VPN

Virtual Private Network usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is virtually private and secure.

A typical example would be a company network where there are two offices in different cities. Using the Internet the two offices merge their networks into one network, but encrypt traffic that uses the Internet link. The benefit is also that people can connect to the LAN from anywhere on the Internet. This allows easier connectivity and lower phone bills for travelling salespeople. They just sign up with with a national ISP and call local POPs from their hotels as they travel the country and easily connect back to their company's local network.
Computer Forensic Analysis

Other security related services

- design and implementation of new networks
- upgrade of existing networks
- implement fault-tolerant networks
- implement backup and redundancy systems
- clean-up and restoration of existing networks
- system maintenance, support and upgrade
Mail Server

Send a note with your request. For prices check the pricelist.
File Servers

Send a note with your request. For prices check the pricelist.
Web Servers

Send a note with your request. For prices check the pricelist.
PHP/MySQL Applications

Webpages, form processing, databases...
OS Installations

We install different operating systems
(OpenBSD, FreeBSD, NetBSD, QNX, Linux, Windows servers...)

and different programs and packages
(PHP, MySQL, Apache, Qmail, WebMail, Samba server...).
Antivirus, antispam software

ESET NOD32 Antivirus products
  • Enterprise Edition
  • NOD32 for Workstations
  • NOD32 for File Servers
  • NOD32 for Email Servers

Cloudmark Antispam
  • Cloudmark Desktop Box
  • Cloudmark Server Edition Box