Services
.----..-. .-. .-. .----..-. .----..----..---. .-. .-..----. .-. .---..-. .-. | {_ | | \ \/ / { {__ | | { {__ | {_ / ___}| { } || {} }| |{_ _}\ \/ / | {__ | `--. / /\ \ .-._} }| | .-._} }| {__\ }| {_} || .-. \| | | | } { `----'`----'`-' `-'`----' `-' `----' `----'`---' `-----'`-' `-'`-' `-' `--'
- Host and network security
- Penetration testing and security analysis of business critical systems
- Reverse engineering of unknown software and hardware
- Design and implementation of firewalls and security systems
- Design and configuration of complex and mission critical networks
- Configuration of Cisco, Juniper, HP and Foundry devices
- Routing protocols and routing policies (BGP, OSPF, ISIS, MPLS, etc)
- High-secure virtual private networks including dynamic multipoint VPNs
- Wireless LAN, Bluetooth and other communication systems
- Development of software in different languages according to customer demands
- Installation, migration and training services
- Documentation of software