Services
.----..-.   .-.  .-. .----..-.    .----..----..---. .-. .-..----. .-. .---..-.  .-.
| {_  | |    \ \/ / { {__  | |   { {__  | {_ /  ___}| { } || {}  }| |{_   _}\ \/ /
| {__ | `--. / /\ \ .-._} }| |   .-._} }| {__\     }| {_} || .-. \| |  | |   }  {
`----'`----'`-'  `-'`----' `-'   `----' `----'`---' `-----'`-' `-'`-'  `-'   `--'


  • 10 PRINT "SECURITY SERVICES"


  • - Host and network security
    - Penetration testing and security analysis of business critical systems
    - Reverse engineering of unknown software and hardware
    - Design and implementation of firewalls and security systems


  • 20 PRINT "NETWORK SERVICES"


  • - Design and configuration of complex and mission critical networks
    - Configuration of Cisco, Juniper, HP and Foundry devices
    - Routing protocols and routing policies (BGP, OSPF, ISIS, MPLS, etc)
    - High-secure virtual private networks including dynamic multipoint VPNs
    - Wireless LAN, Bluetooth and other communication systems


  • 30 PRINT "SOFTWARE DEVELOPMENT"


  • - Development of software in different languages according to customer demands
    - Installation, migration and training services
    - Documentation of software