Cyber Security

Cyber Security

Complex service includes audit, breaches identification and solutions implementation. Based on the audit results a detailed recommendations list and a plan of resources and services implementation is presented.

IT audit, consists of reviewing and documenting the following elements:
Network Topology
Network security audit
Network performance audit
Windows server audit (performance and configuration audit)
Audit of VMWARE ESX, Hyper-V servers (performance and configuration audit)
Server audit (security audit)
Server audit (hardware)
UPS uninterruptible power supply audit
Audit of selected work positions

What follows is:
Implementation of a security policy
Risk management
Recovery plan
Software license control
Server protection
Data backup
WIFI transmission encryption
Hard drive, mobile device and email encryption
Securing communications within the company
Anti-virus and firewall protection
Hardware security

We use:

E-commerce

E-commerce

Small or large businesses, B2B or B2C, selling products or services, all need to enable their clients easy acces to view and order. Review some of our e-commerce technologies and let us work for you.

Shopify, Amazon, Magento, Presta, WooCommerce

Programming

Programming

IT teams already know what technologies they need, so providing a porgrammer up to their needs is fairly easy. If you still struggle to chose one of the thousands of available ones – let us know!

There are currently thousands of programming languages in the world and new ones are created each year.

HTML, xHTML, HTML5, XML, CSS, SQL, JavaScript, PHP, Python, Ruby (Ruby on Rails), JAVA, C#, C/C++, Objective C, Pascal/Delphi, Assembler, SCALA, LISP, Erlang

CMS & CRM

CMS & CRM

To to organize content on the website or manage relations with your clients it is easier with the use of ready build systems. If you already have one but need to update it or just thinking of using one – let us know!

WordPress, Drupal, Joomla!, ExpressionEngine, SilverStripe,