SERVICES
DATA ENCRYPTION
We design, create, install and administer encrypted servers and clients that communicate with each other in an encrypted and decentralized way.
We create stand alone encrypted containers for sensitive data and backup storage.
PERIMETER DEFENSES
We install, configure and manage perimeter defense for antivirus, firewalls, additional defensive modules.
We monitor attacks, we check the network status, we respond to computer accidents.
THREAT ANALYSIS
We study, analyze and remove viruses, Ramsomware, Trojan, Malware, A.P.T. And other computer threats.
SECURITY AUDIT
We perform safety audits and penetration tests to verify the status and functionality of current defenses, so as to prevent computer attacks that exploit bugs or vulnerabilities known, minimizing the risk of a possible data breach.
HARDWARE
We sell hardware including monitors, desktops, laptops, workstations for CAD drawings and gaming, printers, routers, switches, firewalls and other devices.
SERVERS AND NETWORKS
We develop, install and manage servers and clients. We operate Microsoft and Linux systems.
We design and implement networks L.A.N., W.A.N., P.A.N., V.P.N. Even encrypted and interfacing each other.
SITES AND E-MAIL
We create and manage Internet sites, email addresses and social profiles.
SMARTPHONE
Apple's smartphones or Android system are intrinsically insecure and we do not recommend their use.
For this reason the Ubuntu Ports community was born that develops and supports Ubuntu Touch, an operating system for secure smartphone based on Linux Ubuntu.
We install on any Open Source app smartphone to be able to communicate securely through encryption.
FORENSIC ANALYSIS
We carry out technical expertise, consultancy, forensic analysis and data recovery.
VIDEO SURVEILLANCE
We design and install Smart Video Surveillance systems with faces recognition, plaques readings and artificial intelligence for alarms and other functions.
We only mount Italian brands to reduce the risk of espionage by foreign companies.
You will be the masters of your data as the bailouts are encrypted and take place both locally and in the cloud.
TRAINING COURSES
We carry out public and private training courses, group or individually both online and in presence.
The topics can be basic, intermediate or advanced according to the required level.