Your internet line during a volumetric attack after black-holing the ip of www.example.comHow to Protect Successfully your network against DDoS attacks: 5 steps

Categories: Uncategorized
Tags: No Tags
Comments: 6 Comments
Published on: November 23, 2013

We describe in 5 steps how to protect your business against DDoS attacks of any size.


How to prevent and mititgate DDoS part 1?

Categories: Uncategorized
Tags: No Tags
Comments: Comments Off
Published on: November 27, 2012

We all heard about DDoS and we all fear them. We all hope to never be a victim of hackers or be ask for a ransom in exchange to not be DDoS. The day it’s happening to you, you realize it’s too late. You call your ISP and they tell you it will costs 3000$[…]


How to install a software without spyware?

Categories: Uncategorized
Tags: No Tags
Comments: 3 Comments
Published on: August 15, 2012

There was a time when installing software was just a matter of clicking next a couple of times and then finish. The most difficult part was to accept the license agreement because we couldn’t click next until we accept it. We could install as many software as we want without worrying on spywares and malwares.[…]


page 1 of 1

We are fully
Infrastructure
  • Firewall, vpn, load-balancer
  • Router switch
  • Virtualization & cloud
  • Web, database, ftp servers
  • Mail, dns, dhcp services
  • Storage, SAN, NAS
  • Backup & disaster recovery
  • Performance Monitoring
Technology
  • Linux, Unix, Microsoft, Apple
  • High availability
  • DDoS mitigation
  • Clustering & Server redundancy
  • Network & power redundancy
  • Security
  • IPV4 to IPV6 migration
  • High performance & throughput
  • Incidents & problems investigation
  • Error detection & recovery
  • Self-healing mechanism

Welcome , today is Friday, June 23, 2017