Product Development

  • Embedded hardware integration
  • Internet of Things (IoT) design and security
  • Hardware physical and software security
  • Encryption and security

Information Technology Management and Infrastructure

  • IT infrastructure installations and upgrades (servers, workstations, networks)
  • Virtualization of server environments (VMWare/HyperV)
  • Data loss prevention technlogy and strategies
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Network auditing, monitoring and reporting
  • Social engineering defense training
  • Security assessments and remediation
  • UNIX/Linux systems administration consulting
  • E-mail hosting, configuration and support
  • Purchasing advice on hardware and software
  • Firewall/IDS installation, configuration and monitoring
  • Complete managed services options

Enterprise Platforms: Windows desktop and server OS, UNIX, Linux, OS X, Exchange, Type-1/Type-2 Hypervisors (VMware / Hyper-V / Xen / KVM)
Mobile: iOS, Android, Windows, Blackberry/BES
Networking: LAN / WAN / WLAN, TCP/IP, message transport/delivery, SSL/TLS, DNS, BIND, SNMP, physical layer, two-factor authentication, Cisco IOS / ASA / PIX, pfSense, VoIP, NOC design and operations, VPN, MPLS
Database Admin: Oracle, SQL Server, MySQL
Monitoring: Nagios, MRTG/PRTG, Snort, Tripwire
Encryption: Public-key and symmetric key cryptography in various applications
Storage/LVM/File Systems: Distributed (AFS, NFS, Windows DFS), SAN / NAS (NetApp, EqualLogic), RAID, ZFS
SaaS: Office 365, Google Apps, Hosted Exchange, Disaster Recovery / Business Continuity
Endpoint Protection Suites: Symantec, McAfee, Kaspersky, Trend Micro
Two-factor authentication: RSA SecurID, DuoSecurity

Software Development

Our professional software developers have experience across a variety of industries. Most of our software is developed for in-house use, but we do contract to clients on a case-by-case basis.

Software Development: C, C++, Objective C, Java, Node.js, Python, PHP,  Android, iOS