Optimize your environment, maximizing your equipment use while reducing their costs
Make sure your environment is free from cyber, physical, or social attacks.
Make sure your business keeps running even when unforeseen events happen
Do not allow yourself to lose money in the case of your environment is not available due to data loss
More than 19 years of experience helping your business prosper on solid foundations of network infrastructure and services assuring stability and security. That way you can completly focus your attention on your business and not worry about the technology, at the same time reducing operational costs as you do not have to keep highly specialized employees on your staff.
PFSense, Fortigate, Endian, Cisco, Mikrotik, Peplink, HP, 3Com e outros
XenServer, VMWare, HyperV, KVM and more
Zabbix, Nagios, Cacti, MRTG e outros
Bacula, HP Data Protector, BackupPC and more
Linux, Windows, Unix, MacOS, Zimbra, Exchange, Apache, Nginx, IIS, Active Directory, GPO, GPP, SAN, NAS, DHCP, DNS, VPN, VLAN, NFS, DFS, Samba, TSM, High Availability, Squid, NIS, Cluster, DRBD, Failover
MySQL, PostrgreSQL/PostGIS, MS SQL Server, ArcSDE, ArcGIS, Geoserver, OpenGIS
Add me to your LinkedIn connections
Know the risks of using public Wi-Fi. See how to protect yourself and don’t be exposed to hackers. If you like to use apps or sites that carry sensitive data like e-mails and banking, that is even worse. Not to mention those who use the net to work, these ones are risked to be fired due to data leakage.
Discover if your mobile device is being used to spy on you.
Find out what to do before installing an app and not become a victim of malicious developers.
Social engineering is the psychological manipulation to make people do what the manipulator wants, be it an action or an information disclosure. It is the most efficient way to obtain access to something like a system or to get into some place or receive some sensitive data, as it takes advantage of one of our Read more about Social Engineering[…]
Phishing is a social engineering technique used to fish sensitive information of people or companies. It can be addressed to the general public or directed to a specific person or company. It has been used since the beginning of the times and was simply migrated to the virtual world. It usually uses some kind of Read more about Phishing – Have you been a victim?[…]
Chances are great that you are reading this by some wifi network, and no one better than you to know that it fails you on the worst time, be it during an internet banking transaction or at a Game of Thrones episode climax. Be sure that it was worse in the past. With some tips Read more about Tips to improve your wifi connection performance[…]
Fauxpersky, malware that collects all typed information as passwords, credit card numbers, etc It has many important characteristics, camouflage itself as a version of the Kaspersky Internet Security 2017 and sends your information through Google Forms, a Ele possui várias características importantes, se camufla como uma versão legítima do antivírus Kaspersky Internet Security 2017 e Read more about Fauxpersky[…]
How to disable the autorun of a pendrive’s content on Windows to minimize infection by this mean? As stated on my last post, a way of infecting Windows machines is through executing content automaticaly upon connecting exeternal media like pendrives (thumbdrives), cdroms, external HDs, etc. It’s very easy to contaminate a pendrive today. We always Read more about How to disable autorun feature on external media[…]