We are partners with many developers who deliver sophisticated IT solutions. We offer hardware supply and with it discounted configuration services of the supplied systems.
For specific applications we develop software to facilitate and automate work processes.

Installation of ICT equipment

Our stable base of technicians and IT specialists offer a variety of services in the areas of network technology, virtualization, encrypted PBXs, VPNs and other IT systems.

We are also prepared for less common tasks and our development department will always select the best option to your satisfaction. We offer our experience in the installation of network equipment Cisco (ASA, IOS, ...), Mikrotik, DELL, FortiGate, ZyXEL, NUUO, etc.

Configuration, operation and management of VMware, XEN and Hyper-V virtualization technologies.

Thanks to many years of supplying IT technologies to medium-sized companies from the ranks of personnel agencies, automotive, hotels and municipal authorities, we can prepare an overall secure working environment with regard to the processing of personal data and the handling of confidential and non-public documents.

Data encryption and computer security in case of theft

We can ensure the security of the corporate network against eavesdropping, spying, and employees themselves taking company secrets.

We specialize in email encryption, encryption of workstations and laptops, encryption of PC communication on the local network, remote access of employees using VPN. Server virtualization, comprehensive backup systems with cold and hot backups including encryption of both servers and of course backups.

Our consultants are also available for consultancy services and can suggest solutions for any security challenge.

Our services

1) Microsoft Exchange

We offer comprehensive administration and deployment of Microsoft Exchange Server. We can resolve any sudden problems, configuration changes and migrations to higher versions.

Microsoft Exchange mail server is a very secure, reliable and robust system. It is a highly scalable and largely customizable system.

More about this service

We provide installations from the initial initial consultation, through design/project, installation and migration of data from legacy systems. As a result, we are best able to tailor the entire system to the customer, including training of staff.

We perform Microsoft Exchange mail server installations from simple single server solutions to high availability and load balancing systems.

We offer a long range of experience with systems containing hundreds of millions of emails and database and individual mailbox sizes in the TB (tera bytes) range. By setting up antivirus and antispam correctly, we are able to guarantee highly effective antispam and antivirus control in the long term.

Of course, we place emphasis on the security of each installation, both by implementing PKI (own or public certificate authority + security certificates for authorization) and S/MIME (encryption and signing of the emails themselves), and by setting up mail server management rules, including setting up access rights processes (for example, so that every administrator in the corporation does not have the ability to set up full access to any mailbox, etc.). By adding security templates we are adapting Microsoft Exchange to GDPR compliance.

We also perform the transition and migration of data from other mail systems to Microsoft Exchange and, of course, upgrades from previous versions of Microsoft Exchange. Of course, part of the installation of Microsoft Exchange is also the training of users for normal use and managers so that they have insight into the few limited capabilities of Microsoft Exchange.

Our skills and experience also include implementing co-operation with third party systems where we are able, virtually independent of the capabilities of other mail systems, to create a fully functional mail delivery system using Microsoft Exchange.

However, Microsoft Exchange is not just about email, but also about synchronizing contacts, calendars, tasks and other items across your entire company and across all devices. A user simply plugs their Exchange mailbox into their smartphone, tablet or laptop to access and back up all their phone and email contacts, instant access to their emails, calendars and tasks. Plus, if you edit any item on any device, it will instantly update on all your other devices.

2) Wi-Fi

Are you looking for Wi-Fi that can handle 80 or more patrons in your restaurant or bar? Do your clients complain about slow Wi-Fi even when they have a full signal? Can't connect to the Wi-Fi network even though they have the right password? Do you reboot your Wi-Fi router so often that you're blind to where the power supply is? We can solve all this!

More about this service

Wi-Fi for halls, warehouses, production areas, distribution centers, restaurants and hotels - Wi-Fi Warehouse.

Nowadays, speed and quality are crucial. If you too are now dealing with Wi-Fi networks for industrial, warehouse and hotel premises, we are ready to lend a helping hand and offer you our experience.

Warehouse barcode scanners, teminals for forwarding orders, handheld terminals for inventory... all of these today require quality wireless connected to your servers. We offer a total solution from design to implementation so that you are 100% satisfied.

When deciding on the technologies to be used, we will be happy to help you with a suitable analysis of the space in question, during which we will discuss your expectations with each other and we will design a solution that covers all areas of the hall/hotel and ensures a stable connection.

Remember that a poor quality Wi-Fi network = high downtime for employees, increased costs and a worse working environment for employees. In case of a complete failure of the Wi-Fi network, the production or forwarding is effectively stopped.

Contact us and we will offer you a solution that is stable, secure and powerful.

We provide consultation, design and implementation of Wi-Fi networks in industrial steel halls as well as outdoor open spaces. Suitable for shipping centers, manufacturing halls, hotel complexes and outdoor campgrounds.

The Wi-Fi network consists of access points, which exist in many designs, for use in outdoor and indoor environments and a control computer. The control computer can handle failover between access points, called Wi-Fi Roaming. It also monitors the status of all access points and can provide timely information about upcoming hazards. It checks and measures the transmitted data, generates statistics and can determine the load of individual access points and their possible jamming.

In addition, our industrial Wi-Fi networks are capable of so-called virtual Wi-Fi networks, so you can have a separate network for business partners and for production - there is no risk of viruses, malware or network eavesdropping.

A design that catches the eye, or an invisible installation

We can deliver already design-forward access points in any colour, according to the customer's wishes. We can carry out a hidden installation that guarantees 100% design purity and freedom from the obligation to place unsightly IT elements directly in architecturally sensitive locations.

Centralised administration = 10x less care

Our Wi-Fi solution delivers easy management through central management. For corporate IT specialists, this brings high time savings in network configuration and thus increased flexibility of the entire system. All settings are only made in the central management, which already takes care of further distribution of settings. At the same time, the central management controls the integrity of the network and the availability of all access points.

In addition, the system can broadcast up to 4 SSID networks that are separated from each other by VLANs. This allows us to securely separate the guest network from the traffic network. It is also possible to charge for or restrict Internet access using the Hot-Spot system.

Practical example

We supplied 45 access points and a PC access point controller for a freight forwarding company. As part of the delivery, an expert analysis of the interior space and an analysis of the customer's needs was first carried out. In the next step, we proceeded to the actual installation of the Wi-Fi access points. A rack was installed with a centralized power supply element, UPS backup power supply and a powerful switch. This cabinet was connected via a fibre optic network to the main distribution of the local network.

The final phase involved the configuration of the Wi-Fi access points, configuration of the Motorola/Symbol MC9090 handheld scanners and final testing.
During the tests, the correct design of the entire network was confirmed with error-free Wi-Fi signal coverage.
After half a year of operation, at the request of the investor, the expansion of the Wi-Fi network to another hall was started. Thanks to the unlimited scalability, the system was expanded during full operation.

Solutions offered:

  • Enterasys/Extreme Network
  • Mikrotik
  • Ubiquiti UniFi
  • Ruckus
  • Cisco
  • and more...

3) IT outsourcing

We provide a comprehensive portfolio of IT outsourcing services. We will take over your concerns and the time you save will enable better development of your company. We also offer a popular "help desk" system, where we do not replace your company's IT department, but complement the knowledge of your IT staff by working together. We can turn your company's mess into a working IT system.

More about this service

  • Computer network management
  • Server management
  • Satabase management
  • Website maintenance
  • Management of camera systems CCTV
  • Management of access control systems ACS
  • Security system management
  • License management
  • Emphasis on security of the entire technology

4) SDN - Software Defined Networking

Software-defined networking (SDN) is the state-of-the-art approach to creating and managing a computer network. All elements of a network are typically controlled by a single master element that displays and configures the entire network in a clear and as user-friendly as possible. Creating VLANs across 15 switches? = 1 minute of work. And most importantly, a staggering amount of diagnostic and statistical data. Easily find elements in the network and maximize security for users and network elements.

Accept our offer to present SDN in your corporate network or in your large branch network. SDN networks are ideal for this too, simple central management of multiple separate networks.

5) Virtualization

Virtualization on existing, upgraded or new HW directly at the customer's premises. Virtualization on the customer's HW located in the server housing and it is not a requirement that it must be our server housing.

This is especially the case when a customer buys a server that needs to be hosted abroad for optimization or high availability reasons.

More about this service

Working with Dell, we are able to host a server anywhere in the world significantly cheaper than if the customer were forced to physically visit the location.

Virtualization in our Cloud Center.

We are ready to create a virtual server for a single customer as well as for the entire infrastructure of corporate use.

The customer is created his own private Cloud, where he can rent SW in addition to computing space. At the same time, he has the option to use his SW license or his own SW (for example, if he is a multi-license holder).

For corporate customers, the option of a hybrid environment is also offered, i.e. connecting the private Cloud with the customer's physical infrastructure. Of course, we are also able to offer Internet connectivity corresponding to the customer's requirements throughout the Czech Republic and Slovakia.

Part of the offered service is the possibility of nested virtualization (For example, in case the customer wants to rent his own hypervisor).

In all variants we are able to offer solutions on VMware, Microsoft Hyper-v and Citrix Xenserver platforms.

In the basic configuration, customer data is backed up to two separate locations. However, the primary location offers a replication option that has the advantage of virtually instantaneous technology start-up at the backup location in the event of a primary technology failure. Replication, however, requires customer cooperation, especially in cases where the customer has encrypted data. In such a case, we will provide the customer with the space, tools and maximum support to be able to set up replication on his private part. Of course, it is also possible to replicate and back up even if the customer has encrypted data, but it is only a snapshot of his disk (We cannot use e.g. VSS (volume shadow copy), so we cannot take responsibility for the consistency of replicated and backed up data, especially for databases etc.).

6) Remote backup

Encrypted copying of critical data and operating systems to a geographically separate location in case of operator or hardware failure or natural disasters. Effective protection against ransomware.

This is especially the case when a customer buys a server that needs to be hosted abroad for optimization or high availability reasons.

More about this service

We offer two basic options depending on the customer's computer network capabilities. If the customer has a separate location suitable for backups (fast internet, secure environment) remote backup can be installed at their second facility on their own or rented HW. In this case, the customer is 100% sure that his precious data is only in his possession.

If the customer does not have this option, we recommend using our cloud servers, which we own and manage ourselves. In this case, the data is encrypted and transmitted to the cloud centre in an almost unreadable form.

In both cases, the solution is a secure encrypted data transfer over the Internet. We also offer the possibility of multi-layered encryption with different technology (for example, IPsec inside openVPN) with minimal impact on the performance of the transmission path (optimization of MTU, TCPwindow, etc.). Multilayer encryption is particularly useful for improving data security, as each encryption algorithm works on a different principle, and thus provides the highest level of security.

All data stored at the customer or in private storage (cloud) can be encrypted and thus protected against physical and electronic theft.

Even when encrypting customer data, it is advisable to use multiple layers of encryption (for example, SED/FDE and Bitlocker).

Part of the services offered is a unique option where the customer can encrypt remote data with their own software and thus achieve 100% confidence in the remote storage.

We use storage on Linux, Unix and Windows platforms. The service includes, of course, the possibility of direct access to data from the Internet using a web browser, webDAV, FTPS and SFTP. In the case of direct access to data from anywhere, a PKI (secure certificate authority with its own, private, certificates) is created for the customer, thus preventing unauthorized access to private data.

Protection against ransomware and file versioning

According to the backup policy you set, you can create a very effective protection against ransomware (a ransomware virus that encrypts your data on all accessible places on the computer where it was run - i.e. even network drives and requires you to pay a large amount of money to reveal the decryption key).

The principle of protection is versioning changes to files on disk storage, which allows you to roll back up to 30 versions of a file. You can also use this option if you accidentally overwrite a file with a different version of a document, or if someone clumsily deletes it.