Settings saved

Data protection

In order to optimise the design of our website for you and to continuously improve it, we use analysis tools from third-party providers. Cookies, tracking and (re-)targeting technologies are only used after you have given your express consent.

IT Security solutions exclusively for you

We can also provide specialist solutions for you and the particular requirements of your IT environment. We develop components and solutions which aren't available off-the-shelf. We also use our know-how in the following fields:

  • IT security
  • Software development
  • Protocol standards
  • Software appliances
  • Bootable media solutions (CD-ROM, DVD, USB sticks)

Please contact us if you are interested. We will be pleased to create a solution which is customised to your requirements together with you.

Here is a selection of the solutions that we have developed for our customers so far:

  • RADIUS authentication module for Squid Proxy Cache (with load balancing, failover and redundancy functions)
  • Software appliance on the basis of Debian Linux for Squid Proxy Cache, including packages developed in-house with internet-based update service protected with a digital signature
  • Disaster recovery and forensic tool kit on the basis of a bootable Solaris CD-ROM
  • LDAP authentication module for Squid Proxy Cache for high performance connection to a Europe-wide LDAP directory
  • Training CDs for those attending our training sessions in hacking, including all of the tools used, on the basis of Knoppix