Expertise and collaboration
without compromise
Datacenter solutions
Datacenter solutions
The goal of our datacenter line of business is to implement solutions that are 100% in line with our customers’ needs using their most suitable project management methodology, thus maximizing customer satisfaction. Our portfolio comprises VMware, HPE, HP, Veeam, and Amazon AWS solutions. We focus our expertise on open, linux-based solutions, be it assessments, fine-tuning security configurations, or central IT monitoring. Our experts design, implement, and, if needed, operate large HPE-based systems. Paralelly, we also provide servicing for products of esteemed vendors, thus supporting the full lifecycle of tools.
More informationyears of experience
experts
content clients
project / year
Become a part of our future-shaping team
If you think you’d be happy to make full use of your knowledge and energy at a company that has both domestic and international projects, offers opportunities for continuous improvement, all while giving you the chance to try different areas, check out our open positions and send us your CV today.
Open positionsStay up-to-date!
The new logic behind SOC operations: what will define 2026
Gusztáv Krékity
2026.01.29
It's not autonomous SOCs that are coming, but consciously controlled systems. See what this means in practice as we move toward 2026.
Generative AI vs. Agentic AI: two AI disciplines, one business goal
Ivett Dobay
2026.01.16
Generative AI helps you see through IT systems, while agentic AI supports fast, goal-oriented responses during SOC and incident management. Find out how this works in practice.
Cybersecurity in 2026: From reactive defense to strategic resilience
Gusztáv Krékity
2025.12.19
AI, Zero Trust, and business risks will define 2026. If they're not part of your strategy, you'll be at a competitive disadvantage. Read on to find out what steps to take now!
Cortex Cloud: the new AI-driven link in the “code-to-cloud-to-SOC” security chain
Gusztáv Krékity
2025.12.11
Learn how Palo Alto creates a unified, autonomous security chain from development through the cloud to the SOC—with maximum protection.
Our key partners
Other partners