Expertise and collaboration
without compromise
Datacenter solutions

Datacenter solutions
The goal of our datacenter line of business is to implement solutions that are 100% in line with our customers’ needs using their most suitable project management methodology, thus maximizing customer satisfaction. Our portfolio comprises VMware, HPE, HP, Veeam, and Amazon AWS solutions. We focus our expertise on open, linux-based solutions, be it assessments, fine-tuning security configurations, or central IT monitoring. Our experts design, implement, and, if needed, operate large HPE-based systems. Paralelly, we also provide servicing for products of esteemed vendors, thus supporting the full lifecycle of tools.
More informationyears of experience
experts
content clients
project / year
Become a part of our future-shaping team
If you think you’d be happy to make full use of your knowledge and energy at a company that has both domestic and international projects, offers opportunities for continuous improvement, all while giving you the chance to try different areas, check out our open positions and send us your CV today.
Open positionsStay up-to-date!
Why Excel can’t protect against ransomware – GRC platform is the solution
Ivett Dobay
2025.08.07
Cyber-attacks don't require permission - if you still rely on Excel spreadsheets, it's time to learn what a real, event-driven GRC platform can offer.
NIS2 Compliance in Hungary: Key Insights and Lessons from Early Audits
Gergely Lesku
2025.07.31
NIS2 is not only a challenge, but also an opportunity for development - audit experiences and practical advice for successful compliance and strengthening digital security.
Proactive Cybersecurity with AI: Staying Ahead of Threats
Tamás Barna
2025.07.24
AI is the foundation of future-proof cybersecurity: visibility, risk-based decisions and proactive defence for effective enterprise protection.
Why NetWitness Is the “Formula 1 Engine” of SOCs
Helmut Wahrmann, Mateusz Flak
2025.07.17
Don't react when it's too late! NetWitness anticipates attacks, analyses network traffic and detects hidden threats in time.
Our key partners










Other partners












