Worldwide IT help and service
Having a 15-year expertise in a hardcore conditions IT projects and support we can help you build a service you always wanted to have
WEB-HOSTING, SERVERS LEASING AND VIRTUAL OFFICE
WEB-HOSTING
Hosting is a service for providing resources for placing information on a server that constantly has access to the network. The hosting service implies the placement of site files on a server that runs the
software necessary to process requests for these files (web server).
We provide all common and some rare server capabilities on demand. A hosting user will have multiple disk redundancy, power backup and SSH access. You can always arrange your own configuration, just tell us you want it.

VIRTUAL SERVER
Virtual server is usually running as a virtual computer on a powerful server. It has its own dedicated processors, RAM, disk space, network interface and shared software. Using a VPN tunnel can include a virtual server into your company’s LAN as a shared resource. This is one of the most cost-effective server solutions you can have. You will have full control over your virtual server and all maintenance and monitoring will be made on our side. Just plug in.

DEDICATED SERVER
Dedicated server is a separate computer entirely working for you. Dedicated servers are commonly
used for launching applications that require a separate hardware (security reasons for example) or
have a very high resources consumption The server is located in our server room with a constant
uptime, performance monitoring and power backup. You will have a constant access to it via Internet, it can actually be a part of you corporate network via VPN tunneling.

VIRTUAL OFFICE
All office personal uses network servers, voice-over-IP communications, file and application sharing. Office infrastructure is running on a remote computer while user computers only act as terminals. This solution is ideal for highly-mobile and widely distributed office. You can add new employee’s workplace in virtually no time or relocate the office with no need of sophisticated logistics. Your office IT infrastructure follows you wherever you go if you have Internet access.
OFFICES AND INDUSTRIAL SITES COMMUNICATION
VPN TUNNELS
VPN tunnel is a secure way to connect your local networks via Internet. In everyday usage you will have one local network with all your buildings and sites. All your traffic will be visible to you only and treated as local with Internet being only a carrier for encrypted data. ‘Inside the box’ there will be a moderately sophisticated system of hardware, software, settings and IPSec traffic encryption tunneled via Internet from one place to another. VPN tunneling is an optimal solution connecting facilities with good Internet connections. It will be much cheaper than using your own physical network infrastructure.

airMAX WIRELESS NETWORK FOR REMOTE LOCATIONS
If you opt for a full control over your network connections we can provide you a cost-effective AirMax wireless solution. AirMax is a Wi-Max spin-off with more effective range, timing and resources control. The network point-to-point range is up to 150km and can be extended by adding
more points. Unlike the VPN tunnels you use no third-party servers or connections. AirMax option is most effective when you have to connect remote sites, not covered by common Internet infrastructure.
REMOTE DESKTOP SERVICE CORPORATE WORKSTATIONS AND SERVERS
TECHNOLOGY EXPLAINED
RDP means that all data storage and software operation are taking place on server. Personal workstations act as input/output terminals only. The only tasks of workstations are keyboard+mouse input and screen output. So, they can have extremely low hardware configurations – no calculations are made on a client side. You can use ultra-cheap computers without HDD or even old outdated PC’s and have good speed and reliability. In the same time, you can use very demanding software that can be executed directly on a server that is powerful enough to launch it.
System upgrade also tend to be easy: all modifications are made on server, not affecting users workstations. Then comes the security, which is easily maintained.
All data and settings are stored on the server, so users cannot intentionally or unintentionally leak or damage them.

SOLUTIONS AND OFFERS
We offer you ready-made solutions based on RDS WTWare, with the supply of equipment, software, full server setup and deployment. Our company has its own successful experience in implementing such solutions at various scales for several corporate customers in Russia and Kazakhstan.
There are two options one of which will suit your needs:
If you need a large amount of similar workstations with the same settings and low server resource consumption you may use 'Terminal servers' option.
If you need personal configurations for various users you may choose VDI (virtual desktop infrastructure) option when server creates a virtual machine for every user (needs more system resources).
ACCESS CONTROL SYSTEMS AND CORPORATE CCTV DEVICES ARRAY
ACCESS CONTROL SYSTEM
A best way to organize and control your company facilities access is a card or biometric authorization, which works over corporate LAN. You can specify almost any access parameters: personal access rights, lists of allowed and disallowed locations, access time interval etc. All employees get their cards, fingerprints and IDs stored in the base, where their access level is specified. Using the personal access you can have working time accounting, facilities access logging and more internal security. Most important areas are usually fitted with isolated access control system, independent from main LAN.

CCTV DEVICES ARRAY
Access control works best with corporate CCTV, that can also be connected by corporate LAN and send notifications via Internet. Modern smart CCTV cameras and sensors not only record a timeline, but can recognize faces and car license plates and send an access and security commands. A clever CCTV will automatically adjust sensors and cameras if something important is detected. And if sensor will detect something unusual, cameras will adjust and alarm will be sent to remote security administrator.