Services

Everything we build must work in production. Every service is delivered with concrete technology choices, realistic timelines, and complete documentation.

IT Infrastructure

We plan and build server, storage, and virtualization environments sized for actual production workloads — not theoretical peaks. That means realistic capacity planning, a well-structured rack layout, organized cabling, and a proper technical handover so your team can take things forward with confidence.

What we deliver

  • Server and storage systems matched to load requirements, redundancy, and future growth
  • Virtualization with VMware vSphere, Proxmox VE, or — where appropriate — Hyper-V
  • Structured cabling and physical rack infrastructure
  • UPS solutions for power failure protection and controlled shutdown
  • Capacity expansion and migration of existing environments
  • Technical documentation, asset inventory, and acceptance protocol

Typical starting point

Hardware that can no longer meet current demands. Growth that has outpaced the existing setup. Or a location that needs to be built from the ground up or cleanly expanded.

What you walk away with

A fully documented IT infrastructure with clear structure, traceable configurations, and an environment that runs reliably in production and can be extended later without guesswork.

Discuss your infrastructure project
Server racks in a professional data center

Network & IT Security

A stable network is the foundation for everything else. We design LAN, WLAN, and multi-site networks so that access is controlled, areas are cleanly segmented, and critical systems are properly protected. Security is built into the architecture from the start — not added as an afterthought.

What we deliver

  • LAN and WLAN design for business environments
  • Firewall implementation with clear, auditable rule sets
  • VLAN segmentation and access control across different zones and systems
  • VPN connectivity for remote access and remote sites
  • User and access management with Microsoft Entra ID
  • Endpoint protection for clients and servers — for example with Microsoft Defender or ESET
  • Vulnerability assessment, hardening, and improvement of existing networks

Typical starting point

Networks that have grown organically over the years and lost any clear structure. New locations that need to be securely connected. Or requirements around controlled remote access, clean permission rules, and better protection for clients and servers.

What you walk away with

A transparent network structure with documented topology, clear access rules, and an environment that can be securely operated and sensibly managed going forward.

Discuss your network project
Structured network cabling in a patch panel

Cloud & Backup

A backup that has never been tested is worthless when it matters most. We build backup and cloud architectures that are documented, verifiable, and actually suitable for daily operations — including local backup solutions, hybrid setups, and Microsoft 365-, Azure-, and Veeam-based concepts.

What we deliver

  • Backup strategies following the 3-2-1 principle
  • Veeam Backup & Replication for virtual and physical environments
  • Backup coverage for servers, workloads, and Microsoft 365
  • Microsoft 365 and Azure: rollout, migration, and ongoing management
  • Hybrid models combining on-premises infrastructure with cloud services
  • Disaster recovery planning with documented restore tests
  • Role-based access control and clean admin structures in cloud environments

Typical starting point

Critical data with no structured backup in place. Cloud services that were introduced but are poorly managed day-to-day. Or a desire to move parts of the IT estate into a cloud or hybrid model without disrupting ongoing operations.

What you walk away with

A documented backup and cloud concept with a verified restore test, clear ownership, and a structure your team can operate independently.

Discuss cloud & backup
Storage systems for cloud and backup infrastructure

Monitoring & Maintenance

Systems shouldn't only get attention after something fails. We support organizations with ongoing monitoring, maintenance, and technical care for servers, networks, backup environments, and core IT components. Scope and response procedures are defined clearly — whether project-based or through an ongoing agreement.

What we deliver

  • Monitoring of servers, networks, and central IT systems
  • Regular maintenance of existing IT environments
  • Update and patch management within an agreed scope
  • Monitoring of backup jobs, alerts, and critical system events
  • Device management and policy enforcement with Microsoft Intune
  • Remote support, technical root cause analysis, and traceable change documentation

Typical starting point

Systems that run day-to-day but are never proactively checked. Alerts that go unnoticed. Updates applied irregularly. Or simply no clear technical ownership for existing server, network, and backup environments.

What you walk away with

A monitored and properly maintained IT environment with defined responsibilities, regular checks, and a foundation that helps you catch problems earlier and avoid unplanned downtime.

Discuss monitoring & maintenance
Server and storage infrastructure under continuous monitoring and technical maintenance

System Integration

Disconnected systems create duplicate data entry, manual workarounds, and errors that are hard to trace. We identify where the gaps are and connect applications, platforms, and infrastructure components so that data flows are cleaner and workflows are easier to follow.

What we deliver

  • Integration of ERP, CRM, and communication systems
  • Connecting cloud and on-premises environments
  • API-based connectivity between existing applications
  • VoIP integration into existing network and communication infrastructure
  • Consolidation and restructuring of grown IT landscapes
  • Technical documentation of interfaces and data flows

Typical starting point

Systems running in parallel that don't exchange data cleanly. New applications that need to fit into an existing environment. Or process breaks that slow operations down and introduce unnecessary errors.

What you walk away with

A technical description of all integrated systems, interfaces, and data flows — structured so your team can extend things later without having to reverse-engineer how it all works.

Discuss your integration project
Connected network and system components in an IT environment

Video Surveillance & Access Control

Video surveillance and access control shouldn't operate in isolation from the rest of your IT. We design systems so that cameras, recording, permissions, and access points are properly integrated into the existing network and IT environment from the outset.

What we deliver

  • IP camera systems and video surveillance
  • NVR solutions with structured storage and access concepts
  • Access control for doors, offices, and defined areas
  • User and permission management for access control systems
  • Secured remote access for authorized users
  • Cabling, installation, and on-site commissioning

Typical starting point

Sites with no surveillance or no controlled access that need to be retrofitted. Existing systems that have become technically unmanageable. Or requirements around centrally managing multiple cameras and access points.

What you walk away with

A documented video surveillance and access control system with defined permissions, clean integration, and a setup that works reliably in day-to-day use.

Discuss CCTV & access control
Professional IP surveillance camera on a building

On-Premises AI Solutions

Not every AI use case belongs in the cloud. We develop and deploy local AI solutions for businesses and public institutions, enabling sensitive data and documents to be processed entirely within your own infrastructure. That keeps your information in-house, access under control, and your workflows independent of external cloud services.

What we deliver

  • Planning and deployment of local AI solutions within existing IT environments
  • Analysis and processing of sensitive data and documents inside your own infrastructure
  • Automated document review, classification, and summarization
  • AI-driven forecasting, reporting, and decision support
  • Automation of recurring tasks and manual process steps
  • Integration with existing systems, data sources, and workflows
  • Technical documentation and structured handover of the solution

Typical starting point

Sensitive data that cannot be sent to an external cloud for privacy or security reasons. A need to speed up processes, handle documents more efficiently, or automate repetitive tasks — but without a solution that fits your own infrastructure and stays manageable over time.

What you walk away with

A locally operated AI solution that fits into your existing environment, processes sensitive data within your own infrastructure, and delivers tangible day-to-day benefits — whether in document analysis, reporting, forecasting, or workflow automation.

Discuss your AI project
On-premises AI solution running on a laptop with visualized document, search, and analysis features for sensitive data

Managing the project remotely?

Many of our clients oversee projects in Syria from a distance — as IT directors, project managers, or external partners. For this setup, we work with defined milestones, written status reports, and documentation that can be used without follow-up questions.

If you'd like to understand how we would approach a specific project, get in touch directly.

Request an initial consultation

Have a specific project or open questions?

Give us a brief overview of your situation. We'll follow up with an initial technical assessment.

Discuss your project