Our end-to-end services portfolio delivers highly efficient Industrial Telecommunications solutions to ensure voice, video and data infrastructure are well integrated and highly available. Our objective is to guarantee that control and command centers, data centers, central offices, cell towers, network operations centers, cyber security centers, outside plant and customer premise facilities systems running 24 hours, while significantly reducing your operating costs. Our services portfolio includes consulting, design, development, operation and maintenance:

Network Design:

we provide services for:

  • Architecture specification and design for voice, data, audio, and video networks
  • Hardware requirements specification
  • Analysis of vendor cabling proposals
  • Inspection and testing of cabling systems
  • Inspection and testing of systems redundancy

RF Engineering:

we provide detailed interference and intermodulation studies for proposed antenna sites to determine the potential for interfering with co-located third parties, or to determine vertical or horizontal space considerations to maximize use of structure space.

Power supplies:

wwe also provide design, implementation and maintenance services for power supplies for radio towers such as solar panels and diesel generators. We also offer an off-the-shelf remote monitoring solutions helping engineers predict and quickly address maintenance and downtime issues for these power supply equipment and thus ensuring high system availability. These solutions are built on top of our operational intelligence platform: KnowledgeNet.

We serve customers in several industries such as:

  • Oil and Gas
  • Military
  • Government
  • Utilities
  • Transportation
  • Maritime

Implementation Services

  • Design new security goals and policy
  • Design new network architectures compliant with security requirements and standards (network segregation, DMZ, restricted access, firewalls deployment, etc.)
  • Recommend and develop relevant technology for secure IT-OT integration and protect and secure your critical infrastructure in compliance with the latest cybersecurity guidelines ISA/IEC 62443 and best practices such as:
    • Limited open ports to establish communications
    • Data encryption
    • User authentication
    • Traceability
    • Protocol break
  • Define procedures such as password protection, patch management, users accounts management, system hardening, backup and recovery procedures, compliant with standards and best practices
Drag View Close play