IT Services and Security
Maintain - Install - Upgrade
New installs, upgrades and repair of existing equipment
- Hardware/software installation
- Server setup and deployment
- Upgrade existing hardware/software
- Backup and restore data (onsite & offsite)
- Virus/Spyware/Malware detection and removal
- Spam filtering services
- Product procurement
Interconnecting devices wired or wireless
- Configure and deploy scalable networks
- Cabling (also cable cleanup)
- Installation of network equipment
- Wireless planning and implementation
- Server room design (AC, fire suppression, etc.)
Providing high end services
- Cloud Migration
- VOIP/Telephony installation/maintenance
- Virtualization (VMware, Hyper-V, Nutanix, etc.)
- Disaster Preparation/Recovery
- Large scale software deployments
- Audio/Visual integration for boardrooms or entertainment
- Compliances (PCL, SOX, etc.)
Cloud Migration and Maintenance
Cloud and Local Backup
Our experience working with some big players in the financial industry have allowed us to learn and deploy the most secure networks and continually adapt and be proactive, not reactive, to any threats
Secondary only to security, backups are a vital aspect of any companies ongoing security and availability.
Hiloma's Backup architecture is is optimized for ultra fast data transfer, and cloud storage is included in your price.
Physical and virtual server backup
Backup for Microsoft 365
Faster backups and restores
Bare metal recovery
Archiving at no extra charge
Choose the location where you would like your data stored in secure/compliant datacenters.
Certifications (Canada) - HIPAA, ISO27001, NIST 800-53, PCI DSS, SOC 1 Type II, SOC 2 TYPE II
AES 256-bit encryption
Encrypted on-site, then transferred over one-way TLS 1.2 connections and stored encrypted in the certified datacenter.
Backup data is only decrypted during a recovery at the business site
Our Core Values
How vulnerable are you? Most companies do not ask this question until it's too late. We can test both your physical and network security and provide a detailed report of the vulnerabilities encountered.
Types of testing - Below you will see our individual services that we offer. Many of these services should be used in conjunction with the others in order to have a true sense of your security vulnerabilities. Once completed we will provide a detailed report of the security vulnerabilities and an action plan on how to resolve these issues.
Why should you worry about penetration testing?
-Security breaches and service interruptions are costly
-It is impossible to safeguard all information, all the time
-Penetration testing identifies and prioritizes security risks
A penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-users’ adherence to security policies.
Application Security Testing
Application Penetration Testing services will perform tests on your custom web applications as well as standard applications like antivirus, embedded applications, games, and other system applications against any potential vulnerabilities.
Using ethical hacking techniques, we simulate real world attacks to demonstrate how vulnerabilities can be exploited to compromise your systems and confidential data.
Social Engineering Testing
As secure as your network may be, the weakest link is often the users. With the amount of personal information available on the internet it's never been easier to find vulnerabilities within the users themselves.
For many companies, employees are often overlooked as a potential threat to company security, not realizing that a skilled social engineering attack could compromise the entire organization. Even the best network and systems security will not prevent an attack directed at your employees. Malicious hackers can be extremely effective at coercing people to break their normal security procedures and divulge confidential/critical information.
Wireless Penetration Testing
We offer a wide range of Wireless Penetration Testing services, from security tests of standard corporate Wi-Fi networks to assessments of specialized wireless solutions.
For corporate Wi-Fi deployments, we identify wireless exposures using techniques including information gathering, traffic sniffing, and authentication bypassing. We also offer custom research services and security evaluations for technologies including wireless IPS, wireless payment devices, and other solutions.
Source Code Audits
During a Source Code Security Audit, our experts manually inspect the source code of your new or existing application for security weaknesses. This service includes:
Review of authentication, authorization, session and communication mechanisms
Identification of programming-related issues such as buffer overflows
Identification of input and output related vulnerabilities
Review of third-party libraries
Security validation of cryptographic functions and routines
Physical Breach Testing
Sometimes data is only as secure as the location it's being stored at. We use ethical means to test the physical security of a location.
This is done in many ways and can be conducted at different periods to identify the weakest security spots.
This in conjunction with our other services, such as social engineering testing, can provide a very comprehensive idea of the main vulnerabilities of your location(s).
Whether your company needs to update outdated software or to build an application to help drive your business into the future, Hiloma is able to understand and work with you in order to develop what's right for your organization.
With decades of experience working with the medical and financial industries, we have been able to help clients become more productive and increase overall workflow by using our programming experience
Behind every successful company there most likely lies a Linux server performing critical tasks to allow your company to run at its highest efficiency.
Depending on the infrastructure and needs of the client, choosing a platform becomes crucial in the decision making. Linux based platforms are a great alternative and can help in providing a cost effective, yet powerful solution. Hiloma can leverage the flexibility and scalability of this platform and integrate it within your existing network.
Databases can able to leverage the large amount of information, an organization has to process. Whether it be MySQL, MsSQL, PostgreSQL, we have the ability to design, deploy, maintain, and recover to solution that will handle your sensitive information.
Many crucial applications rely heavily on databases to read and write information. Proper structure and maintenance are key to keeping a healthy database. We at Hiloma strive to make sure that your companies information is safe, fast, and reliable.