



Services
Expertise
Information Systems
Communication Networks
Computing Infrastructure
Cabling Infrastructure
VOIP / ROIP
Telephony Systems
Low Voltage Systems
Simulators
Multimedia
Data Centres
Command / Control Centres
Homeland Security
Information Security
Monitor and Control
Business intelligence (BI) systems constitute a management tool that supports decision making in organizations. DOR specializes in providing modeling and data analysis solutions using Microsoft Power BI on all databases as well as other data sources, whether within the organization or on the cloud, while presenting a unified monitor and ability to compile reports at various cross sections.
ForeScout CounterACT for Network Access Control (NAC) is an automated security control platform that lets you see, monitor, and control everything on your network—all devices, all operating systems, all applications, all users. ForeScout CounterACT lets employees, contractors, and guests remain productive on your network while you protect critical network resources and sensitive data. DOR is a reseller and an integrator of CounterACT, we have extensive experience in configuring and best fitting the product to our customer needs.
Business Intelligence
ForeScout NAC

Cloud computing is designed to streamline and simplify the use of technology, as a tool for performing the organization’s activity. Use of cloud computing enables the utilization of computing, networking, data storage, information security, and various systems solutions, as either/or Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS) configurations.
In the realm of our expanding electronic world, cyber security is probably one of the most critical and important issues. The increasing security threats, both internal and external, requires organisations to seek for protection for the computing and communication networks in order to ensure business continuity. Exposure to threats from hostile sources include industrial spying, malware and viruses, denial of service, phishing, impersonation etc. DOR specialises in identifying threats and in providing a "tailored security suit" by designing the most appropriate solution with regards to the vulnerabilities found.


Cyber Security
Cloud Computing

System Analysis & Design
Integration & Deployment
Project Management
Consulting
Market Research
Outsourcing