press to zoom

press to zoom


Information Systems

Communication Networks

Computing Infrastructure

Cabling Infrastructure



Telephony Systems

Low Voltage Systems




Data Centres

Command / Control Centres

Homeland Security

Information Security


Monitor and Control

Business intelligence (BI) systems constitute a management tool that supports decision making in organizations. DOR specializes in providing modeling and data analysis solutions using Microsoft Power BI on all databases as well as other data sources, whether within the organization or on the cloud, while presenting a unified monitor and ability to compile reports at various cross sections.

ForeScout CounterACT for Network Access Control (NAC) is an automated security control platform that lets you see, monitor, and control everything on your network—all devices, all operating systems, all applications, all users. ForeScout CounterACT lets employees, contractors, and guests remain productive on your network while you protect critical network resources and sensitive data. DOR is a reseller and an integrator of CounterACT, we have extensive experience in configuring and best fitting the product to our customer needs.

Business Intelligence

ForeScout NAC

Cloud computing is designed to streamline and simplify the use of technology, as a tool for performing the organization’s activity. Use of cloud computing enables the utilization of computing, networking, data storage, information security, and various systems solutions, as either/or Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS) configurations.

In the realm of our expanding electronic world, cyber security is probably one of the most critical and important issues. The increasing security threats, both internal and external, requires organisations to seek for protection for the computing and communication networks in order to ensure business continuity. Exposure to threats from hostile sources include industrial spying, malware and viruses, denial of service, phishing, impersonation etc. DOR specialises in identifying threats and in providing a "tailored security suit" by designing the most appropriate solution with regards to the vulnerabilities found.

Cyber Security

Cloud Computing

System Analysis & Design

​Integration & Deployment

Project Management


Market Research