Basic Offer

  1. HelpDesk

We provide support services for our clients – be it individual workstations or entire departments in the company. We help remotely or on-site at the customer and solve problems related to hardware, office or system software.
  1. Dedicated Servers

If the customer does not have his network and server equipment, we offer dedicated servers. These are physical servers for which the customer pays monthly. They are not the property of the customer. On the other hand, the customer does not have to worry about the equipment servicing, spare parts and other breakdowns that may occur. The client does not have to invest in server room infrastructure (cabinets, UPS etc.), network equipment (as long as it does not require very non-standard configurations and bandwidth). Dedicated servers come in two varieties:
  1. Unmanaged servers.

In this case, PUQ compiles the configuration selected by the customer and ensures correct operation of the equipment, Internet connection, power redundancy. The client independently deals with the administration of the operating system installed on the server as well as the installation and administration of all other software components. It is an ideal solution for a client who has an IT team, but does not have to deal with the preparation of Internet connections, appropriate technical conditions ensuring the proper operation of server and network equipment. It also does not have to provide redundancy of internet connections and power and invest in equipment.
  1. Managed Servers

In this scenario, PUQ compiles the hardware configuration selected by the customer, ensures correct operation of the equipment, Internet connections, and power redundancy. PUQ also deals with the administration of the operating system installed on the server as well as the installation, configuration and administration of all other software components previously defined by the client (online stores, CRM systems, accounting systems, VOIP e-mail systems, etc.). It is a solution for a client who does not have an IT team or, for other reasons, wants to relieve his team from dealing with specific elements of the company’s software and hardware infrastructure. The cost of a dedicated (unmanaged) server starts from PLN 180 net per month – the upper one is determined depending on the customer’s performance requirements. The cost of a managed dedicated server is determined individually on the basis of specific customer requirements. The elements affecting the price of this service include:
  • server hardware configuration
  • any additional costs with additional network hardware
  • throughputs required by the client to the internet
  • DDOS protection requirement
  • time required to administer the client’s software platform ..
  1. Migration of physical servers to virtual machines

When analyzing and optimizing existing IT solutions, it is often wise to migrate physical servers to virtual machines and separate services from specific hardware. We have extensive experience in migrating physical computers and servers to virtual machines.
  1. Virtualization

We specialize in server virtualization, which significantly reduces the costs of IT infrastructure and helps to better use the available resources.
  1. Web Hosting

Nowadays, hosting is the basis for any company that wants to appear on its market. Hosting takes into account such elements as maintaining the company’s website (from basic to advanced CMSs), e-commerce platforms (online stores) as well as maintaining e-mail boxes of company employees. Maintaining typical corporate websites and e-mails at very affordable prices, starting from PLN 450 per year. Customers use a very advanced web server and separate email servers where the anti-spam filter is implemented with artificial int eligibility algorithms that drastically reduce the level of spam ( new types of spam already pass through existing solutions without a problem – artificial intelligence is the future in this area ). Web hosting falls into two basic types: managed hosting and unmanaged hosting.
  1. Unmanaged Hosting

Unmanaged hosting is the most common type of hosting. In this case, the client gets access to the hosting platform of the hosting company and uploads the page himself (whether it is a basic business card or a CMS system such as WordPress). The client also creates e-mail accounts for his employees within the limits assigned by the service provider. When using this type of hosting, the client has to manage the website by himself, update CMS systems, create and restore a backup, and deal with securing the website against hackers.
  1. Managed Hosting

Managed hosting, on the other hand, guarantees the customer support in activities related to the management of the website and e-mail. And so the company providing such services uploads the website to the client and adjusts the hosting infrastructure to the client’s CMS requirements. It also updates CMS systems (such as wordpress and others) to ensure their most effective operation and to protect against possible hacking attempts. In case of errors of the company’s employees or due to hacking attempts, it restores the website and possibly e-mail accounts from backups ( in such cases, the company may even keep backups up to 3 months back ). Such an account also has much more resources (processor, memory and disk space), which can handle a much larger number of simultaneous visitors. The choice of the appropriate option for the client depends on the requirements for the level of security and support required from the hosting service provider and on whether the company has an IT department that is able to manage the website and protect it against hacker attacks.
  1. Private Cloud based on Proxmox / VMware / HyperV Clusters

If the customer’s key is the efficiency and failure-free operation of the infrastructure on which his IT systems are maintained. Private Cloud is a set of physical servers that are connected to each other in such a way that they form a set of computing servers and storage servers, ensuring the most important feature of this solution – full redundancy. Redundancy provides the client with the operation of his software infrastructure in the event of failure of one or more computing servers as well as one or more storage servers. The degree of redundancy directly depends on the budget that the customer is willing to spend on his infrastructure. The basic (cheapest) private cloud cluster consists of three physical servers and one storage server with offsite backup. Further scenarios assume a larger number of computing servers and storage servers. In the event of a hardware failure of one of the computing servers, its work is taken over by the other two computing servers. In this case, the cloud load cannot exceed 2/3 of the resources of the entire cloud cluster. In the event of a storage server failure (failure of 2 or more disks simultaneously) in the basic scenario, the servers are manually restored from backups, which are performed according to a predefined scenario. If the client decides to use two storage servers, the functions of the first failed storage server are taken over by the second (redundant) server. We specialize in designing a cluster or multiple clusters for the specific needs of a client, as well as building, implementing and full care of a private cloud solution. PUQ sp. Z o.o. ensures proper operation of all cluster components, i.e. computing servers, storage servers, router switches. The client, on the other hand, manages the software infrastructure. If the client also wants to transfer the administration of the software part, it is calculated depending on the systems and uptime requirements on the client’s side. The cheapest private cloud package starts at PLN 1699 net. It consists of 3 computing servers and one storage server with backup.
  1. Storage servers for storing large amounts of data

We specialize in providing solutions for securing and storing large amounts of data. We configure Storage servers tailored to specific customer needs in terms of large / small file transfer speed, IOPS, redundancy, de-duplication and many other parameters. We scale solutions from one to many servers in the CEPH technology. Currently, we use solutions with capacities reaching hundreds of terabytes.
  1. Ceph

Modern technology for secure data storage that can be freely scaled, achieving large data spaces, high performance and bandwidth as well as very high security.
  1. Synology

Very secure solution based on Synology software. We have extensive experience in the configuration and operation of such solutions as a space for backups, virtual machine disks or other solutions.
  1. FreeNAS

We have over 15 years of experience in operating the FreeNAS system based on the FreeBSD distribution, which is the only one outside of Solaris with fully correct and proven support for the ZFS file system
  1. Backups

Correct planning, creation and management of backup copies becomes critical to maintain the highest level of security. We have a separate infrastructure only for this task, consisting of separate servers and network elements – operating independently of the others and guaranteeing data recovery even after very serious damage to infrastructure elements.
  1. Design, construction, implementation, modernization and less maintenance of IT infrastructure

Every organization in the course of development needs an efficient infrastructure for information exchange and effective work that is subject to monitoring. We offer our many years of experience in designing and maintaining IT infrastructure in companies.
  1. Modernization, optimization and protection of the current IT infrastructure

Companies in Poland were often created from scratch and grew very quickly. We help such companies to organize and optimize their IT infrastructure in terms of security, failure-free operation and costs of subsequent maintenance. We create clear and effective security procedures and implement them in teams. We modernize the existing machine park, update individual elements or entire areas of the infrastructure so that it is ready to operate in a rapidly changing web environment.
  1. Configuration of network equipment – large networks

During planning or implementation works, there is a need to prepare a network infrastructure that is appropriate and optimally suited to the client.
  1. Switches

We configure, implement and manage switches from the basics of the L2 layer to advanced L3 configurations ( OSPF, VRRP, MPLS , etc)
  1. WI-FI on Ubiquiti UniFi

We implement, design and manage a wireless network based on Ubiquiti equipment. The Ubiquiti UniFi hardware and software complex allows you to build a seamless Wi-Fi network consisting of a large number of wireless points.
  1. Network protection by Wanguard

We have experience in implementing the Wanguard system. Wanguard is award-winning enterprise-class software that provides NOC, IT and security teams with the capabilities they need to effectively monitor and protect large WANs from massive DDOS attacks.
  1. Routers

We configure, implement and manage Routers (BGP, NAT, Firewall, VPN, VRRP, NAT)
  1. Combining multiple locations and offices into one network

  2. Caring for workstations

  1. Safe solutions for business – ready-made end-user services billed in the SaaS model (software as a service)

  2. CRM

CRM system for customer service management. Has a lead service with migration to clients along with all contact history, offering, invoicing (invoicing only with annual numbering) and reporting. The great strength of the solution is the support of the help desk and the integrated ticket system to handle customer requests. Strategic planning is enabled by the project management module with tasks, gant charts, and a KanBan board. Each client or employee can be billed hourly or for the entire project.
  1. Videoconference Rooms

In the age of Covid, this is a much needed solution. There are several solutions on the market that perform this task, but none of them can be fully branded, the client has no control over the data and is susceptible to data leaks or correlations. Especially the inability to fully secure a video conference is the final argument for which companies, aware of the consequences of data leakage, look for a solution dedicated only to them. The PUQ company met such customers and prepared an ideal solution that meets all these expectations. Videoconference rooms are a service where, in a safe and easy way (without the need to install any application), you are able to conduct a meeting for several, several dozen or even several hundred people at a time. It is a kind of virtual conference room in which anyone who knows the appropriate URL address of the room and possibly a password (depending on how the room is created by the moderator) has access. Lectures with sound and image can be conducted in the conference room and it is possible to present PDF, DOC or PPT documents. As a moderator, you can assign a vote to participants, you can give them the opportunity to conduct part of the presentation, you can use simple polls, conduct a public or private chat, and even give the application desktop from your own computer. There is also a “white board” available for participants, where they can, if allowed by the moderator, draw or add annotations to PDF / Word / PPT files. The system is linearly scalable and the number of people in one place at the conference is limited only by the server and the Internet connection. The service distinguishing features are:
  • No application required to run or attend meetings.
  • Convenient room management panel for administrator / teacher.
  • Possibility to completely brand the server with client logs, domain etc. – requires individual arrangements.
  • Completely safe when it comes to data leaks – the system is constantly updated, is secured with all certificates, has full encrypted transmission. Compared to Zoom or Microsoft Team – we do not analyze users in any way, we do not collect their personal data.
  • servers in Poland / Warsaw – We currently have our two data centers: in LIM center Mariott and S3 Annopol .
  • software based on the highest-class security standards. Encrypted communication, No data tracking / correlation – users can be completely anonymous, constant updating of the environment and the servers themselves
  • 24/7/365 continuous monitoring of servers and their parameters
  • because we have our own data centers and our own network infrastructure, we also provide special customer request solutions high availability, the so-called HA
Here are two simple videos in English showing the solution:
  1. Cloud – Nextcloud

Peace of mind through a sense of security Our solution will organize the current activities in the company and will allow you to protect one of its most important resources – data. What distinguishes our offer from other leading solutions is we restore the privacy of your data to you We offer an industry-leading local platform for content collaboration. The technology combines the convenience and ease of use of consumer-grade solutions such as Dropbox and Google Drive with business needs for security, privacy, and control.
Restoring IT control
As a solution provider, we put the customer in control of their data in the most literal and direct sense. Your data resides in our data center, on YOUR server managed by us, not somewhere in the cloud. The solution integrates powerful data exchange and communication control and monitoring capabilities, including unique file access and workflow control functions, extensive audit logs, precise sharing control, and more.
Security first
Security is the biggest concern for customers of other data storage mechanisms and our main competitive advantage. We offer a range of unique, innovative security technologies, from BruteForce attack protection to advanced server encryption and integrated end-to-end encryption on the client side with enterprise-grade key support and a wide range of security features.
  1. Email Servers – Zimbra

The innovative Zimbra e-mail is the ideal enterprise-class solution as an alternative to Microsoft Exchange e-mail on Microsoft Windows systems. This application is intended for companies looking for advanced corporate tools. With an improved web interface, Zimbra improves file management efficiency and allows you to intuitively manage messages and address books, including file sharing. The application also allows you to directly edit documents online . The user has an accessible application panel at his disposal, which includes, among others, a calendar wizard that allows for the optimal selection of time for group meetings, a task tab and a list of shared users of the organization. The client has a fully dedicated solution ensuring full data privacy, using the latest technologies and integration with many systems such as salesforce, MS exchange etc.
  1. Zabbix – IT network infrastructure monitoring

The Zabbix monitoring system we use allows you to monitor and track the status of various services in a computer network, servers and network devices. Thanks to active monitoring, we will know about the failure before our client is able to report it. Key Features:
  1. Distributed monitoring – up to several thousand nodes.
  2. Automatic device detection
  3. Central log monitoring
  4. Support for high-performance agents for almost all platforms
  5. Comprehensive response to events
  6. Support SNMP v1, 2, 3
Our services include infrastructure design and planning of its monitoring. We will install a monitoring system, configure it to a specific infrastructure and learn how to use it effectively. Our offer also includes preparation of individual scripts implementing specific but necessary functionalities to optimally use the advantages of monitoring. We can monitor the condition not only on the basis of the so-called “Ping”, but based on the analysis of logical j responses of specific services (client’s CRM operation, validity of certificates or other elements of hardware and software infrastructure.

Additional Offer

  1. Virtual Routers / BGP

We offer virtual routers based on the RouterOS CHR (Cloud Hosted Router) software from the manufacturer Mikrotik. The virtual router has the ability to expand the processor and the frame, along with the bandwidth of interfaces up to 10Gb. RouterOS CHR RouterOS system supports many services and protocols such as OSPF, BGP, VPLS / MPLS. Build an L2 site-to-site tunnel using an EOIP tunnel. Such connections are used to connect offices or branches over VPN. I will also add a GRE tunnel here, although it works in l3 and uses routing but works in the same way on a site-to-site basis. L3 level VPN connections in client-server technology such as PPTP, L2TP, SSTP, OpenVPN. Such connections are used both for connecting offices and for connecting remote employees. On the router, you can configure BGP to our routers and broadcast your own addressing.
  1. Access control system – ROGER, planning and implementation

We have experience in implementing monitoring and access control solutions in small and large companies up to several hundred people. The introduction of access control mechanisms not only greatly improves the security of the company and employees, but also has important consequences when it comes to the quick analysis of the working time of individual employees, determining the available zones in workplaces or the paths that can be followed by specific employees. In our solutions, we use the ROGER system that we know and know how to manage.
  1. Configuring and servicing the VOIP infrastructure

We have experience in configuring the VOIP infrastructure. We configure IVR, user groups, extensions, call recordings, and configuration of telephone sets for the client’s needs.