Cybersecurity Supporting Business Objectives
- Comprehensive Cybersecurity Solutions
- Specialized Linux, Windows & Firewall Support
- Proven IT Expertise Since 2008
Recent Articles
Windows NXLog to Graylog
This article explains how to send logs from a Windows system to Graylog using NXLog on the Windows system. We're
Apache Example Configuration for GeoIP Fencing, SSL/TLS Termination, and Reverse Proxy
This article shows an example configuration that will achieve three objectives: Provide GeoIP Fending, Provide SSL/TLS Termination, and server as
NXLog Example Configuration File – Sending Logs From Windows to Syslog in JSON Format
This article explains how to send logs from Windows systems to Syslog servers using NXLog (community edition). In this case
Comparing Syslog Formats – BSD RFC3164 vs IETF RFC5424
This article compares the two Syslog formats. If you can't decide, consider "IETF RFC 5424". This article compares two log
Running LogStash in Docker
This is a short HowTo for running LogStash in Docker. We're using Ubuntu 22.04. Install Docker and create our directory
Android VPN (Always On) with pfSense
This article shows the settings on the pfSense and Android device for the always on IPSec VPN. The best article
Cybersecurity & Guidance
Enhance Your Cybersecurity with AGIX: We understand the critical importance of robust cybersecurity and compliance. Our advanced server hardening services ensure you meet standards like the Essential 8 and ISM. AGIX can help.
- Guidance, Gap Analysis & Assessments.
- Penetration Testing & Vulnerability Assessments.
Linux System Administration
Your Linux Support Specialist: AGIX offers comprehensive Linux support for Ubuntu, Redhat, server automation, web, file, and database servers. Our expertise spans a wide range of Linux applications and cloud environments like AWS, crucial for modern business operations.
- Power your critical work-loads with Linux.
- Automate with Ansible and Terraform.
- Safeguard sensitive data with server hardening.
- Embrace databases clustering for high-availability.
Case Studies
pfSense in the Cloud with Unifi at the Sites
Case Study - Using pfSense in the cloud while using Unifi at multiple sites around the world Our client had Unifi gear at each site around the world - about
Replacing Firewalls in a Large Medical Corporation
Case Study - Replacing Firewalls in a Large Medical Corporation, and building a large site-to-site VPN with remote-access A client we've worked with for a few years decided to move
High Performance Health Services Database
Case Study - Boosting performance of a customer management system and hardening systems to improve the cybersecurity posture. A client recently approached us looking for a way to improve the