Cybersecurity Supporting Business Objectives

  • Comprehensive Cybersecurity Solutions
  • Specialized Linux, Windows & Firewall Support
  • Proven IT Expertise Since 2008
vlack_vuln_header-agix-logo

Recent Articles

Windows NXLog to Graylog

This article explains how to send logs from a Windows system to Graylog using NXLog on the Windows system. We're

Apache Example Configuration for GeoIP Fencing, SSL/TLS Termination, and Reverse Proxy

This article shows an example configuration that will achieve three objectives: Provide GeoIP Fending, Provide SSL/TLS Termination, and server as

NXLog Example Configuration File – Sending Logs From Windows to Syslog in JSON Format

This article explains how to send logs from Windows systems to Syslog servers using NXLog (community edition). In this case

Comparing Syslog Formats – BSD RFC3164 vs IETF RFC5424

This article compares the two Syslog formats. If you can't decide, consider "IETF RFC 5424". This article compares two log

Running LogStash in Docker

This is a short HowTo for running LogStash in Docker. We're using Ubuntu 22.04. Install Docker and create our directory

Android VPN (Always On) with pfSense

This article shows the settings on the pfSense and Android device for the always on IPSec VPN. The best article

Cybersecurity & Guidance

Enhance Your Cybersecurity with AGIX: We understand the critical importance of robust cybersecurity and compliance. Our advanced server hardening services ensure you meet standards like the Essential 8 and ISM. AGIX can help.

  • Guidance, Gap Analysis & Assessments.
  • Penetration Testing & Vulnerability Assessments.

Linux System Administration

Your Linux Support Specialist: AGIX offers comprehensive Linux support for Ubuntu, Redhat, server automation, web, file, and database servers. Our expertise spans a wide range of Linux applications and cloud environments like AWS, crucial for modern business operations.

  • Power your critical work-loads with Linux.
  • Automate with Ansible and Terraform.
  • Safeguard sensitive data with server hardening.
  • Embrace databases clustering for high-availability.

Case Studies

pfSense in the Cloud with Unifi at the Sites

Case Study - Using pfSense in the cloud while using Unifi at multiple sites around the world Our client had Unifi gear at each site around the world - about

Replacing Firewalls in a Large Medical Corporation

Case Study - Replacing Firewalls in a Large Medical Corporation, and building a large site-to-site VPN with remote-access A client we've worked with for a few years decided to move

High Performance Health Services Database

Case Study - Boosting performance of a customer management system and hardening systems to improve the cybersecurity posture. A client recently approached us looking for a way to improve the