AGIX Linux Cybersecurity

Cybersecurity is a priority for networks and organizations, especially in industries that handle sensitive information. The certified Linux cybersecurity experts at AGIX are trusted professionals when it comes to keeping networks and systems safe from harm. Whether you need to protect sensitive information from outside interference or just keep hackers out of your network, AGIX has the experience that can help.

Security Experts That You Can Trust

AGIX’s professional team has the experience that you can count on when it comes to cybersecurity. Having worked with organizations in high-security industries such as Defence and Finance, we understand the intricacies of keeping information secure from an unexpected attack. With our years of experience, we can be trusted with the most sensitive information in your network.

We Take Cybersecurity Seriously

Our experienced professionals at AGIX are highly equipped to handle every aspect of cybersecurity. Working with sensitive information requires more than just careful planning and serious oversight; we also conduct extensive testing in every step of the way, and ensure that everything is up-to-date by our clients’ exacting standards. Consult with us and see why our clients trust us with even the most complex security concerns.

Contact our friendly team to get started.

All HowTo's Cyber-Security Linux Redhat, Fedora and CentOS Linux Ubuntu, Mint & Debian Linux Web Servers

GeoBlocking with Apache on CentOS and Ubuntu

This article describes how to protect your Apache web server by restricting which countries can access it. We’re using Apache on CentOS 7 but Ubuntu instructions are included and are very similar. I’ve given two examples; one on whitelisting everything except what we want to block, and blacklisting everything except

Read more
All HowTo's Cyber-Security pfSense & Netgate

Configure HAProxy on pfSense with LetsEncrypt (SSL/HTTPS Termination)

This article demonstrates how to configure HAProxy to use LetsEncrypt to automatically manage certificates ensuring that those on the Internet accessing servers behind your HAProxy are protected with SSL security. Here’s some important points before we get started: We’re using a Netgate pfSense firewall appliance in this example but pfSense

Read more
All HowTo's Cyber-Security Linux Redhat, Fedora and CentOS Linux

Installing the Tsunami Vulnerability Scanner on Fedora / CentOS 8

This article demonstrates how to install the new Tsunami vulnerability scanner on a Redhat-like machine such as Fedora or CentOS 8 and how to use it including an example script to scan multiple targets or subnets. Install Java: yum install java-*-openjdk-devel Download the Tsunami ZIP from here: Extract the

Read more