ELECTRICAL ENGINEERING
Our engineering team provides you with professional support in setting up your network and energy structure. Building automation, installation of network infrastructure and security technology from trade professionals:
Network installation work, construction and upgrading of server rooms
Capacity planning of your data center power supply, planning of failure scenarios
access control systems
time recording systems
camera surveillance
Installation and programming of bus systems and components for building automation (SmartHome)
SMART CITY
We not only connect people, but also cities, regions and data. The complexity of life in cities and communities is increasing rapidly: Society, business, politics and administration place high demands on a functioning coexistence. The solution to this are Smart City concepts, which achieve efficiency, comfort and sustainability through organizational and technology-based innovations. We support and accompany you in both municipal and rural areas in the development and implementation of Smart City measures. Our partner Ruckus also supports us effectively and sustainably on the subject of Smart City.
MANAGEMENT
Our network management monitoring is used to monitor, maintain and provide computer networks. It helps you to monitor the bandwidth, availability, performance and hardware of your network. It is often the network monitoring as a whole or a specific network analysis or support for your detailed network diagnosis.
PRODUCT DEVELOPMENT
We offer individual and tailor-made solutions for manufacturers of software and hardware solutions at.
It doesn't matter whether it's for 100 or 100,000,000 users/connections - please do not hesitate to contact us.
ENDPOINT SECURITY
With endpoint security, we offer a solution for protecting computer networks that are remotely connected to client devices. The connections of laptops, tablets, cell phones and other wireless devices to corporate networks create potential avenues of attack for security threats.
In addition to protecting your organization's endpoints from potential threats, endpoint security allows IT administrators to oversee operational functions and data protection strategies.
CLOUD SERVICE
The popular use of the cloud brings new requirements for all companies. The cloud is a computing model that can enable servers, networks, storage, development tools, and even applications over the Internet. There is no need to make large investments in purchasing equipment, training employees, and performing routine maintenance.
Cloud service providers can meet some or all of these requirements. We want to make technology an integral part of your business transformation and offer you the greatest possible value. Through our partners AWS Cloud Network and Microsoft Cloud Solution Provider we can offer you additional professional solutions.
VOIP (PHONE SOLUTIONS)
Voice-over-IP refers to the transmission of voice data over the Internet instead of using classic telephone networks. The two main arguments for using Voice over IP technology are the potential for cost savings and new services that can add value compared to traditional phones.
With our own server systems, your data and applications are securely hosted in the cloud. This allows you to access the new communication platform quickly and easily without having to install complex software or hardware. We offer a variety of resources to help you learn more about IP telephony and its features.
As a registered partner with the Federal Network Agency, we have the opportunity to set up and implement complex systems.
VIRTUALIZATION AND
CLOUD DESKTOP
Build, manage and operate applications across clouds with consistent infrastructure and operations. Instead of working on their own hardware, employees dial into a virtual computer in your cloud via remote desktop. This remote computer has everything you need: Office, teams, company software and access to company data in your own network - it can be as simple as that be modern work.
This enables you to utilize the full capacity of a single physical machine by distributing its functions across many users and environments.
CLIENT ROLLOUT
AND MANAGEMENT
IT hardware and the quality and efficiency of IT services have a significant impact on a company's value creation. However, as IT systems become more complex, so do the costs and human resources in this area.
We connect organizations around the world so people everywhere can make a difference. Spend less time patching and updating computers manually and more time solving user problems.
LINUX/UNIX
As a specialist, RouterWerk offers a comprehensive service for LINUX and UNIX systems. RouterWerk's Linux/Unix skills include experience with all major Linux server distributions as well as Solaris Unix.
ACCESS SECURITY /
IDENTITY MANAGEMENT
With us you optimize user-friendliness and data protection. Leverage social login integration and reduce user hassles. Integrate comprehensive user profiling and facilitate more transactions. Automatically create user accounts, visualize permissions, and engage data owners in all critical steps of the workflow. Confusing and risky authorization structures are a thing of the past.
Electronic access control for company rooms in connection with smart cards or RFID tokens
Certificate authentication on the computer, use of a certificate for computer access and e-mail signing/encryption (hardware token and PIN instead of weak passwords)
Authentication to Single Sign On solutions
IOT (INTERNET OF THINGS)
We realize with you quickly and uncomplicated the most modern IoT applications. Routerwerk has meanwhile completed numerous IoT projects and derived four areas of action: transparency, automation, prediction and new business models. The "Internet of Things" provides an additional basis for the development of new business models that connect the physical world with the digital world. For many companies, this offers the opportunity to rethink the existing company philosophy, since the possible uses of these solutions are comprehensive and diverse.
NETWORK SECURITY
Firewalling: Conception and implementation of securing your network borders. We advise you on the choice of the ideal firewall solution to suit your security and network throughput requirements.
App ID (Layer 7) based firewall setup: configuration of the firewalling by means of application recognition independent of the ports used.
Policy Based Firewalling: Formulation of firewall rules for user groups.
SSL decryption and inspection: Inspection of threats within encrypted connections; Configuration of exceptions for your accounting (banking) and business administration.
URL filtering: Control at the network proxy which user group can access which URLs; Avoiding circumventing the company security structure by using anonymizing proxies or webmail services (realization in combination with AppID).
Thread Prevention: Detection of virus malware in downloads on the firewall, detection of spyware and botnets.
VPN: Integration with RouterWerk Managed Connect, Palo Alto GlobalProtect, IPSec
High-availability: Failover setup active/active, active/passive.
Your firewall is the most important organ of your platform. We design hybrid setups of open source components with commercial manufacturers for maximum network security. RouterWerk is a Palo Alto Networks and Fortinet partner and secures your network with the most advanced and stable Next Generation Firewall.
IPv4 and IPv6 firewalling
Integration of RouterWerk Managed Connect, IPSec, OpenVPN
quality of service
Multipath routing configuration (routing across multiple uplinks)
Implementation of open source IDS systems
Configuration of honeypots
Network access control using 802.1X in the LAN and WLAN
NETWORK SOLUTIONS
Together with our manufacturers, we offer unlimited communication via e-mail, video or telephone with our network solutions. We ensure the smooth exchange of data and permanent access to the company network at all times.
A stable, fast and secure network is essential for business processes to function smoothly. We support you from the conception to the implementation of LAN and WLAN networks for your company.
CAMERAS
(VIDEO SURVEILLANCE)
We develop and implement monitoring concepts and advise you on the right technology and application.
With professional tools we visualize and calculate the right solution for business or private. Rely on our competence and experience from many years of safety technology.
As an IT system house, we provide automated recognition options and database solutions (thermal cameras, license plate recognition, face recognition, etc.)
IP cameras
WiFi cameras
taking photos
Film
Monitor
SERVER AND CLIENT
HARDWARE
The basis of a modern, stable and efficient IT installation is of course only the most modern devices and systems tailored to your needs.
Rely on our experience and competence in the selection and configuration of your server and client hardware.
PROVIDER
RouterWerk's core mission is the design and implementation of future-oriented network solutions for industry, trade and the private sector as an independent providers. By combining information technology, computer science and electrical engineering, we manage the smooth transition between craftsmanship and high-tech.
You can host all the services you need directly and securely at RouterWerk or our full service from partner providers.
WIFI SOLUTIONS
RouterWerk analyzes the entire architecture of the site to understand the best possible location of the access points and eliminate possible electronic interference signals. After a comprehensive analysis and subsequent consultation, as a customer you know exactly how many access points you need in your system and how these can be implemented most efficiently.
Of course, we accompany you in maintenance, switching and the external connections of your individual solution.