What we do?

Home »  What we do?

Our services


  • Cerber Technology Inc. provides sophisticated e-business systems and services that enable corporations to implement business strategies and develop corporate assets using best of breed technologies, development methodologies, and best practices.
  • Whether your requirements are for application development, enterprise architecture, or project consultation, Cerber Technology Inc.‘s members can take on all phases of your project or step in for specific assignments that need our business or technical expertise.
  • Cerber Technology Inc. consultants understand hackers and other security professionals. But that’s not enough. We go further and work with you to understand the fundamentals of your business. As we see it, effective security demands a solid understanding of your business. Security designed in a vacuum from an ad hoc collection of poorly implemented technologies simply does not work. We develop security solutions that add value and meet your needs, not solutions that introduce overhead and disappoint you.

Cerber Technology Inc.‘s provides consulting in any of the following areas of expertise:


  • Object Oriented Design 
  • Java technologies 
  • UML (Rational Rose) 
  • RUP and Extreme Programming (XP)
  • Object Design Patterns and J2EE patterns 
  • Web Application technologies 
  • Web development,  graphics and design
  • Perl, Visual Basic 


  • Network Architecture Design
  • Network support and troubleshooting
  • LAN/WAN  planning, design and deployment 
  • Remote network monitoring and administration
  • Windows NT/2000/XP support, troubleshooting and tuning 
  • Unix support, troubleshooting and tuning
  • Microsoft Internet Information Server (IIS)
  • Web Portal design and implementation
  • Messaging and collaborating systems
  • Help desk support
  • Cabling, level 5e certification


  • Public Key Infrastructure (PKI) 
  • Firewalls and VPN 
  • Security system evaluation, design & audit
  • Penetration testing
  • Vulnerability analysis
  • Antiviruses
  • Windows/Unix security hardening
  • Access Control Applications: Netegrity SiteMinder and IBM Tivoli Access Manager 
  • IT Security policies, standards and procedures
  • LDAP Directory Service design and implementation
  • SAP security
  • Service Level Agreements
  • File-encryption (EFS)
  • Backup and Recovery 

Our consultants provide services also in the following areas:

  • Project Management
  • Documentation

Call us today for a free initial consultation !


Click here to find out in which tools and technologies we are providing consulting services.

BOOKS !!!!  Click here to see a list of books that our consultants recommend