25 Years of experience categorized in four different service areas to make IT simple 4 you.

Identity & Access Management

The “Right Person” with the “Right Authorization” at the “Right Time” in the “Right Business Application”. Increase IT security with our approach to the integration of an Identity & Access Management (IAM) solution and relieve your IT and specialized departments with a modular IAM environment adapted to your company. The development of IAM requires a holistic approach that should consider work processes…

identity and access management

25 Years of experience categorized in four different service areas to make IT simple 4 you.

Software Development

We believe there is no impossible in the world of information technology. What made us believe that is our software development skills where we can make all the impossible possible and create software for every need. It does not matter if it is a mobile phone or a smartwatch, a laptop or a server; our team is ready to create flexible software for all platforms. It does not matter what your operating system is and what technology you use. Windows, Mac OS and the web can all be the right place for creating your desired software applications. We have focused on all the popular tools and frameworks to produce software applications with the highest global standards.

software development

Digital Transformation

In the era of digital world, you can only stay in competition with a successful digital strategy and derive the greatest benefit from the effects of digital transformation on products, processes, marketing and sales. It may get complicated at first as there is no uniform definition of digital transformation and also it may seem relative only to large companies or corporations, but with hiring a right consulting team you can simplify your digital transformation project and see how it actually offers any company the opportunity to extensively develop their competitive advantages.

digital transformation

IT Infrastructure & Workspace

Every software piece after the production process, must be delivered to users with essential standards. IT managers in organizations are responsible for managing workspaces and delivering enterprise software apps. And to manage users access to each software application, they need fully equipped on-premise or cloud data centers. We are by your side, from designing data center services to the stage of user management and proper delivery of services/apps to them. This way you can provide any software with any architecture to any user anywhere in the world, while having the best security and access management.

it Infrastructure and workspace

Solutions Services

  • Identity & Access Management
  • Digital Transformation
  • Software Development
  • IT Infrastructure & Workspace

 

  • Identity Management
  • Access Management
  • Security
 
  • Our Self-Service & Approval Management solution offers self-services that are available 24/7 and relieve the IT helpdesk. Integrated approval procedures, flexible workflows and automated implementation via interfaces reduce costs and unproductive times. Your users are always informed about the progress and decision-making processes as well as procurement guidelines are adhered to.
  • From joining the company to various change scenarios and finally leaving, a person needs the right access rights at the right time throughout the lifecycle of your company. Provision them automatically with ULM. User Life Cycle is a concept which describes the process flow of how the account of a user is created, modified, managed, and deleted based on certain events or time factors. User Lifecycle Management (ULM) is a strategic solution implementation which facilitates above-mentioned process.
  • Active Directory management (AD management) is the process of managing and monitoring the operations of the Active Directory service. It comprises a wide range of tasks, including setting up your domains and forests, keeping your AD organized and healthy, properly managing Group Policy, and ensuring business continuity with a comprehensive backup and recovery process.

  • Dealing with privileged user accounts or access rights poses special challenges for IT departments. Selective requirements for emergency access or technical administration must be flexibly supported and at the same time security and traceability must be guaranteed. Privileged Access Management for SAP, Active Directory or Windows Notebooks offers an effective and fast solution with self-services for temporary access. Generally Speaking, Privileged access management (PAM) consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes, and systems across an IT environment.
  • The departments are responsible for the access rights of their employees, but today they can usually only fulfil this responsibility to a limited extent. For this purpose, our Role-based Access Management solution provides a scalable solution approach. It offers an authorization catalog with comprehensible authorization objects that can be used directly in the department as well as a step model for role definition.
  • With our ARM solution, manage and audit user access to Active Directory, Azure Active Directory, Exchange, SharePoint, OneDrive, and File Servers. You could easily automate the provisioning and deprovisioning of users and quickly generate and deliver comprehensive user access reports required for regulatory compliance and audits. Thanks to this solution, you could reduce IT workload through a self-service portal and delegation of access rights management to data owners.
  • Via our M2M Access Management solutions, easily connect with customers, vendors and partners that have their own identity system or directory with a partner portal integration solution and easily protect your confidential data while onboarding external users with a streamlined user management method. Implement automations with if/then logic to automatically deactivate users when their contract is up and remove users from groups and applications. Smoothly view application assignments and activity with built-in reporting tools.
  • With our API Access Management solution, extend authentication & authorization policies to APIs and assure protection against API breaches and eliminates hours of XML-based policy design and enforcement to minutes via API or Admin Dashboard. Easily Implement API security best practices and modern identity frameworks like OAuth and create API authorization policies based on application, user context, and group membership to make sure only the right people get access.

  • With our MFA solution, secure your accounts and apps with a strong multi-factor authentication solution that will keep the right people in and the wrong people out. Protect all your resources, including customer-facing apps and enterprise apps that store your most sensitive data. User access will require several forms of identification to eliminate the risks associated with authentication by password alone (e.g. pin code, fingerprint) and will automatically block suspicious IP addresses that have attempted identity attacks on other organizations.
  • Passwords can be reset easily and securely via our self-service Password Management solution. The Password Reset Management solution thus reduces the number of password tickets by up to 80% – an enormous relief for your IT department. At the same time, security is increased by 2-factor authentication. In addition to Active Directory, the solution offers a variety of other interfaces for this purpose.
  • With our innovative End-point Privilege Management solution, eliminate the need for user accounts with elevated permissions. Achieve unparalleled security across all endpoints with permissions controlled at the application and process level – without impacting user productivity. Reduce privileges of potentially dangerous applications (email clients, browsers, etc. with internet access) to deny access to sensitive resources, regardless of user’s elevated privileges and grant application-level and process-level privileges to carry out authorized administrative tasks.
  • Easily secure user access through our SSO solution. Single sign-on is an authentication method that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. Provide your IT team one place to view, manage, and secure all your users’ access, whether they are internal employees or external partners. This single sign-on solution can quickly connect to and sync from any number of identity stores including AD, LDAP, HR systems, and other third-party identity providers.
  • ‎The recertification of access rights with the Re-Certification Management solution offers you the possibility to carry out periodic checks of access rights automatically. Those responsible simply check and confirm the roles and access rights in the service portal. Recertification thus ensures that people only have the access rights they need in the course of their tasks.‎
  • The zero trust security model describes an approach to the design and implementation of IT systems. With our zero-trust principle you would require proof of identity to enable access wherever you are. Prevent unauthorized access, reduce data breaches, and mitigate the risk of lateral movement to protect the entire IT environment without any technical constraints for users. You could securely embrace the rise of cloud and mobile. Get far from traditional perimeter-focused approaches to security and instead focus resources on enabling access for all users – regardless of their location, device, or network.

  • Enterprise Solutions
  • Data Management
  • Management Consulting

  • Customer Relationship Management (CRM) is a solution combination of practices, strategies and technologies for managing all your company’s relationships and interactions with customers and potential customers and to analyze their interactions and data throughout the customer lifecycle. The goal is to Improve business relationships in order to grow your business. A CRM system helps companies stay connected to customers, streamline processes, improve profitability, and drive sales growth.
  • A Document Management System (DMS) is an automated software solution to receive, organize, secure, capture, digitize, track, tag, approve, store and complete tasks with your business files & documents. DMS platforms are capable of keeping a record of the various versions created and modified by different users. These platforms handle the large amounts of paper flowing into your business for you, so you could spend time on the work that you love.
  • Enterprise Architecture Management (EAM) is the practice of enabling and driving business value using enterprise architecture. EAM sets the direction, strategy, and governance for enterprise architecture planning, vision, mission, goals, guidelines, policies, principles, communications, monitoring, control, and other activities that ensure the development and deployment of enterprise architecture in support of business value in order to achieve its vision and strategy.
  • Product Lifecycle Management (PLM) is a system which handles the process of managing a product's lifecycle from inception, through design and manufacturing, to sales, service, and eventually retirement. As a technology, PLM software helps organizations to plan, organize and manage the development and introduction, growth, maturity/stability, and decline of the product and bring them to market. This handling involves both the manufacturing of the good and the marketing of it.
  • Human Resource Management (HRM) is a platform to plan, optimize & track the process of recruiting, hiring, deploying and managing an organization's employees. HRM is the strategic approach to the effective and efficient management of people in a company or organization such that they help their business gain a competitive advantage. It is designed to maximize employee performance in service of an employer's strategic objectives with an emphasis on those employees as assets of the business.
  • Enterprise Resource Planning (ERP) refers to a type of software that organizations use to manage and integrate day-to-day business activities such as accounting, procurement, project management, risk management and compliance, and supply chain operations which will integrate all of the processes needed to run their business in a single platform with access to real time information and no more silos between departments and no more duplications in stored data.
  • Enterprise Asset Management (EAM) is a combination of software, systems and services used to plan, optimize, execute, maintain, control and track activities related to operational assets and equipment. The aim is to optimize the quality and utilization of assets throughout their lifecycle, increase productive uptime and reduce operational costs with the associated priorities, skills, materials, tools, and information.
  • A Workflow Management System provides an infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged as a workflow application. Workflow Management systems are in coordination of tasks that make up the work an organization does. Generally speaking, Business Process improvement is a natural part of workflow management.

  • Corporate performance management (CPM) is a platform containing processes and methodologies that provide an integrated approach to business planning, budgeting and forecasting for finance, sales, marketing, operations and HR. Once implemented it links the strategies of an organization to their plans and execution, therefore helping organizations succeed. In other words, CPM helps corporations use proven and tested methods and processes to improve their business management.
  • Data governance is a system for defining who within an organization has authority and control over data assets and how those data assets may be used. Generally speaking, it is the definition of organizational structures, data owners, policies, rules, process, business terms, and metrics for the end-to-end lifecycle of data (collection, storage, use, protection, archiving, and deletion). It encompasses the people, processes, and technologies required to manage and protect data assets.
  • Data Management Plan (DMP) is a written document that describes the data you expect to acquire or generate during the a project, how you will manage, describe, analyze, and store those data, and what mechanisms you will use at the end of your project to share and preserve your data.
  • Data Warehousing (DW) is process for collecting and managing data from varied sources to provide meaningful business insights. A Data warehouse is typically used to connect and analyze business data from heterogeneous sources. The data warehouse is the core of the BI system which is built for data analysis and reporting and is intended to perform queries and analysis and often contain large amounts of historical data.
  • Content collaboration is a process of sharing, distributing and consuming corporate content within a managed and secured enterprise environment to drive productive collaboration of employees and decision-makers in a company. Generally speaking, it refers to when employees can access, share, sync and collaborate on files using any device–both mobile and desktop. This collaboration and exchange of files is essential to daily activities in many organizations.
  • Business intelligence (BI) refers to a technical infrastructure or tool that collects, stores, and analyzes the data produced by a company's activities. This platform comprises the strategies and technologies used by enterprises for the data analysis of business information. BI technologies provide historical, current, and predictive views of business operations. Generally Speaking, BI is a broad term that encompasses data mining, process analysis, performance benchmarking, and descriptive analytics.
  • Big data is a term that describes large, hard-to-manage volumes of data – both structured and unstructured – that inundate businesses on a day-to-day basis. It's what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves. Generally speaking, it is the data sets whose size or type is beyond the ability of traditional relational databases to capture, manage and process the data with low latency. Characteristics of big data include high volume, high velocity and high variety. Sources of data are becoming more complex than those for traditional data because they are being driven by artificial intelligence (AI), mobile devices, social media and the Internet of Things (IoT).
  • Big data analytics is the use of advanced analytic techniques against very large, diverse big data sets that include structured, semi-structured and unstructured data, from different sources, and in different sizes from terabytes to zettabytes. Big data analytics is the often complex process of examining big data to uncover information, such as hidden patterns, correlations, market trends and customer preferences , that can help organizations make informed business decisions.

  • Business process management (BPM) solutions follow an organizational discipline where a company takes a step back and looks at all of these processes in total and individually. It analyzes the current state and identifies areas of improvement to create a more efficient and effective organization. Generally speaking, BPM is how a company creates, measure, edits, improves, analyzes, and optimizes the predictable processes that make up the core of its business.
  • Digital transformation consulting is a service that can help organizations unlock new business value through technology. One common reason organizations seek digital transformation consulting is to deliver products and services to market faster, at lower risk.
  • Risk management is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. It is the process of identifying potential hazards to the business and acting to reduce or eliminate their financial impact. Governance, or corporate governance, is the overall system of rules, practices, and standards that guide a business.
  • Knowledge management is the process of capturing, creating, structuring, retaining, sharing, using, and managing the knowledge, experience, and information of employees within an organization. Generally speaking, it refers to a multidisciplinary approach to achieve organizational objectives by making the best use of knowledge. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers.
  • Strategic management is the ongoing planning, monitoring, analysis, and assessment of all necessities an organization needs to meet its goals and objectives. Changes in business environments will require organizations to constantly assess their strategies for success. Generally speaking, Strategic management provides overall direction to an enterprise and involves specifying the organization's objectives, developing policies and plans to achieve those objectives, and then allocating resources to implement the plans.
  • In management, Information Technology consulting is a field of activity which focuses on advising organizations on how best to use information technology in achieving their business objectives. Information technology (IT) consulting services allow companies to implement IT strategies and solutions to achieve business-IT alignment and drive max value from the current IT initiatives.

  • Web
  • Mobile
  • Desktop
  • Design
  • Internet of Things
  • Open Source

  • Your website is the first impression your business makes on potential customers. That’s why you need to be unique. Our job is to make sure your business stands out with our remarkable web designs. We are experts at delivering high-quality, fully customizable, SEO friendly, secure and responsive websites. We create websites that fulfil each and every need your business might have in order to fully grow.
  • Need a web app? We are here to help you. Using the latest modern architecture patterns, frameworks, quality UI/UX designs and our expertise, we empower your business. We offer a wide range of technologies to deliver customizable, scalable, robust, high-performance web applications. Our skilled team makes sure you stand out all the way from front-end to back-end.
  • A web portal is a web-based platform that brings information from varied sources into a single interface. If you need an easy-to-use dashboard to access all your various data and contents, then you need a web portal. You can leave that to us. We develop and deliver your desired web portal with the latest methods and user-friendly designs. We take care of everything from planning to testing, deploying and support.
  • WordPress is a digital powerhouse. Want to maximize its functionality? You can count on us. We offer various WordPress solutions such as theme development, plugin development, custom development, and WordPress migration services. We are a team of expert web developers, designers and professionals taking care of all your WordPress needs.
  • As web development consultants, we offer robust and comprehensive support in all aspects of your business’s online presence, whether it’s a website or a web app. We focus on enhancing your web apps and do our best to understand your particular needs and find out the best and most effective solutions for them.
  • Do you use any content management system for your website or web app? If so, we can manage, support and maintain it for you. Provide us with your business goals, and we can manage every aspect of your web content. Leave it to us and forget about any concerns you had about your website before. We show you the true powers of your CMS and always keep you up to date.

  • If you feel you are limited in developing Android apps for your specific needs, then a native app is just what you need. We have an entire experienced Android development team that develop and deliver high-quality, high-performance, customizable Android mobile apps that can fulfill the needs of any industry. We take care of the design, development, testing, maintaining and improvement of Android native apps, and we guarantee the best mobile experience.
  • We have the ability to develop and deploy iOS mobile apps for Apple devices with the best design and performance. So if you are looking to have an iOS app for your own business, we are here to help you from A to Z. If you feel you are limited in developing iOS apps for your specific needs, then a native app is just what you need, and we can deliver that to you.
  • Need to save time and budget while having your own mobile app? Here is where we come in with React Native. We are professionals in creating cross-platform mobile apps using React Native. This remarkable technology allows us to build both Android and iOS apps at the same time seamlessly. This framework has become very popular for many industries in recent years.
  • Flutter is an open-source web and mobile SDK for both Android and iOS platforms. Our team of skilled developers offer cross-platform app development using Flutter and deliver secure, high-performance and scalable Android and iOS apps at the same time with a remarkable user experience.
  • We believe having years of experience and expertise in mobile application development puts us in a position where we can offer consultation to various industries. We can help enhance your existing mobile solution by reviewing your code or analyzing your UI/UX and many other services. If you need help developing, improving, managing or maintaining your mobile app or mobile development process, you can count on us.

  • Although web technology has reduced our need for Windows-based software, many organizations worldwide still use the Windows OS for their employees. Therefore one of the basic needs of any organization is to develop Windows-based software applications. And that is where we show up. We are here to develop software applications that can bring high performance and simplicity to your users. We can also design Windows apps that are compatible with your current applications in the company.
  • macOS is one of the most popular operating systems globally, and software development for this operating system has always been a trend. Our expert developers are ready to analyze your business, design your architecture and UI and jump into developing high-performance, secure macOS applications for your Mac devices.

  • One of the essential steps in software development is to create a tangible user interface for software owners and users. With Sys4design, you can experience a complete demo of the software app in the desktop and mobile versions before the software development process begins. And you can also provide it to your users and then decide to start the development process. This reduces the costs involved in the development process and assures you of the final production of the software app. We talk to you to analyze your needs and then prepare a complete demo of your desired software app. The appearance of this demo is no different from the final version of the software.
  • Do you feel your website’s look does not follow modern standards and technologies? Or maybe you have received some reports from your users complaining about your website’s poor performance? In each case, what you need is a website redesign, and we can take care of that. With our expert design and web development team, we can give your website a whole new eyecatching face and look, which leads to more visitors and more revenue for your business.
  • Do you feel your mobile app needs a makeover? Maybe it’s not as user-friendly as it should be? Or maybe it has a slow loading process? Whatever your problem is, our skilled developers can handle it. We can redesign every aspect of your existing mobile application, whether the UI/UX or the back-end process. We are here to give your apps a whole new look and functionality.
  • Want to make the best first impression while presenting your product? What you need is a team delivering an effective, straightforward design process. And that would be us. We have a dedicated, skilled UI/UX design team with years of professional experience. So if you want to make your products stand out, our design team is here to help you.

  • In the world of IoT, the world’s most profitable technology full of innovation, our IoT development team offers a variety of services, such as developing different sensors. For instance, temperature, pressure or humidity sensors. We are here to help automate various processes like proximity alerts, location tracking, etc.
  • Want to use next-generation technologies? Like connecting people and devices? Our IoT team, full of expert developers, is here to make that happen through IoT application development. We create various types of applications used for controlling and managing IoT devices. We take care of developing, deploying, testing and delivering smart IoT apps so you can control IoT hardware devices remotely.

  • Are you ready to win over every security challenges that your business might have? If you are, then We have a special offer for you. What do you say about using controllable opensource Linux applications? We are here to improve your security by creating specific Linux applications for your needs with remarkable UI/UX.
  • Operating systems do not always meet our needs, and we often might feel the need for an operating system designed specifically for our use. If you ever feel that need for your business, we are here to help you. We can create new distributions of the Linux operating system just for your requirements or even customize existing versions and distributions for you. This service is generally recommended for creating dedicated servers or end-user operating systems.
  • Single-board computers (SBCs) have changed the world of technology. You can use SBCs in different industry areas, such as creating robots, smart buildings, equipping offices with computers, training, etc. We can develop various SBCs like Raspberry Pi, specifically for your needs and produce customized operating systems and software apps for them.
  • Cloud App Integration: Want to connect your organization’s on-premises or cloud software with other cloud-hosted apps? Or maybe connect them between different companies? Then, you need cloud application integration, and we can help you in all of its processes. We start by planning and designing an integration solution architecture. We continue by re-engineering and implementing the integrated system, and finally, we launch it and offer our expert support.
  • Want to deploy and deliver your application in no time with more security and higher efficiency? No more traditional methods. It is time to embrace the power of containerization. Containerization technology is now very popular among organizations creating new apps or modernizing existing apps for the cloud. That is why we offer this modern service. We make your apps portable, independent, faster, using minimum resources and efficient.
  • Looking for a new way to communicate with your staff or maybe your customers or visitors? Our Digital Signage solution can help you. It is perfect for both internal and customer communications. We offer our Digital Signage that is managed centrally and easily and can display various messages and information and help engage with your audience.

  • Datacenter On-premises
  • Datacenter On-the-cloud
  • Workspace Management

  • Server virtualization is an essential technology to reduce costs and increase utilization in data centers. We are experts at server virtualization and can implement this technology in your data center. It does not matter if you prefer using Linux-based products such as KVM and Xen Project or prefer products like Esx or Hyper-V, we will implement your own unique solution.
  • Desktop virtualization is a process that transfers the end-users operating systems in organizations to servers, which allows us to manage our users' software apps and operating systems seamlessly, in which case there is no need for computers for our end users. And this greatly reduces the costs of the organization. One of our major expertise is desktop virtualization.
  • Network virtualization is one of the most popular and up-to-date technologies in the world of IT that reduces our need for expensive network equipment and on the other hand, increases network security and management. We can implement network virtualization for your organization through open source or other solutions such as Citrix and VMware.
  • Software virtualization is the most important telecommunication tool for organizations. In this method, it is no longer necessary to provide a separate license for each user and software application, which means cost reduction. This method can deliver one software app to thousands of users using only one configuration and make it easier to manage Windows-based software applications.
  • Desktop and server provisioning is a comprehensive solution for duplicating virtual machines. A solution that can create thousands of virtual machines (operating systems) for your servers and end-users (VDI) at the same time with just one click. And can significantly save server RAM and storage. Note that this technology has nothing to do with duplicating VMs by VMware and Microsoft hypervisors.
  • Do a lot of people in your organization use different software apps? You can create a basket of operating systems, platforms and software apps, connect them with each other and deliver them to hundreds of people. This technology is very similar to Docker in Linux, except it is used for Windows apps. Contact us for more information.
  • We can simplify the difficulty of installing and implementing complex network services through our Virtual Appliances. Imagine being able to launch Citrix VDI service in your organization with a simple wizard and a few clicks; and your users can use and enjoy the most complex network services in less than some minutes. We can also turn your personal services into Virtual Appliances.
  • We have a high level of expertise in the field of virtualization. We can implement virtualization technology in various aspects for you or even provide you with implementation consulting. Are you ready to equip your data center with virtualization technology? Contact us.
  • If you use Microsoft and Windows Server on-premise services in your organization or need us to set them up for you, you can contact us. Services such as Active Directory, Mail Servers, File Servers and RDSH are some of the services based on Windows Server, which we offer.

  • Although the public cloud has become very popular, many companies still prefer using the benefits of private clouds. Since implementing private clouds is complicated and needs expertise in this field, we are here to offer our expert cloud knowledge. We choose the best cloud platform suitable for your business, such as VMware, Citrix Cloud, etc. And we start designing and implementing your own on-premise private cloud infrastructure.
  • Need a clear cloud strategy? We can help you with years of experience in IT and cloud operations. We guide you step by step into the cloud ensuring efficient costs of cloud development and migration and also high performance and security. If you plan to move to the cloud, we will find the perfect cloud solution suiting your business and your demands.

  • The VDI solution is a set of software and hardware policies and tools that can help implement Desktop Virtualization technology and make Desktop Virtualization projects run smoothly. We have used our own new methods in implementing VDI projects, and we have been able to create a unique experience in implementing Citrix and VMware projects. Contact us to know how we can help you implement VDI projects.
  • Using this solution, you can manage your workspace with the greatest detail. You are able to manage the RAM, CPU, storage space and bandwidth of your users. You can specify and manage each software app's access level and specify how much software and hardware resources each user can consume.
  • Want to increase your productivity and communication quality and enable your staff to collaborate from anywhere? That is easy using our VOIP and video conferencing solution. Enjoy your live presentations and meetings with real-time audio, chat, video and screen sharing, offering many advanced features. Lower your costs, receive high-quality calls from anywhere and any device and keep your organization’s data secure.
  • sys4it enterprise IPTV service is for sharing video and audio content in your organization and on the network. Using enterprise IPTV, you can share your desired TV and radio channels/contents on the end users' operating system without any limitations. This service is very recommended and popular for large organizations, hotels and hospitals.

who we are and what we do
shape 16 1 1

Who we are & what we do?

sys4it GmbH is an agile system integrator and consulting company in the field of IT and communications. With a global network of partners, employees, customers and thought leaders, sys4it helps companies run more effective and safer. sys4it is an international team of experts and consultants who can offer best strategic guidance, choose the right IT solutions and also help any organization to achieve their goals and solve their problems with a first-class service quality.

Explore More
shape 39 1
shape 40 1
Modal Title

Imprint

The sys4it.com website is operated by SYS4IT ​​GmbH 

sys4it GmbH
Olof-Palme-Str 1
51371 Leverkusen
Deutschland

T: +49 214 83097150
F: +49 214 83097159

Mail: office@sys4it.com
Web: www.sys4it.com

Geschäftsführer: Korosh Mehrabi
HRB/Registration No: B104904 Amtsgericht Köln

Liability

These web pages were compiled with the greatest possible care. Nevertheless, no guarantee can be given for the correctness and accuracy of the information contained therein. Any liability for damage that arises directly or indirectly from the use of this website is excluded unless it is based on intent or gross negligence. If this website refers to websites operated by third parties, sys4it GmbH assumes no responsibility for their content.

Copyright

The product names used are trademarks of the respective manufacturers. Some of the images used on this website come from image services. The copyright of these images lies with the respective photographer.

Data Protection

Data protection declaration for the use of Google Analytics

This website uses functions of the web analysis service Google Analytics. The provider is Google Inc. 1600 Amphitheater Parkway Mountain View, CA 94043, USA. Google Analytics uses so-called “cookies”. These are text files that are saved on your computer and that enable your use of the website to be analyzed. The information generated by the cookie about your use of this website are usually transmitted to and stored by Google on servers in the United States.

If IP anonymization is activated on this website, your IP address will be shortened beforehand by Google within member states of the European Union or in other contracting states of the Agreement on the European Economic Area. The full IP address will only be transmitted to a Google server in the USA and shortened there in exceptional cases. On behalf of the operator of this website, Google will use this information to evaluate your use of the website, to compile reports on website activity and to provide the website operator with other services relating to website activity and internet usage. The IP address transmitted by your browser as part of Google Analytics will not be merged with other Google data. You can prevent the storage of cookies by setting your browser software; accordingly, we would like to point out, however, that in this case you may not be able to use all functions of this website to their full extent. You can also prevent Google from collecting the data generated by the cookie and relating to your use of the website (including your IP address) and from processing this data by Google by downloading the browser plug-in available under the following link and install: tools.google.com/dlpage/gaoptout 

Data protection declaration for the use of YouTube

Our website uses plugins from YouTube, operated by Google. The operator of the website is YouTube, LLC, 901 Cherry Ave., San Bruno, CA 94066, USA. If you visit one of our pages equipped with a YouTube plug-in, a connection to the YouTube servers will be established. The YouTube server is informed which of our pages you have visited.If you are logged into your YouTube account, you enable YouTube to assign your surfing behavior directly to your personal profile. You can prevent this by logging out of your YouTube account.Further information on the handling of user data can be found in YouTube’s data protection declaration at www.google.de/intl/de/policies/privacy

Information, deletion, blocking

You have the right to free information about your stored personal data, their origin and recipient and the purpose of the data processing as well as the right to correct, block or delete this data at any time. You can contact us at any time at the address given in the legal notice if you have any further questions about personal data. 

Contact

If you send us inquiries using the contact form, your details from the inquiry form, including the contact details you provided there, will be stored by us for the purpose of processing the inquiry and in case of follow-up questions. We do not pass on this data without your consent.

Cookies

Some of the internet pages use so-called cookies. Cookies do not cause any damage to your computer and do not contain viruses. Cookies serve to make our offer more user-friendly, more effective, and safer. Cookies are small text files that are stored on your computer and saved by your browser.

Most of the cookies we use are so-called “session cookies”. They are automatically deleted after your visit. Other cookies remain stored on your device until you delete them. These cookies enable us to recognize your browser the next time you visit.

You can set your browser so that you are informed about the setting of cookies and only allow cookies in individual cases, exclude the acceptance of cookies for certain cases or in general, and activate the automatic deletion of cookies when you close the browser. If cookies are deactivated, the functionality of this website may be restricted. 

sys4it

Headquarter

Olof-Palme-Str 1 51371 Leverkusen Deutschland

Phone:   (+49) 2173 993848-0 
Fax:   (+49) 2173 993848-9
Email:   hello@sys4it.com

Dubai Office

Office 2A, Ground Floor Building No.6 Gold & Diamond Park Dubai UAE P.O. Box 183827