About Us

We have been around for over 20 years. We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. We also provide solutions for your networking needs including firewall and backup solutions. We also provide solutions for your hardware needs when out-of-the-box equipment doesn't meet your needs.

We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. Our development team can customize every aspect of your business applications whether the apps are hosted in the cloud or hosted on your own servers. We can customize user front ends for both desktop apps and mobile apps. We are composed of programmers who are adept at diverse software technologies with over 50 years of combined industry experience. Our clients include financial banks, hedge funds, doctors and variety of other industries.

We also provide customized network solutions to meet your business needs. From protection against data loss or hacking, we will meet your network infrastructure needs. We have customized firewall solutions for your specific business needs. We can customize backup solutions to backup precious data from your servers and workstations. With products like CielView, we can also protect your business against workstation hardware failure. Headaches and downtime caused by workstation hardware failure can be eliminated with our custom CielView solution.



Sometimes, workstations and servers from the major manufactures don't fully meet your needs. We can custom configure workstations and server to your exact needs. No worries about spending countless hours trying to find a model that you hope will fit your needs. Call us with the specifications you require or what you will using your system for and we can customize a system for you. We can provide basic workstations to multiple GPU graphics power houses, we can customize every aspect of your workstation or server.



Contact Us

We are confident that we can meet the challenges ahead, and stand ready to collaborate with you in delivering an effective IT support solutions.

Phone Number

+1 201 438 1315


Address

22 Glen Road, NJ 07070, USA

Email

support@waldensys.com


Hours

Mon -Fri : 10:00AM - 6:00PM
Sat  : 10:00AM - 3:00PM  

Your message has been sent. Thank you!

Another Intel Chip Flaw Exposes Encryption Keys

According to Positive Technologies, a Russian cybersecurity firm, a security vulnerability in Intel chips allow encrypted file access. The flaw also gives hackers the ability to bypass copyright protection for digital content. Positive Technologies found that the vulnerability ( CVE-2021-0146 ) is caused by a debugging functionality with excessive privileges. According to Intel, the flaw allows activation of test o ...

BotenaGo Malware Can Exploit Millions of IoT devices and Routers

A new malware has been detected that is written in Google's open-source programming language Golang has the potential to exploit millions of routers and IoT devices. It was discovered by researchers at AT&T AlienLabs. BotenaGo can exploit more than 30 different vulnerabilities to attack a target according to security researcher Ofer Caspi. The malware works by creating a backdoor to the device. It then waits to receive a target to attack from a remote operator through port 19412 or from anothe ...

Linux Kernel Bug Allows Remote Control

A critical, heap-overflow vulnerability in the Transparent Inter Process Communication (TIPC) module of the Linux kernel can lead to remote code execution and system compromise. TIPC is a peer-to-peer protocol used by nodes within a Linux cluster to communicate with each other in an optimized way. It allows various types of messages used for different purposes. According to SentinelLabs, the bug is in a message type that allows nodes to send cryptographic keys to each other. When received, the ...

Fake Google Chrome update Bypasses Windows User Account Control

There is no better way to get a payload onto someone's device than through a program that nearly everyone has installed like Google Chrome. Infostealer malware, masquerades as a legitimate update to Google Chrome so that sensitive data or cryptocurrency can be stolen from the victims' machines. The Malware is delivered through a compromised website on Chrome browsers can bypass User Account Controls to infect systems. Hackers behind a newly identified malware campaign are targeting Windows 10 ...