About Us

We have been around for over 20 years. We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. We also provide solutions for your networking needs including firewall and backup solutions. We also provide solutions for your hardware needs when out-of-the-box equipment doesn't meet your needs.

We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. Our development team can customize every aspect of your business applications whether the apps are hosted in the cloud or hosted on your own servers. We can customize user front ends for both desktop apps and mobile apps. We are composed of programmers who are adept at diverse software technologies with over 50 years of combined industry experience. Our clients include financial banks, hedge funds, doctors and variety of other industries.

We also provide customized network solutions to meet your business needs. From protection against data loss or hacking, we will meet your network infrastructure needs. We have customized firewall solutions for your specific business needs. We can customize backup solutions to backup precious data from your servers and workstations. With products like CielView, we can also protect your business against workstation hardware failure. Headaches and downtime caused by workstation hardware failure can be eliminated with our custom CielView solution.



Sometimes, workstations and servers from the major manufactures don't fully meet your needs. We can custom configure workstations and server to your exact needs. No worries about spending countless hours trying to find a model that you hope will fit your needs. Call us with the specifications you require or what you will using your system for and we can customize a system for you. We can provide basic workstations to multiple GPU graphics power houses, we can customize every aspect of your workstation or server.



Contact Us

We are confident that we can meet the challenges ahead, and stand ready to collaborate with you in delivering an effective IT support solutions.

Phone Number

+1 201 438 1315


Address

22 Glen Road, NJ 07070, USA

Email

support@waldensys.com


Hours

Mon -Fri : 10:00AM - 6:00PM
Sat  : 10:00AM - 3:00PM  

Your message has been sent. Thank you!

1TB of Data Stolen from International Tech Firm

Hackers stole a terabyte of data from a Miami-based tech firm and leaked some data online including full credit-card information, passports, bank statements and financial documents on a Russian hacker forum. Intcomex, a very large value-added reseller which provides technology products and services in Latin America and the Caribbean was the victim. The leaks occurred on Sept. 14 and Sept. 20, when hackers dumped it in two parts on the forum. The data was stolen as the result of a ransomware atta ...

Zero-Click Kernel Bug in Linux-Based IoT Devices

There is a high-severity flaw in BlueZ, the Linux Bluetooth protocol stack that provides support for Bluetooth protocols in Linux-based internet of things (IoT) devices. According to Google, the vulnerability affects Linux kernel versions older than 5.9 that support BlueZ. BlueZ is an open-source project distributed under GNU General Public License which features the BlueZ kernel that has been part of the official Linux kernel since version 2.4.6. ...

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

Paying Ransomware May Be Illegal

The U.S. Treasury Department is warning that individuals or businesses making ransomware payments may be violating anti-money laundering and sanctions regulations. The warnings came in two advisories, one from the Financial Crimes Enforcement Network (FinCEN) and the other from the Office of Foreign Assets Control (OFAC). FinCEN addressed companies that provide services to victims of ransomware attacks, including digital forensics and incident response companies and cyber insurance companies tha ...