About Us

We have been around for over 20 years. We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. We also provide solutions for your networking needs including firewall and backup solutions. We also provide solutions for your hardware needs when out-of-the-box equipment doesn't meet your needs.

We provide customized IT solutions to meet all your business needs. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future. Our development team can customize every aspect of your business applications whether the apps are hosted in the cloud or hosted on your own servers. We can customize user front ends for both desktop apps and mobile apps. We are composed of programmers who are adept at diverse software technologies with over 50 years of combined industry experience. Our clients include financial banks, hedge funds, doctors and variety of other industries.

We also provide customized network solutions to meet your business needs. From protection against data loss or hacking, we will meet your network infrastructure needs. We have customized firewall solutions for your specific business needs. We can customize backup solutions to backup precious data from your servers and workstations. With products like CielView, we can also protect your business against workstation hardware failure. Headaches and downtime caused by workstation hardware failure can be eliminated with our custom CielView solution.



Sometimes, workstations and servers from the major manufactures don't fully meet your needs. We can custom configure workstations and server to your exact needs. No worries about spending countless hours trying to find a model that you hope will fit your needs. Call us with the specifications you require or what you will using your system for and we can customize a system for you. We can provide basic workstations to multiple GPU graphics power houses, we can customize every aspect of your workstation or server.



Contact Us

We are confident that we can meet the challenges ahead, and stand ready to collaborate with you in delivering an effective IT support solutions.

Phone Number

+1 201 438 1315


Address

22 Glen Road, NJ 07070, USA

Email

support@waldensys.com


Hours

Mon -Fri : 10:00AM - 6:00PM
Sat  : 10:00AM - 3:00PM  

Your message has been sent. Thank you!

Zombie computer viruses that refuse to die

There are many old viruses that are still around and roam the internet continuing infecting computers world wide. They are referred to by security experts as Zombies, since no one can kill them off completely. The most prolific type of Zombie viruses are the worms. Most worms are self-replicating and spread themselves to other victims after cloning themselves. ...

Bladabindi Backdoor Trojan Hidden in VPN Installer

Users installing Windscribe VPN from third party sites run the risk of installing a backdoor. At first glance, the installer looks legitimate but in reality, the software is bundled with a trojan which allows hackers to gain access to the computer. The fake installer for Windscribe VPN contains the Bladabindi backdoor. Bladabindi is able to execute remote commands, log keystrokes, take screenshots , and collect information about the computer including antivirus software and passwor ...

Ransomware Hits Another School in California

The latest ransomware attack victim is the Newhall school district in California. According to city officials, the attack closed down remote learning for 6,000 elementary students. The malware struck overnight Sunday into Monday morning. Newhall's servers have been shut down and the kids are back to using pencil and paper to work on home assignments. There has been no extortion demand yet. ...

Android Malware Bypasses Two Factor Authentication

Researchers found a surveillance campaign that targets victims' personal device data and browser credentials. One unique tool in the group's bag of tricks is an Android malware that collects two-factor authentication ( 2FA ) security codes sent to devices and launches Google account phishing attacks. The group that is responsible is being called Rampant Kitten. The group has targeted Iranian entities for at least six years. It specifically targets Iranian minorities and anti-regime organizations ...