Built to last.
Engineered to withstand.

Convergent architects, secures and governs resilient IT infrastructures for structured and mission-critical organisations — engineered to reduce operational risk, ensure long-term continuity and deliver measurable return on infrastructure investment.

Engagements are structured, project-based and governance-driven — not ad-hoc IT support.

Commitment · Trust · Innovation

Our Services

Structured cybersecurity architecture designed to reduce attack surface, enforce policy governance and enable documented compliance — delivered by a vendor-neutral integrator.

Sécurité Réseau

Network Security & Firewall

Strengthens perimeter control, reduces lateral movement risk and enforces policy governance across distributed environments.

Protection Endpoints

Endpoint Protection

Improves threat detection coverage, minimizes ransomware exposure and enforces endpoint policy compliance.

Sécurité Email

Email Security

Reduces phishing exposure, enforces domain authenticity and protects executive communication channels.

Stockage et Backup

Storage & Backup

Enhances data integrity, accelerates recovery time objectives (RTO) and supports documented continuity planning.

MDM Mobile

Mobile Device Management

Enforces device compliance, secures corporate mobility and centralizes endpoint governance.

Réseau et Optique

Enterprise Networking & Optical

Ensures infrastructure performance stability, reduces hardware bottlenecks and enables scalable network growth.

Productivité et collaboration

Productivity & Digital Trust

Secures document workflows, strengthens digital trust and supports compliance-aligned collaboration.

Audit Technique

Consulting & Technical Audit

Identifies architectural gaps, documents risk exposure and aligns infrastructure design with governance objectives.

Strategic Technology Partnerships

Our strategic technology ecosystem is selected for enterprise maturity, on-premise deployability and alignment with structured governance requirements. We integrate these technologies within documented, auditable architectures — not as a marketplace, but as engineered solutions.

Decisio / OPNsense — Firewall & Network Security

Community Edition · Business Edition · Professional Support

OPNsense Community EditionOpen Source

Full-featured open source firewall on FreeBSD. Stateful filtering, OpenVPN/WireGuard, IDS/IPS via Suricata, HAProxy reverse proxy, VLAN 802.1Q. Ideal for organisations with in-house expertise.

Stateful FW · OpenVPN · IDS/IPS · HAProxy · VLAN
OPNsense Business EditionAnnual Subscription

Decisio subscription unlocking exclusive premium plugins: OPNcentral multi-site management, OPNWAF web application firewall, integrated GeoIP, OpenID Connect and an enterprise-tested update repository with priority patches.

OPNcentral · OPNWAF · GeoIP · OpenID Connect · Enterprise repo
OPNsense Professional Support★ CCC Pro Support

Convergent deploys and configures OPNsense environments and sells official Decisio support subscriptions — giving your organisation direct access to Decisio professionals, their SLA, priority patches and vendor expertise.

Contractual SLA · On-site · Incident response · Local team Tunis
Decisio DEC Appliances Hardware
Decisio DEC700 Appliance

Purpose-built OPNsense hardware appliances in desktop and rack-mount form factors, engineered for reliability and long-term operational continuity.

DEC630 · DEC740 · DEC750 · DEC840 DEC2750 · DEC3840 · DEC4020 · DEC4040

Zenarmor — Next-Generation Firewall Analytics

Free Edition · Home · Business · Enterprise · MSP

Zenarmor FreeGratuit

Layer 7 application filtering on OPNsense. Application identification, basic web content filtering, basic reporting. Ideal for testing and small environments without commercial requirement.

L7 App filter · Web filtering · Basic reporting
Zenarmor Business / EnterprisePaid

Advanced NGFW analytics: deep TLS inspection, granular application policies, Active Directory user-based rules, threat intelligence, cloud reporting dashboard, multi-device management and REST API.

TLS inspection · AD user rules · Threat Intel · Cloud dashboard · REST API
Zenarmor Integration & Support★ CCC Pro Support

Convergent deploys Zenarmor on your OPNsense stack, configures AD/LDAP user-based policies, sets up TLS inspection and delivers ongoing operational support under a contractual SLA.

AD/LDAP policy · TLS config · Operational SLA

Bitdefender GravityZone — Endpoint Protection

Business Security · Premium · Enterprise EDR · XDR

GravityZone Business SecuritySME

Centralised antivirus/antimalware for SMEs. Cloud console, Network Attack Defense, Web Access Control, Device Control, Endpoint Risk Analytics. Fast deployment, no heavy on-premise infrastructure required.

AV/AM · Network Attack Defense · Web Control · Device Control
GravityZone Business Security PremiumAdvanced

Adds HyperDetect machine learning, Sandbox Analyzer cloud, Fileless Attack Defense, attack forensics, Exchange and SharePoint server protection.

HyperDetect · Sandbox · Fileless Defense · Exchange/SharePoint
GravityZone Enterprise (EDR/XDR)Enterprise

Full EDR with cross-endpoint correlation, automated threat hunting, incident history and XDR. MITRE ATT&CK Evaluations leader. On-premise Virtual Appliance deployment available.

EDR · XDR · Cross-endpoint · MITRE ATT&CK · On-premise VA
GravityZone Deployment & Support★ CCC Pro Support

Convergent handles sizing, on-premise Virtual Appliance deployment, AD/LDAP integration, security policy configuration and incident follow-up under a local contractual SLA.

On-premise VA · AD/LDAP · Security policy · Local SLA

Avast Business — Endpoint & Server Security

Essential · Premium · Ultimate · Antivirus for Linux

Essential Business SecuritySME

Next-gen antivirus with cloud management console. File/Web/Mail/Behaviour Shields, CyberCapture sandbox, Firewall, Real Site DNS protection, Exchange and SharePoint server protection included.

AV/AM · CyberCapture · Firewall · Exchange/SharePoint · DNS
Premium & Ultimate Business SecurityAdvanced

Premium adds VPN (no data limit), USB Protection and Ransomware Shield. Ultimate adds automated Patch Management for Windows OS and hundreds of third-party applications — plus CVSS scoring.

VPN · USB Protection · Ransomware Shield · Patch Management · CVSS
Avast Business Antivirus for LinuxLinux

Real-time antivirus for Linux servers: Red Hat, Debian, Ubuntu (32/64-bit). File Server Shield via fanotify, CommunityIQ threat intelligence, streaming updates, DEB/RPM packages and cron-based VPS auto-update.

File Server Shield · fanotify · CommunityIQ · DEB/RPM · Streaming updates
Avast Deployment & Support★ CCC Pro Support

Convergent deploys and manages Avast Business Hub, configures security policies, integrates with Active Directory, handles Linux server agent rollout and delivers post-production support under SLA.

Business Hub admin · AD integration · Linux agents · SLA

Universign by Signaturit — eIDAS Electronic Signature

Simple · Advanced · Qualified · API / Integration

Simple & Advanced Electronic SignatureSubscription

eIDAS-compliant electronic signature for contracts, HR documents, NDAs and sales proposals. SMS/email OTP authentication, audit trail, timestamping and bulk send. Integrates with ONLYOFFICE DocSpace.

eIDAS · OTP SMS/email · Audit trail · Timestamping · ONLYOFFICE
Qualified Electronic Signature (QES)QES

Highest legal level under eIDAS. Equivalent to handwritten signature, legally binding across the EU. Requires identity verification. Required for notarial acts, public procurement and regulated financial documents.

QES · eIDAS Level 3 · Identity verification · EU legal · Regulated docs
Universign Integration & Support★ CCC Pro Support

Convergent integrates Universign into your workflows via REST API: ONLYOFFICE DocSpace, Odoo, custom ERP or document portals. We handle the legal configuration, user training and ongoing support under SLA.

REST API · Odoo integration · DocSpace · User training · SLA

TrueNAS — Enterprise ZFS Storage

Mini · R-Series · M-Series · TrueNAS Enterprise Support

TrueNAS Mini (X / XL+ / R)SME
TrueNAS Mini Appliance

Desktop/compact rack appliance for SMEs and remote offices. Up to 12 bays, up to 250 TB, native ZFS with auto-heal, snapshots, encryption and IPMI. Silent profile suitable for office environments.

≤12 baies · ZFS auto-heal · 10GbE · Snapshots · IPMI
TrueNAS R-Series (R20 / R50 / R60)Datacenter
TrueNAS R-Series Appliance

2U/4U rack appliances for server rooms and datacenters. Full redundancy (PSU, fans, controllers), 25/100GbE, SAS/NVMe hybrid drives. Designed for 24/7 availability.

Rack 2U/4U · Full redundancy · 25/100GbE · SAS/NVMe · 24/7
TrueNAS M-Series (M40 / M50 / M60)Enterprise

Dual active/active controllers, NVMe hybrid, up to 20 PB at 20+ GB/s. Enterprise Support included. For critical workloads, virtualisation and AI with near-zero RTO.

Dual active/active · ≤20 Po · 20+ Go/s · NVMe · Enterprise Support
TrueNAS Integration & Support★ CCC Pro Support

Convergent sizes to your RTO/RPO requirements, deploys ZFS (RAID-Z2/Z3, pools, datasets), integrates with Proxmox VE and provides post-deployment support under a local SLA.

RTO/RPO sizing · ZFS RAID-Z2/Z3 · Proxmox VE · Local SLA

FS.com — Physical Network Infrastructure

Managed Switches · Fibre Optic · Structured Cabling · SFP/QSFP Transceivers

Managed Switches & RoutersEquipment

Full range of L2/L3 managed switches, routers and 1GbE–400GbE network equipment. Compatible with Cumulus Linux and SONiC open NOS. Cost-effective alternative to Cisco/HPE for structured environments.

L2/L3 · 1G–400GbE · SONiC · Cumulus · Rack & ToR
Structured Cabling & Fibre OpticInfrastructure

Cat6A/Cat8 cables, SFP/SFP+/QSFP28 modules, patch panels, OS2/OM4 fibre patch cords and complete structured cabling solutions for datacenters and server rooms. Multi-vendor compatible.

Cat6A/Cat8 · SFP+/QSFP28 · OS2/OM4 · Patch panels
Network Infrastructure Integration★ CCC Pro Support

Convergent designs and deploys physical network infrastructure: IP addressing plan, structured cabling, patch bay, switch configuration and continuity testing. Documented, verifiable deliverable.

IP plan · Structured cabling · Switch config · Testing & acceptance

ONLYOFFICE — On-Premise Office Suite

Docs Enterprise · DocSpace Enterprise · Alternative MS Office / SharePoint

ONLYOFFICE Docs EnterpriseOn-premise

On-premise document editing server. Real-time co-editing of Word, Excel, PowerPoint. Full MS Office compatibility, 40+ connectors (Nextcloud, Odoo, Alfresco, Confluence). Scalable to thousands of users. Priority support included.

Co-édition temps réel · MS Office · 40+ intégrations · On-premise · API
ONLYOFFICE DocSpace EnterpriseCollaboration

Document collaboration with granular-rights secure rooms, external sharing without account, integrated PDF e-signature, AES-256 encryption, SSO/LDAP, GDPR compliance and full audit trail. On-premise SharePoint alternative.

Secure rooms · eSign PDF · AES-256 · SSO/LDAP · GDPR · Audit trail
ONLYOFFICE Deployment & Support★ CCC Pro Support

Convergent deploys on-premise (Docker/VM), integrates LDAP/AD, migrates from MS Office or Google Workspace, configures rooms and rights, and provides post-production support under a contractual SLA.

Docker/VM deploy · MS Office migration · LDAP · SLA

Headwind MDM — Mobile Device Management

Open Source · Enterprise · Zero-cloud Android on-premise

Headwind MDM Open SourceOpen Source

On-premise Android MDM. App deployment, security policies, device configuration, single-app kiosk mode. No external cloud dependency — all data stays on your infrastructure.

Android on-premise · App deploy · Kiosk · Zero cloud
Headwind MDM EnterpriseEnterprise

Adds geolocation, multi-tenant management, advanced reporting, full REST API, SSO/LDAP integration and push notifications. Official Headwind support available. For industrial or field fleets (100+ devices).

Géolocalisation · Multi-tenant · SSO/LDAP · REST API · Push notifications
Headwind Deployment & Support★ CCC Pro Support

Convergent installs and configures Headwind MDM on-premise, integrates your LDAP directory, profiles mobile security policies and manages fleet enrolment. Operational monitoring and support under a local SLA.

On-premise install · Fleet enrolment · Security policy · Local SLA

Every technology in our ecosystem is selected on technical merit, security posture and long-term interoperability — and available for direct purchase as standalone licences, support subscriptions or hardware, independently of any integration engagement.

Infrastructure Governance & Risk Control

Governance is the foundation of our integration methodology. Every deployment includes structured documentation, risk evaluation, lifecycle planning and compliance alignment to ensure audit readiness and operational resilience.

Your data stays on your infrastructure — sovereign, auditable, under your control.

All solutions are deployed on-premise or in your sovereign environment. No cloud dependency, no third-party data access, no vendor lock-in. Architecture engineered for GDPR-alignment and national regulatory compliance.

Infrastructure Risk Mapping

Systematic identification and assessment of exposure points across your entire IT estate — network, storage, identity and endpoints.

Attack Surface Reduction

Hardening of exposed services, lateral movement containment and segmentation — applied to real operational constraints.

Operational Continuity Design

Redundancy, failover and recovery architectures built to match your RTO and RPO — not generic templates.

Vendor-Neutral Architecture Validation

Independent review of existing or proposed architectures — evaluated on technical merit, not commercial relationships.

Documentation & Compliance Traceability

Full architecture documentation, change logs and compliance mapping — auditable at any point in the engagement lifecycle.

Industry Solutions

Each sector has its regulatory and operational constraints. We adapt our architecture and approach to your specific environment.

Finance

Finance & Banking

  • Regulatory compliance (PCI-DSS)
  • High availability infrastructure
  • Advanced threat detection
  • Sensitive data encryption
Santé

Healthcare & Clinics

  • Patient data protection
  • Data encryption at rest & transit
  • Disaster recovery planning
  • Medical network segmentation
Industrie

Manufacturing

  • Secure OT/IT convergence
  • Real-time monitoring
  • Industrial data backup
  • Mobile fleet management
Commerce

Retail & Commerce

  • Point of Sale security
  • Multi-location management
  • Customer data protection
  • Integrated ERP & CRM
Juridique

Legal & Notarial

  • eIDAS electronic signature
  • Secure legal archiving
  • Communications encryption
  • Sovereign document management
Secteur Public

Public Sector & Education

  • Digital sovereignty
  • Auditable open source solutions
  • GDPR compliance
  • On-premise hosting

What Sets Convergent Apart

Governance-driven architecture and documented risk reduction. Vendor-neutral integration aligned with operational objectives. Lifecycle sustainability and audit-ready deliverables.

On-Site Presence, Tunis

Headquartered in Tunis with direct operational knowledge of the local regulatory environment. Engagements are on-site — not remote support tickets. Response and intervention timelines are contractually defined.

Governance-Driven Architecture

Every deployment is documented, structured and auditable. Engagements follow a defined methodology — from qualification to handover — with measurable outcomes and no ambiguity in scope or responsibility.

Linux & Cybersecurity Expertise

Linux architecture since 1997. Cybersecurity practice since 2004. Depth of expertise that predates most current security frameworks — applied to real operational environments, not theoretical benchmarks.

Long-Term Infrastructure Strategy

We privilege maintainability, lifecycle clarity and technical sustainability. Infrastructure designed today must remain operable, auditable and extendable over a 5-to-10-year horizon without vendor dependency.

Risk Reduction Focus

Security posture and operational continuity are engineered from inception — not bolted on post-deployment. Risk is mapped, quantified and mitigated through architecture — not through software alone. You retain full ownership of your infrastructure and data.

Vendor Neutral

We recommend solutions based on merit and fit — not vendor relationships. Every recommendation is technically justified and independently verifiable.

Our Process

A five-phase engagement model aligned with consulting best practices — from current-state diagnosis to long-term lifecycle optimisation.

1

Infrastructure Audit & Current State Analysis

Comprehensive review of architecture, policy structure and operational dependencies — benchmarked against your continuity, security and governance requirements.

2

Architecture Design & Risk Assessment

Structured design aligned to continuity, security and governance requirements — with formal risk assessment and documented mitigation strategy.

3

Controlled Deployment & Validation

Phased implementation with documented configuration, validation checkpoints, rollback procedures and contractually defined milestones.

4

Operational Documentation & Knowledge Transfer

Formalized architecture documentation, access governance, runbooks and structured knowledge transfer to reinforce internal capability and operational autonomy.

5

Long-Term Support & Lifecycle Optimisation

Continuous evaluation aligned with infrastructure evolution and risk landscape shifts — contractual SLA-backed support, version lifecycle management and periodic compliance reviews.

Engagement Criteria

Convergent typically engages with organisations that have defined decision processes, compliance obligations and structured IT investment. Our engagement model is not adapted for ad-hoc or reactive IT requests.

Engagement Criteria

  • Organisations with defined internal decision processes
  • Organisations requiring business continuity assurance
  • Organisations operating under compliance or governance constraints
  • Organisations investing in structured IT infrastructure rather than reactive support

Outside Our Scope

  • Ad-hoc troubleshooting without project context
  • Undefined exploratory requests without defined scope or budget
  • Short-term tactical IT interventions
  • Individual or residential IT support

About Convergent

Independent integrator. Governance-driven. Vendor-neutral.

Convergent Cloud Computing is an independent IT infrastructure integrator, built on the founders' 28+ years of Linux and open-source expertise and 21+ years of cybersecurity practice.

We architect, secure and govern resilient IT environments for structured and mission-critical organisations — complementing internal IT resources and ensuring business continuity at competitive cost and within realistic timelines.

Our practice covers network security (OPNsense/Zenarmor), endpoint protection (Bitdefender, Avast Business), enterprise storage (TrueNAS), virtualisation (Proxmox), mobile device management (Headwind MDM), productivity and collaboration (ONLYOFFICE, Odoo), and qualified electronic signature (Universign by Signaturit).

Engagements are project-based, governance-driven and vendor-neutral — delivering auditable, documented architectures aligned with your sovereignty requirements, whether on-premise, cloud or hybrid.

28+
Years Linux &
Open Source
21+
Years
Cybersecurity
11
Technology
Partners
0
Vendor
Lock-in

What Our Clients Say

"Convergent transformed our IT infrastructure in 6 months. No more recurring outages and sleepless nights. Their governance approach helped us pass BCT audits stress-free."
CIO — Bank (Tunis)
Critical infrastructure • 200+ users
"Zero cyber incidents for 18 months. Their OPNsense + EDR solution protects us better than our old equipment at 10× the price. Clear ROI."
CEO — Pharmaceutical Industry
SME • GDPR compliance required
"Impeccable technical documentation. Our internal auditors had never seen this. Convergent delivers what they promise: auditable and scalable architectures."
CISO — Public Administration
600+ workstations • Sovereignty requirements
"Successful VMware to Proxmox migration without interruption. Savings: 40% over 3 years. Team training included. Rare professionalism in the market."
IT Manager — Hotel Group
Multi-site • 24/7 uptime required

Assess Your Cyber Exposure

All project requests undergo structured qualification review to ensure alignment with operational scope, governance maturity and architectural feasibility prior to engagement.

Every request automatically generates a free cyber security posture assessment of your email infrastructure and web presence — covering SSL/TLS grading, DMARC enforcement, DNSSEC, MTA-STS and more — delivered as a confidential PDF report.

0 / 20 min
Current security posture (self-declared — improves CERA score accuracy)
Your data is hosted and processed in Tunisia on secure servers operated by Convergent Cloud Computing. It is never transferred to third parties for commercial purposes.

🔒 Tick "I would like to be contacted by your team" above to unlock senior engineer review.

Download link password

Click to copy — save this password. It protects your secure download link, not the PDF itself.

Your report will be delivered securely via our self-hosted portal.