Built to last.
Engineered to withstand.
Convergent architects, secures and governs resilient IT infrastructures for structured and mission-critical organisations — engineered to reduce operational risk, ensure long-term continuity and deliver measurable return on infrastructure investment.
Engagements are structured, project-based and governance-driven — not ad-hoc IT support.
Commitment · Trust · Innovation
Our Services
Structured cybersecurity architecture designed to reduce attack surface, enforce policy governance and enable documented compliance — delivered by a vendor-neutral integrator.
Network Security & Firewall
Strengthens perimeter control, reduces lateral movement risk and enforces policy governance across distributed environments.
OPNsense / Zenarmor NGFW architecture with network segmentation, IDS/IPS policy enforcement and authenticated VPN. Designed against your operational topology with documented rule sets, change control and perimeter audit trails.
Endpoint Protection
Improves threat detection coverage, minimizes ransomware exposure and enforces endpoint policy compliance.
GravityZone EDR and Avast Business Hub deployed under centralised policy governance. Threat detection, ransomware containment, real-time telemetry and compliance reporting across the full endpoint estate — on-premise or hybrid.
Email Security
Reduces phishing exposure, enforces domain authenticity and protects executive communication channels.
Proxmox Mail Gateway with Avast engine deployed upstream of your mail infrastructure. Anti-spam, anti-phishing, malware filtering and SMTP hardening. SPF, DKIM and DMARC enforcement at the gateway level.
Storage & Backup
Enhances data integrity, accelerates recovery time objectives (RTO) and supports documented continuity planning.
TrueNAS ZFS storage with Proxmox Backup Server. Immutable snapshots, incremental-forever backups, synchronous cross-site replication and formally documented disaster recovery procedures — engineered to your RTO/RPO and operational continuity requirements.
Mobile Device Management
Enforces device compliance, secures corporate mobility and centralizes endpoint governance.
Headwind MDM — open source Android enterprise management. Application policy enforcement, real-time device inventory, compliance reporting and remote wipe. On-premise deployment, no cloud dependency.
Enterprise Networking & Optical
Ensures infrastructure performance stability, reduces hardware bottlenecks and enables scalable network growth.
FS.com partnership: fibre optic backbone design, enterprise-grade switching, structured cabling and SFP/SFP+/QSFP transceiver integration. Physical layer infrastructure engineered for long-term operational reliability.
Productivity & Digital Trust
Secures document workflows, strengthens digital trust and supports compliance-aligned collaboration.
ONLYOFFICE Docs Enterprise — open-source office suite with full MS Office compatibility. eIDAS-qualified electronic signature via Universign by Signaturit. Odoo ERP deployed on-premise under your control.
Consulting & Technical Audit
Identifies architectural gaps, documents risk exposure and aligns infrastructure design with governance objectives.
Infrastructure current-state audit, architecture design review and needs qualification. We assess your environment against operational objectives and compliance requirements — producing structured, vendor-neutral recommendations that are formally documented and independently verifiable.
Strategic Technology Partnerships
Our strategic technology ecosystem is selected for enterprise maturity, on-premise deployability and alignment with structured governance requirements. We integrate these technologies within documented, auditable architectures — not as a marketplace, but as engineered solutions.
Full-featured open source firewall on FreeBSD. Stateful filtering, OpenVPN/WireGuard, IDS/IPS via Suricata, HAProxy reverse proxy, VLAN 802.1Q. Ideal for organisations with in-house expertise.
Decisio subscription unlocking exclusive premium plugins: OPNcentral multi-site management, OPNWAF web application firewall, integrated GeoIP, OpenID Connect and an enterprise-tested update repository with priority patches.
Convergent deploys and configures OPNsense environments and sells official Decisio support subscriptions — giving your organisation direct access to Decisio professionals, their SLA, priority patches and vendor expertise.

Purpose-built OPNsense hardware appliances in desktop and rack-mount form factors, engineered for reliability and long-term operational continuity.
Layer 7 application filtering on OPNsense. Application identification, basic web content filtering, basic reporting. Ideal for testing and small environments without commercial requirement.
Advanced NGFW analytics: deep TLS inspection, granular application policies, Active Directory user-based rules, threat intelligence, cloud reporting dashboard, multi-device management and REST API.
Convergent deploys Zenarmor on your OPNsense stack, configures AD/LDAP user-based policies, sets up TLS inspection and delivers ongoing operational support under a contractual SLA.
Centralised antivirus/antimalware for SMEs. Cloud console, Network Attack Defense, Web Access Control, Device Control, Endpoint Risk Analytics. Fast deployment, no heavy on-premise infrastructure required.
Adds HyperDetect machine learning, Sandbox Analyzer cloud, Fileless Attack Defense, attack forensics, Exchange and SharePoint server protection.
Full EDR with cross-endpoint correlation, automated threat hunting, incident history and XDR. MITRE ATT&CK Evaluations leader. On-premise Virtual Appliance deployment available.
Convergent handles sizing, on-premise Virtual Appliance deployment, AD/LDAP integration, security policy configuration and incident follow-up under a local contractual SLA.
Next-gen antivirus with cloud management console. File/Web/Mail/Behaviour Shields, CyberCapture sandbox, Firewall, Real Site DNS protection, Exchange and SharePoint server protection included.
Premium adds VPN (no data limit), USB Protection and Ransomware Shield. Ultimate adds automated Patch Management for Windows OS and hundreds of third-party applications — plus CVSS scoring.
Real-time antivirus for Linux servers: Red Hat, Debian, Ubuntu (32/64-bit). File Server Shield via fanotify, CommunityIQ threat intelligence, streaming updates, DEB/RPM packages and cron-based VPS auto-update.
Convergent deploys and manages Avast Business Hub, configures security policies, integrates with Active Directory, handles Linux server agent rollout and delivers post-production support under SLA.
eIDAS-compliant electronic signature for contracts, HR documents, NDAs and sales proposals. SMS/email OTP authentication, audit trail, timestamping and bulk send. Integrates with ONLYOFFICE DocSpace.
Highest legal level under eIDAS. Equivalent to handwritten signature, legally binding across the EU. Requires identity verification. Required for notarial acts, public procurement and regulated financial documents.
Convergent integrates Universign into your workflows via REST API: ONLYOFFICE DocSpace, Odoo, custom ERP or document portals. We handle the legal configuration, user training and ongoing support under SLA.

Desktop/compact rack appliance for SMEs and remote offices. Up to 12 bays, up to 250 TB, native ZFS with auto-heal, snapshots, encryption and IPMI. Silent profile suitable for office environments.

2U/4U rack appliances for server rooms and datacenters. Full redundancy (PSU, fans, controllers), 25/100GbE, SAS/NVMe hybrid drives. Designed for 24/7 availability.
Dual active/active controllers, NVMe hybrid, up to 20 PB at 20+ GB/s. Enterprise Support included. For critical workloads, virtualisation and AI with near-zero RTO.
Convergent sizes to your RTO/RPO requirements, deploys ZFS (RAID-Z2/Z3, pools, datasets), integrates with Proxmox VE and provides post-deployment support under a local SLA.
Full range of L2/L3 managed switches, routers and 1GbE–400GbE network equipment. Compatible with Cumulus Linux and SONiC open NOS. Cost-effective alternative to Cisco/HPE for structured environments.
Cat6A/Cat8 cables, SFP/SFP+/QSFP28 modules, patch panels, OS2/OM4 fibre patch cords and complete structured cabling solutions for datacenters and server rooms. Multi-vendor compatible.
Convergent designs and deploys physical network infrastructure: IP addressing plan, structured cabling, patch bay, switch configuration and continuity testing. Documented, verifiable deliverable.
On-premise document editing server. Real-time co-editing of Word, Excel, PowerPoint. Full MS Office compatibility, 40+ connectors (Nextcloud, Odoo, Alfresco, Confluence). Scalable to thousands of users. Priority support included.
Document collaboration with granular-rights secure rooms, external sharing without account, integrated PDF e-signature, AES-256 encryption, SSO/LDAP, GDPR compliance and full audit trail. On-premise SharePoint alternative.
Convergent deploys on-premise (Docker/VM), integrates LDAP/AD, migrates from MS Office or Google Workspace, configures rooms and rights, and provides post-production support under a contractual SLA.
On-premise Android MDM. App deployment, security policies, device configuration, single-app kiosk mode. No external cloud dependency — all data stays on your infrastructure.
Adds geolocation, multi-tenant management, advanced reporting, full REST API, SSO/LDAP integration and push notifications. Official Headwind support available. For industrial or field fleets (100+ devices).
Convergent installs and configures Headwind MDM on-premise, integrates your LDAP directory, profiles mobile security policies and manages fleet enrolment. Operational monitoring and support under a local SLA.
Every technology in our ecosystem is selected on technical merit, security posture and long-term interoperability — and available for direct purchase as standalone licences, support subscriptions or hardware, independently of any integration engagement.
Infrastructure Governance & Risk Control
Governance is the foundation of our integration methodology. Every deployment includes structured documentation, risk evaluation, lifecycle planning and compliance alignment to ensure audit readiness and operational resilience.
All solutions are deployed on-premise or in your sovereign environment. No cloud dependency, no third-party data access, no vendor lock-in. Architecture engineered for GDPR-alignment and national regulatory compliance.
Infrastructure Risk Mapping
Systematic identification and assessment of exposure points across your entire IT estate — network, storage, identity and endpoints.
Attack Surface Reduction
Hardening of exposed services, lateral movement containment and segmentation — applied to real operational constraints.
Operational Continuity Design
Redundancy, failover and recovery architectures built to match your RTO and RPO — not generic templates.
Vendor-Neutral Architecture Validation
Independent review of existing or proposed architectures — evaluated on technical merit, not commercial relationships.
Documentation & Compliance Traceability
Full architecture documentation, change logs and compliance mapping — auditable at any point in the engagement lifecycle.
Industry Solutions
Each sector has its regulatory and operational constraints. We adapt our architecture and approach to your specific environment.
Finance & Banking
- Regulatory compliance (PCI-DSS)
- High availability infrastructure
- Advanced threat detection
- Sensitive data encryption
Healthcare & Clinics
- Patient data protection
- Data encryption at rest & transit
- Disaster recovery planning
- Medical network segmentation
Manufacturing
- Secure OT/IT convergence
- Real-time monitoring
- Industrial data backup
- Mobile fleet management
Retail & Commerce
- Point of Sale security
- Multi-location management
- Customer data protection
- Integrated ERP & CRM
Legal & Notarial
- eIDAS electronic signature
- Secure legal archiving
- Communications encryption
- Sovereign document management
Public Sector & Education
- Digital sovereignty
- Auditable open source solutions
- GDPR compliance
- On-premise hosting
What Sets Convergent Apart
Governance-driven architecture and documented risk reduction. Vendor-neutral integration aligned with operational objectives. Lifecycle sustainability and audit-ready deliverables.
On-Site Presence, Tunis
Headquartered in Tunis with direct operational knowledge of the local regulatory environment. Engagements are on-site — not remote support tickets. Response and intervention timelines are contractually defined.
Governance-Driven Architecture
Every deployment is documented, structured and auditable. Engagements follow a defined methodology — from qualification to handover — with measurable outcomes and no ambiguity in scope or responsibility.
Linux & Cybersecurity Expertise
Linux architecture since 1997. Cybersecurity practice since 2004. Depth of expertise that predates most current security frameworks — applied to real operational environments, not theoretical benchmarks.
Long-Term Infrastructure Strategy
We privilege maintainability, lifecycle clarity and technical sustainability. Infrastructure designed today must remain operable, auditable and extendable over a 5-to-10-year horizon without vendor dependency.
Risk Reduction Focus
Security posture and operational continuity are engineered from inception — not bolted on post-deployment. Risk is mapped, quantified and mitigated through architecture — not through software alone. You retain full ownership of your infrastructure and data.
Vendor Neutral
We recommend solutions based on merit and fit — not vendor relationships. Every recommendation is technically justified and independently verifiable.
Our Process
A five-phase engagement model aligned with consulting best practices — from current-state diagnosis to long-term lifecycle optimisation.
Infrastructure Audit & Current State Analysis
Comprehensive review of architecture, policy structure and operational dependencies — benchmarked against your continuity, security and governance requirements.
Architecture Design & Risk Assessment
Structured design aligned to continuity, security and governance requirements — with formal risk assessment and documented mitigation strategy.
Controlled Deployment & Validation
Phased implementation with documented configuration, validation checkpoints, rollback procedures and contractually defined milestones.
Operational Documentation & Knowledge Transfer
Formalized architecture documentation, access governance, runbooks and structured knowledge transfer to reinforce internal capability and operational autonomy.
Long-Term Support & Lifecycle Optimisation
Continuous evaluation aligned with infrastructure evolution and risk landscape shifts — contractual SLA-backed support, version lifecycle management and periodic compliance reviews.
Engagement Criteria
Convergent typically engages with organisations that have defined decision processes, compliance obligations and structured IT investment. Our engagement model is not adapted for ad-hoc or reactive IT requests.
Engagement Criteria
- Organisations with defined internal decision processes
- Organisations requiring business continuity assurance
- Organisations operating under compliance or governance constraints
- Organisations investing in structured IT infrastructure rather than reactive support
Outside Our Scope
- Ad-hoc troubleshooting without project context
- Undefined exploratory requests without defined scope or budget
- Short-term tactical IT interventions
- Individual or residential IT support
About Convergent
Independent integrator. Governance-driven. Vendor-neutral.
Convergent Cloud Computing is an independent IT infrastructure integrator, built on the founders' 28+ years of Linux and open-source expertise and 21+ years of cybersecurity practice.
We architect, secure and govern resilient IT environments for structured and mission-critical organisations — complementing internal IT resources and ensuring business continuity at competitive cost and within realistic timelines.
Our practice covers network security (OPNsense/Zenarmor), endpoint protection (Bitdefender, Avast Business), enterprise storage (TrueNAS), virtualisation (Proxmox), mobile device management (Headwind MDM), productivity and collaboration (ONLYOFFICE, Odoo), and qualified electronic signature (Universign by Signaturit).
Engagements are project-based, governance-driven and vendor-neutral — delivering auditable, documented architectures aligned with your sovereignty requirements, whether on-premise, cloud or hybrid.
Open Source
Cybersecurity
Partners
Lock-in
What Our Clients Say
Assess Your Cyber Exposure
All project requests undergo structured qualification review to ensure alignment with operational scope, governance maturity and architectural feasibility prior to engagement.
Every request automatically generates a free cyber security posture assessment of your email infrastructure and web presence — covering SSL/TLS grading, DMARC enforcement, DNSSEC, MTA-STS and more — delivered as a confidential PDF report.