top of page

INFORMATION TECHNOLOGY

Anchor 1
  • Fully Managed IT Support

  • Service Contracts

  • Ongoing Support and Maintenance

  • Remote and Onsite Tech Support

  • Computer Repair

  • Emergency Computer Help

  • Data Recovery and Transfer

  • Custom Server Configuration

  • Custom Software Installation

  • Computer Setup and Installation

  • Computer Virus Scan and Removal

  • Ransomware Unlock

SERVERS

File and Network security
The most important role of a file server is the network security it provides. By creating individual user and group accounts, rights can be assigned to the data stored on the network preventing unauthorized users from accessing materials they shouldn't be viewing. For example, the sales team doesn’t need access to employee personal records which should only be accessible by HR.

Increased reliability; decreased workflow interruptions
Many servers are equipped with redundant power supplies. With a secondary power supply running in tandem, the loss of one of the power supplies doesn't affect normal system operations. The same goes for a server's storage system. Unlike an average desktop PC that uses a single hard drive, a server will typically use multiple hard drives working in a RAID configuration to prevent data loss or an interruption in workflow. In addition, many servers are also equipped with hot swappable hard drives and power supplies. These hot swappable components allow you to replace faulty hardware without interrupting the entire office.  In addition, since all employee data is being stored on the network, if a user's workstation fails mid-workday, employees can access the same files from another workstation.


Centralized data storage and shared resources
With a network server, all of the users on the network can make use of various network resources right from their desks, increasing efficiently. Some of these resources include the following:

  • Centralized data storage (RAID Array) 

  • Network Attached Storage (NAS) Devices

  • CD/DVD Towers

  • Printers and Fax servers


Virus Management
One of the greatest threats to your network is the possibility of infection from viruses, spyware and spam. So having good, updated, anti-virus software installed on your systems is a necessity. In an office of 10 people or less, systems can be maintained individually. Anything more than that, though, can become a real burden. In those circumstances, an anti-virus package that combines workstation and server virus protection into a single solution makes more sense.


Centralized Backup
All businesses should backup their data on a regular basis. By having all of your company and employee data stored in one location, backups can be performed reliably and quickly. So you'll never need to worry about what data is stored on what workstation as you do in a peer-to-peer network. Today, almost any media type can be used for backup purposes. In addition to the traditional tape drive, CDs, DVDs, removal storage and even Network Attached Storage (NAS) devices are acceptable. Your choice of media will depend on your specific backup requirements. Depending on your budget and your data retention needs, any of these would be an acceptable solution. Make sure you have at least a scheduled weekly backup, although a daily would be better.

Anchor 2
  • Access ALL your data from anywhere

  • Use any device to connect

  • Create a secure desktop

  • Print to local printer

  • Centralized Software Management

  • Reduced downtime

VIRTUAL DESKTOPS

A virtual desktop means that a user’s desktop environment (the icons, wallpaper, windows, folders, toolbars, widgets, etc.) is stored remotely on a server, rather than on a local PC or other client computing device. Desktop virtualization software separates the desktop operating systems, applications and data from the hardware client, storing this “virtual desktop” on a remote server.

The remote server that runs and supports virtual desktops uses software to create a “virtual machine” that simulates the user’s desktop environment and capabilities. In a virtual desktop environment, users access their personal desktop remotely, over the Internet, from any client device.

Anchor 3
  • Content Filtering

  • Intrusion Prevention

  • Traffic Management

  • Bandwidth Management

  • Antivirus

FIREWALL / SECURITY

If your PC is connected to the Internet, you are a potential target to an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. This means that if you, like most people shop and bank online, are vulnerable to identity theft and other malicious attacks.

A firewall works as a barrier, or a shield, between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you.

Basic firewalls such as the one included in the operating system, only monitor incoming traffic by default. This may give you a false sense of security. Keep in mind, outgoing traffic, with your credit card information, bank accounts, and social security number is not protected. A good firewall will monitor traffic in both directions. That is, both your incoming data and your outgoing data, keeping your private information safe. In addition to preventing unauthorized access to your PC, it also makes your PC invisible when you're online, helping prevent attempted intrusions in the first place.

Most sophisticated firewalls also include a feature that continuously updates the list of known good and known malicious applications. This way, the amount of questions relating to Internet access is minimized and your computer protection is always up-to-date.

Although a firewall provides critical protection to keep your PC safe from unauthorized access, it cannot remove malware from a system that has already been infected. Therefore, a firewall should be used in conjunction with other proactive measures, such as anti-malware software, to strengthen your resistance to attacks.

Anchor 4
  • Microsoft Office 365

  • Microsoft Dynamics CRM

  • Cloud E-mail

  • Google Apps

  • Cloud Storage

CLOUD SERVICES

Whether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.


Cloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.

Anchor 5
  • Microsoft Office 365

  • Intra Office Collaboration & Scheduling

  • Cloud E-mail

  • Google Apps

  • Synchronized data across all devices

  • Email - Contacts - Calendar - Notes

EMAIL

Always up to date, wherever you access it
Office 365 syncs emails, calendars, and contact information across your devices in real time. So it’s up to date, no matter what device is in your hand.

Scheduling made simple
Shared calendars let you see when people are free or busy at any time. Scheduling is easy and-as much as possible-hassle free. From anywhere.

Safeguard your mobile data
If you lose your phone, don't panic. With Office 365, you can wipe your data from it remotely to prevent unauthorized access to your information.

Create a unique look for your messages
Your emails are more distinctive when you create a custom format and more impactful when you include images. Both are possible with Office 365, which allows you to send messages up to 150 MB. Plus, with 50 GB of storage per user, you can hold on to the messages and files you need.

Build your brand
Use your own domain name with your email accounts, so every time you send a message, your business name is featured.

Get advanced email features
In some plans, you have archiving capabilities for legal discovery and compliance, plus eDiscovery to identify, hold, and analyze data across your business.

A clean, ad-free inbox
Spend your time communicating—not managing email accounts, worrying about how to protect your email, or slogging through an inbox cluttered with ads. With a simplified admin center and built-in security, Office 365 takes the work out of managing your email.

Built-in tools for managing
You can access the admin center from anywhere to set up new user emails, restore recently deleted accounts, create custom scripts, and more.

Built-in defense for security
You'll have industry-leading anti-malware protection and anti-spam filtering to guard your email from those ever-present mail threats.

Anchor 6
  • Onsite and Offsite Backup

  • Remote Backup to Cloud

  • Diskimage Backup

BACKUP

Backup of vital company information is critical to a company’s survival, no matter what size the company. Recent studies show that 93 percent of businesses that lose data due to a disaster go out of business within two years.

 

Data protection solutions that combine the latest advancements in disk-based backup with secure, integrated online technologies offer businesses fast and assured recovery of their critical business data while freeing limited technical staff for more value-driven tasks. They also reduce the burden of removing the data and storing it safely offsite, protecting it from local disasters.

  • Comprehensive andreliable data protection - assures up-to-date recovery of all critical business data, including the backup of data in open files

  • Automatic and secure offsite electronic vaulting - guarantees successful disaster recovery

  • Better control over restoring data - gives businesses access to data when and where it’s needed — for any reason

  • Improved security - for all sensitive data ensures protection during backup, transmission and storage

  • A complete data protection solution - addresses the entire data protection workflow and provides a higher level of reliability, productivity and cost containment

  • Immediate data restoration - either over the Internet or from onsite rapid recovery appliances reduces downtime costs

  • Enhanced ability to demonstrate compliance - with regulations around information protection is enhanced through consistent, repeatable processes and controls

  • Freedom from routine backup and restore tasks - allows redirection of staff time to value-driven projects with greater impact on productivity and profitability

  • Increased competitive advantage - is promoted through improved access to data, more predictable cost control and flexible solutions that change with the business

  • Greater reliability in recovering all data - where and when it is needed is ensured, with successful data recovery guaranteed in writing

Anchor 7
  • Internet remote access client connections

  • LAN-to-LAN inter-networking

  • Controlled access within an intranet

  • Secure Tunnel

VPN

A Virtual Private Network (VPN) supplies network connectivity over a potentially long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and similar network services.

 

A VPN can work over both public networks like the Internet and private business networks. Using a method called tunneling, a VPN runs over the same hardware infrastructure as existing Internet or intranet links.


VPN technologies includes various security mechanisms to protect these virtual connections.

 

Virtual private networks generally don't provide any new functionality that isn't already offered through alternative mechanisms, but a VPN implements those services more efficiently and cheaply in most cases. Specifically, a VPN supports at least three different modes of use:​

bottom of page