SERVICES
Managed IT
Also known as Managed Services Provider (MSP) bundles hardware and/or support for your IT in a flat monthly cost rather than hourly. This proves to be the most proactive approach available as well as assists you in having a flattened IT budget with minimal surprises.
Several different options are available as follows on a monthly cost per user:
Service and Support Options:
-
Base Package = Remote Monitoring and patch management.
-
Mid-Level = can also include EndPoint Security, and onsite hours.
-
All-Inclusive = can also include most common applications and services such as Hosted Exchange, Office Apps, Cloud File Sync, Offsite Backup, Disaster recovery plan, onsite hours and can include network equipment such as networking equipment, Next Gen Firewalls... everything you need to keep your network running.
Hardware Options:
-
Computer/Server/Network Hardware Packages = You can purchase your computing equipment at a low and flat monthly cost including onsite replacement and accidental protection.
Buying Pros:
-
Usually a better tax deduction by spreading the depreciated value across multiple years
Leasing Pros:
-
Flat predictable monthly cost
-
Flat tax deduction
-
Equipment is never out of date with planning hardware refresh cycles
-
No upfront cost of upgrading
-
Lowest upfront costs frees up cash flow to be invested elsewhere
IT Consulting Services
We provide general IT consulting services on an hourly or project basis. This can include, but not limited to:
Infrastructures
Can include designing, implementing, and managing the follow types of infrastructures:
-
On-Premises
-
Hybrid Cloud
-
Public Cloud
-
Private Cloud
Hosting and Cloud Computing
-
Virtualized Infrastructures including VMWare, Microsoft Azure, Amazon Web (AWS), and CloudStack
-
Desktops as a Service (DaaS)
-
Backup and Disaster Plan Services
-
Hosted Exchange
-
Cloud File Sync
-
Endpoint Security
-
Web Hosting
-
3D rendering systems which can cut render times from 3 hours to 10 minutes
CyberSecurity and Threat Management
We can clear the smoke and mirrors around CyberSecurity and help reduce your risk. Here are some of our approaches:
-
User Education and policy enforcement
-
Systems level threat intrusion preventing and response - Protect your endpoints, on-premises/cloud infrastructures, and most importantly prevent your data from leaking out.
-
Encryption Management across all devices and infrastructures.
-
Secured Remote Access such as VPN's to prevent prying eyes and someone from accessing your computer when connecting to rogue WiFi hotspots.
-
Alert monitoring of any suspicious activity also known as SIEM (Security Information and Event Management). In most cases, your Windows event logs let you know of problems with your systems and possible intrusions. The issue is these logs can get very lengthy and therefore are overlooked. With the help of AI artificial Intelligence, these smart solutions keep the finger on the pulse and notify us of the important alerts.
-
User Activity logging. Some of our customers go to the extent of full user activity logging to keep a historical audit trail of all user activity. These systems allow you to not only look back in time to what a user may have done, but can give you proactive alerts for suspicious activity, whether intentional or not.
-
Identity Access Management Identity or IAM is a centralized and consistent way to manage user identities (i.e. people, services, and servers), automate access controls, and meet compliance requirements across traditional and containerized environments. This helps validate the user is who they say they are so you can protect company resources by mitigating security or compliance risk. This is much more than just a username and password. 2FA, MFA, Biometrics, SSO and even more extensive measures can help keep unauthorized users out.
-
Mobile Security by means of mobile device management (MDM) can help you securely implement a BYOD Bring Your Own Device (personal devices) or a Company owned device policy. By containerizing company data on personal devices you can drastically reduce your risk as well as easily wipe only the company data off that personal device within seconds, leaving everything on the personal side intact.
-
Password Managers - Why not bring significant convenience into your life and improve your security footprint while you're at it. These are a must have.
Business Continuity Planning
We all know that all systems fail so why not implement a solid contingency plan so that your business continues to operate.
We can design a system to nearly never go down or have a recovery plan in place to recover your systems in an acceptable amount of time and adhere to smaller budgets. These systems area always designed on a case by case basis and can cost very little.
Things to consider are RTO and RPO. RTO which is Recovery Time Objective is how long you can afford to be down in the event of a disaster. RPO which is Recovery Point Objective is how much production time can you afford to lose in the event of a full recovery from backup.
Education
Lastly, but not least... the most valuable of all subjects. We ride on the premise that the more you know, the better we all are. We strive to educate you on your systems as it will help you the most. This can be done through private or group sessions, as well as every time we meet we'll try to give you a tidbit of useful information that you can use.
