Services
Please allow us the opportunity to help build your infrastructure by providing complimentary consultation and/or recommendation. If we do not know the technology, in most cases we can provide references that can aid in the endeavor. With many years of experience, we have an uncanny ability to understand your information technology needs. We will develop lasting work relationships with key stakeholders by ensuring that projects remain driven for strategic business needs while supporting the underlying technical and legal requirements of the organization’s operation while being on time and under budget.
We are a Dell Solution Provider. If you are not a Dell hardware fan, we have experience with HP/Compaq, Lenovo, and other vendors. We are also a QuickBooks Pro Advisor, Microsoft Partner, SonicWALL Certified, Hornet Security Backup Services & ESET reseller and hold Degrees in Business Administration & Computer Science.
As employees, we have been given awards for our work managing help desks and staffing information technology departments. As consultants\contractors, we have been in too many companies to mention them all. We have learned from answering technical support phone calls and tickets to making network and terminal cables to managing information technology departments to provide competent and complete resolutions.
Technology and especially security is always changing. We force ourselves to train and re-train with the new technologies and connectivity protocols and ciphers. Priding ourselves as resourceful, we will help you help yourselves or can just do it for you if so desired. We will help build infrastructure, process, procedures, and polices by creating, modifying, and/or implementing policies and procedures. We are also the firemen of technology fixing connectivity and functionality issues. We have an in-depth knowledge of National Institute of Standard and Technology (NIST) 110 controls and the proposed Cybersecurity Maturity Model Certification. We provide NIST 110 control consulting, suggestions, and implementation assistance with penetration testing services with specific intent(s) and with prioritized remediations to improve your organization’s security posture and meet legal requirements and strategy using our partners due to scope and complexity of penetration testing.
Specializing in small businesses especially Accounting, CPA, Construction/Fabrication, and Machine Shop organizations our services consist of implementations, configurations, and use of (not intended to be an exhaustive list):
American Contractor |
ProContractor |
QuickBooks |
Lacerte |
Lacerte DMS |
Prosystems fx Engagement |
Sage |
SharePoint |
Exchange (Email Server) |
IIS |
Server 2019 including HyperV Virtualization |
Server 2016 including HyperV Virtualization |
(Including Migrations) from NT 4.0, Windows 2000, Server 2003 especially Small Business Server 2003, Server 2008 especially SBS 2008 & 2011, and Server 2012 |
Linux Distros: RedHat Ubuntu Suse Others |
Remote Web Workplace and Remote Desktop Protocol |
Office – all versions |
Word |
Excel |
PowerPoint |
Access |
Publisher |
Access |
Outlook |
Visio |
LAN Surveyor |
Networking Firewall Equipment
Sonicwall | VPN |
Cisco | TLS |
Juniper | Port Forwarding |
Ubiquiti | Wireless Access Points |
HP/Aruba | NAT |
Netgear | DHCP |
Dlink | DNS |
Dell |
EMC |
HP |
NetApp |
Iomega |
Buffalo |
Altaro |
StorageCraft ShadowProtect |
Acronis |
Veritas Backup Exec |
Veeam |
Legato |
Datto |
Microsoft |
NTbackup |
ArcServe |
Others |
Clonezilla |
GHOST |
Acronis |
ImageX |
Others |
Xerox | Canon | LexMark |
Brother | Fujitsu | Cardscan |
Ricoh | HP | Konica Minolta |
Others |
Phones |
66 Blocks |
Network Drops |
Patch Panels |
Others |
ESET |
Trend Micro |
Symantec Norton |
McAfee |
Avast |
Kaspersky |
Others |