All of our Information Technology support is provided under a Service Level Agreement. This means that you define what services and support you want us to provide your company, under what conditions we take action, and how often we are onsite or available to provide support. All of this information is placed into an Information Technology Support contract. Then when and if we provide you services under that contract, we will invoice you for services rendered. These invoices are created each week work is provided, and are typically due payment within 7 calendar days. An hourly rate is negotiated for these services and each week a new log of services provided is created and attached to our invoice for your review.
We offer serialization and control of company assets including all technology devices and software licensing. We can inventory and identify what devices are on your network and track who is using what device and what is on that device to insure compliance. Keeping track of your company assets can be overlooked when someone leaves the company. We can help establish an exit procedure that includes asset accountability and control.
It is also important to control what is being installed on your systems and who is doing it. With an inventory control application, you gain control of what is installed on your systems and network. This avoids illegal software and maintains a uniform installation on all systems on your local network and/or connecting remotely to your network.
We offer more than just creation of user accounts. We will train your employees on basic security and setup good security measures to keep your data and network safe. We will recommend procedures to make sure there are no unknown accounts in use on your network. If your business has Human Resources staff or not, we can integrate our procedures and training to comply with all business requirements.
We offer onsite desk side support services which includes a ticketing system that gives you complete visibility into what services are being provided to you and/or your employees through reports that give you insight and useful information regarding the details of support issues we have resolved.
We offer management of your anti-virus programs, to remove the requirements of the user to keep their system updated and protected from viruses and malware. Our services include protection for email, web browsers, identity theft, and system software management. We recommend a cloud based application that comes with reporting and real-time notifications of prevented attempts to corrupt your systems.
When onsite visits are not needed or possible, we also offer remote assistance via secure connection. Or, for an additional cost, we can provide phone support to assist you with step-by-step directions to resolves issues when using remote connectivity is not possible or available.
We can provide user training and application support for all of your mission critical software, whether it is installed on your local server or somewhere in the cloud. We can also provide assistance with cloud based applications or if you chose to host your application locally.