7

Backup and Disaster Recovery

Backup and Disaster Recovery planning is the process of developing advance arrangements and procedures that enable an organization to respond to a disaster by resuming critical business functions within a defined time frame, minimizing loss, and restoring affected areas.

It is not a two-month project, nor is it a project you can forget about once it is completed. An effective recovery plan is a live recovery plan. The plan must be maintained and tested/exercised regularly.

Infrastructure Support

We can provide support for all platforms separately as well as in mixed environments. Support covers the whole network, servers, end-user systems and network infrastructure.

We are experts at remote monitoring of infrastructure which allows us to be able to configure and maintain systems without the need to travel on-site in the majority of cases. Systems do not manage themselves and require an alarm monitoring system that alerts us of failures. We however, do provide prompt on-site service when required.

Email & Spam Control

With best of breed email servers and a spohisticated spam control engine we lessen the ability of spammers and phising emails at the network level before they enter your mailbox. Dangerous attachments and email links are examined including "ZIP" files that may contain a malicious payload.

Users are able to examine their own quarantine lists to ensure there are not any false-positive detections and can release only legitimate emails.

Virus & Intrusion

It does not take much to become infected these days. The virus writers are experts at avoiding anti-virus and are therefore not detected. Once infected it is impossible to remove without professional support.

Virus & malware come in many variants and degrees of maliciousness. Virus normally are solitary operators with one purpose in mind, to cripple the computer and try and extract money out of you to fix it. Crypto or ransomware virus are a classic example of these where they encrypt all your data on the hard disk. Malware one the other hand usually comes in clumps and once on your machine invites other malware onto the computer.

Network Firewalls

All networks, large and small, deserve protection from the Internet. While there are many options for virus and spam, little attention is afforded to the ingress of any small business network. Cheap domestic modem/routers may serve a simple purpose of giving internet access to and from the network, they are often mis-configured or left wide-open to the Internet. These vulnerable networks are often hacked, servers and PC's compromised and data stolen.

Networking is a complex art requiring expertise not often found in the PC industry. Only small business specialists understand the intracisies of network port utilization, forwarding, DMZ, and blocking.

Voice Over IP

3CX is a software based PABX using standard based IP Phones, SIP trunks and VoIP Gateways to provide a full enterprise PABX solution.

3CX is a software based PBX which runs on mainstream operating systems, and works with SIP standard based IP Phones, SIP trunks and VoIP Gateways to provide a full PBX solution – without the inflated cost and management headaches of an ‘old style’ PBX. Used by more than 30,000 companies globally, 3CX has been recognized for its innovation and cutting-edge technology.

Network Management

Our Network Management Centre (NMC) gives complete visibility of the devices on your network. Active Discovery gives you as broad as possible a view of who and what is connected to any network for each customer. Alerting & viewing allows us to set up alerts for what YOU need to know about. This gives us a snapshot view of your entire network via a single pane of glass. That means we know about problems before you do.

Automated monitoring and maintenance capabilities built into the our NMC allows to stay ahead of the game. From remote servers and workstations, printers and virtual machine monitoring we have got it covered.