Information Technology
as a Managed Service.
Tailor Easynetworks to meet your budget for IT service, support and security.
Extend your current Information Technology department using validated solutions and industry leading expertise.
Offices
Design, Secureand Support
Wired, wireless, LAN,
WAN, Internet and
Application access
Data Centers
& Clouds
Design, Secure and Support
Migration, Hybrid
and Multi-cloud
Work from
Home
Help Desk support for Remote access
Single sign on Multifactor
Authentication
Public
Hotspots
Support for secure roaming access
Single sign on
Multifactor Authentication
IT as a Service
Extend your current IT department with cost effective servicesto enhance your company productivity.
New Employees/Contractors | t&M | Basic | Advanced |
---|---|---|---|
Onboarding
We support your new employees through the steps to get them successfully deployed and productive.
|
✓ | ✓ | ✓ |
Training
We educate your employees with security awareness training for the most common cybersecurity dangers.
|
Optional | Optional | Optional |
Offboarding
We remove access and accounts of former employees to ensure tight security.
|
✓ | ✓ | ✓ |
Access | |||
Single-Sign-On
We enable your employees to use a single set of credentials to securely authenticate to multiple applications and websites.
|
Optional | Optional | ✓ |
Multifactor Authentication
We ensure your employees require two or more verification factors to gain access to a an application or account.
|
Optional | ✓ | ✓ |
Certificate Authentication
We protect your network using digital certificates to identify your employees or devices before granting access.
|
Optional | Optional | ✓ |
Role Based Access to Network
We can restrict an employee’s access to information or applications based on their position or need.
|
Optional | ✓ | ✓ |
Role Based Access to Cloud
We can restrict an employee’s access to cloud based information or applications based on their position or need.
|
Optional | ✓ | ✓ |
Support | |||
Helpdesk Support 10×5
We help your employees resolve their technical problems 10×5.
|
Hourly | Unlimited | Unlimited |
Helpdesk Support 24×7
We help your employees resolve their technical problem 24×7.
|
N/A | Optional | Optional |
Emergency Support
We respond to your company’s critical events.
|
Hourly | Hourly | Hourly |
New Devices | t&M | Basic | Advanced |
---|---|---|---|
Purchase, Provision & Deploy
We will order employee computers, configure them to your company standards, and ship them.
|
Optional | ✓ | ✓ |
New Software Installation
Our system for deploying software to your employee computers, mobile devices or servers.
|
Optional | ✓ | ✓ |
Hardware inventory
We collect and maintain an inventory of empoyee devices and their configuration in your company.
|
Optional | ✓ | ✓ |
Applications Inventory
We collect an inventory of operating system and applications on your employee devices.
|
Optional | ✓ | ✓ |
Security | |||
Advanced Virus & Malware Protection
Your company will be protected with industry-leading anti-malware technology from Sourcefire®.
|
Optional | Optional | ✓ |
Monitoring, Logging & Threat Response
We observe logs of your company devices as they’re recorded and trigger alerts if something affects system performance or health.
|
N/A | ✓ | ✓ |
Mobile Device Management
We use software that allows us to secure and enforce policies on your employee smartphones, tablets and mobile devices to your company’s standards.
|
Optional | Optional | ✓ |
Remote Access
We enable your employees to securely work remotely and use company applications and data.
|
Optional | ✓ | ✓ |
Maintenance | |||
Updating & Patching
Our process to repair a vulnerability or a flaw that is identified after the release of an application.
|
Optional | ✓ | ✓ |
Repair & Return
Our process of returning a product to receive a refund, replacement, or repair.
|
Optional | ✓ | ✓ |
Implementation | t&M | Basic | Advanced |
---|---|---|---|
Purchase, Provision & Deploy
We will order your company network hardware, configure them to your company standards, and ship them to appropriate locations.
|
Optional | ✓ | ✓ |
Hardware Inventory
We will maintain your network hardware and its configurations.
|
Optional | ✓ | ✓ |
IP Address Management
We will provide a method for planning, tracking, and managing the IP address space in your company.
|
Optional | ✓ | ✓ |
Diagrams & Documentation
We will maintain diagrams that document your network hardware and device connections.
|
Optional | ✓ | ✓ |
Security | |||
Segmentation of Devices
We will implement and manage protection between each user, device, and application within your company.
|
Optional | ✓ | ✓ |
Zero Trust
We will implement and manage protection between each user, device, and application within your company.
|
Optional | Optional | Optional |
Firewall Changes
We will maintain and manage your firewalls.
|
Optional | ✓ | ✓ |
Moves, Adds, & Changes
We will manage changes to your network.
|
Optional | ✓ | ✓ |
Monitoring, Logging & Threat Response
We will collect information and trigger alerts if something affects system performance and health.
|
Optional | ✓ | ✓ |
Maintenance | |||
Troubleshoot
We will work with your hardware vendors to toubleshoot issues and resolve network outages.
|
Optional | ✓ | ✓ |
Updating & Patching
Our process of keeping your devices running the most current and secure software.
|
Optional | ✓ | ✓ |
WAN Coordination
We will coordinate and work with all your carriers when an outage occurs.
|
Optional | ✓ | ✓ |
Internet Access Coordination
We will work with your internet provider to resolve offline situations.
|
Optional | ✓ | ✓ |
Site to Site VPN
We will secure communication between your company locations.
|
Optional | Optional | Optional |
Remote Access VPN
We will enable remote users to securely access data and applications within your company network.
|
Optional | Optional | Optional |
DNS and Domain Name
We will manage your company’s DNS and domain name services.
|
Optional | ✓ | ✓ |
Repair & Return
We will work with vendors to return defective network devices in order to receive a refund, replacement, or repair.
|
Optional | ✓ | ✓ |
Implementation | t&M | Basic | Advanced |
---|---|---|---|
Purchase, Provision & Deploy
Our process for purchasing and deploying new applications within your company.
|
Optional | ✓ | ✓ |
Data Center Deployment
We will deploy and manage data center equipment necessary for applications.
|
Optional | Optional | ✓ |
Cloud Infrastructure Deployment
We will manage your company’s cloud environment.
|
Optional | Optional | ✓ |
Application Inventory
We will maintain an inventory of all applications within your company.
|
Optional | ✓ | ✓ |
Application Documentation
We will diagram your application flows within your company.
|
Optional | ✓ | ✓ |
Security | |||
Monitoring, Logging & Threat Response
We will collect information and trigger alerts if something affects system performance and health.
|
N/A | ✓ | ✓ |
Email security
We use industry-leading security technology to protect email accounts and communications.
|
Optional | ✓ | ✓ |
Cloud Application Security
We use security technology to secure applications and data in the cloud.
|
Optional | Optional | ✓ |
Data Loss Prevention
We use security technology to blocks extraction of your company’s sensitive data.
|
Optional | Optional | ✓ |
Maintenance | |||
Collaboration Support
We support your company’s collaboration tools and applications.
|
Optional | Optional | Optional |
Software Updates & Patching
Our process to repair a vulnerability or a flaw that is identified in your applications.
|
Optional | ✓ | ✓ |
Secure Backups of Data
We securely backup your company data.
|
Optional | ✓ | ✓ |
Compliance Reporting
We can assist with your company’s compliance reports.
|
Optional | Optional | ✓ |