Solutions

 Advanced Solutions
Whether you need to protect your business or exercise your 4th amendment rights, ask us for a free consultation with a Certified Information Systems Security Professional.
Whether your business operates on your laptop or across a suite of network servers, you rely more and more every day on the reliability of your network. The most consistent IT problem we see is the need for proven and reliable backups. Many businesses are unprepared. Some do not have adequate plans and strategies in place.

Some think that their data is securely backed up, when in fact it is not. Some find that they can’t restore their data only when it’s too late. With our storage solutions, we prove that we can restore your data through periodic tests tailored to your business needs.

Advanced Personal Solutions

Customized Encryption Services. When it is absolutely, positively FOR YOUR EYES ONLY.

PC Monitoring. Know exactly what is happening on your computer at all times.

Personalized Training and Workstation Hardening – We give you the same tools that our security specialists use and train you how to use them.

Advanced Business Solutions

Penetration Testing – Penetration testing involves controlled attempts to exploit vulnerabilities in your systems, processes, or personnel to reveal weaknesses in your information systems security. It is an essential part of a well rounded plan..

Security Incident and Event Monitoring – Discover and prevent the attacks that are taking place daily against your system.

Custom Computer Programming – Our staff has degreed engineering professionals and over 28 years of experience in software development.

 Training Solutions
Technology alone can never secure your business. Your employees are the most important element and the weakest link in your Information Systems security.
MaceTech Security Solutions Inc. can arm your employees with the information to stay safe and secure in our wired world. We will train you and your staff individually or conduct on-site training seminars.

Our training is hands-on and practical, showing specific steps that you can take today to improve your safety and security.

Business Continuity Management is not only about backing up data. It requires an understanding of your business. What sensitive data do I need to protect? What are the consequences if it is lost or stolen? How long can my business survive without my critical systems? What do government regulations require? Where am I vulnerable?

As technology prices shrink and reliance on information systems grows, many businesses need to reevaluate their backup plans to find the “right” level of business continuity. MaceTech can help you find the answers.

On Site Training

Help Desk Hotline with guaranteed results and response.

On-site support for those problems that can’t be resolved remotely.

Learn the following :
• What are the threats? Who are the bad guys? How do I protect myself?
• How do I set up and use facebook and gmail most securely?
• How do I keep up with all these passwords?
• What techniques are the bad guys using?
• How do I know if my system has been hacked?
• What is encryption? Do I need it?
• eTech’s support staff maintains the highest standards of training and certification.

 Support Solutions
When your systems are offline, your business loses money. MaceTech is committed to protect not just your security, but your bottom line as well. We stand behind all our services and products.

MaceTech Security Solutions Inc. is ready to be the provider of all your IT needs. Many of our solutions require a support contract. Contact us for a complete consultation.

Support Features

Help Desk Hotline with guaranteed results and response.

On-site support for those problems that can’t be resolved remotely.

The right level of support for your problem

• Technician — Trained, capable technicians for daily software and IT support needs.

• System Administrator -– Certified system administrators to handle your server installation, configuration, and troubleshooting needs.

• Network Engineer -– Expert network engineers to diagnose and troubleshoot your network issues.

MaceTech’s support staff maintains the highest standards of training and certification.

 Protection Solutions
Managing the Protection of your Information Systems can be time consuming and costly. Don’t let the cost and time prevent you from staying safe. Let MaceTech automate your protection.

MaceTech Security Solutions is a Kaspersky Green Team partner and recommends, sells, installs, and manages Kaspersky Lab products. MaceTech can install these tools and train you and your IT staff to maintain your security posture. Or leave the driving to us and we will maintain your security, providing you monthly updates and reports.

MaceTech Security Solutions will perform initial scans on your systems to reveal vulnerabilities and weaknesses in your networks and applications. Call us for your initial assessment today.

Protection Features

Manage your entire office network from one PC.

Real-time protection against viruses, Trojans, worms, spyware, key loggers, and more.

Protect servers, workstations, and mobile devices.

Control access to PCs, the Internet, applications, games, websites, IM and social networking.

Establish and enforce password policies.

Schedule automated, password-protected backups for all PCs and Servers.

Create secure, encrypted file “vaults” to store and transfer sensitive data via email or USB drive

Perform vulnerability scanning and automate update patching of all operating systems and applications.

PC clean-up tools to keep your systems running smoothly and securely.

 Storage Solutions
Are you prepared for a
major disaster? Can you
survive your next system
crash? How much downtime
can you afford?
Whether your business operates on your laptop or across a suite of network servers, you rely more and more every day on the reliability of your network. The most consistent IT problem we see is the need for proven and reliable backups.

Many businesses are unprepared. Some do not have adequate plans and strategies in place. Some think that their data is securely backed up, when in fact it is not. Some find that they can’t restore their data only when it’s too late. With our storage solutions, we prove that we can restore your data through periodic tests tailored to your business needs.

Business Continuity Management is not only about backing up data. It requires an understanding of your business. What sensitive data do I need to protect? What are the consequences if it is lost or stolen? How long can my business survive without my critical systems? What do government regulations require? Where am I vulnerable?

As technology prices shrink and reliance on information systems grows, many businesses need to reevaluate their backup plans to find the “right” level of business continuity. MaceTech can help you find the answers

.

Business Continuity Planning

Level 1: Basic Workstation and Server Backup
• External hard drive with backup software.
• Nightly image backups. Grab it and go in case of an emergency.
Level 2: Network Access Storage with Remote NAS Backup
• Large business technology now affordable for the small business.
• Fault tolerant mirrored data storage for your entire office with offsite backup.
Level 3: ShadowCloud — Servers are mirrored in the cloud
• Virtual Failover — access your server in the cloud to ensure there are no
disruptions to your business.
• Production Testing — test upgrades and patches before going live.
• Verification of Data Integrity — Test your backup systems to ensure that data is
backed up and recoverable in an operational environment.
 Network Solutions
MaceTech Security Solutions will evaluate your network architecture to ensure that critical systems are protected with the latest firewall, router, and security device technologies.
MaceTech Security Solutions is an authorized reseller of Meraki Network Products. Meraki offers state-of-the-art cloud-based management.
Let us show you how this unique Meraki technology will allow you, the business owner, to understand and control what is happening on your network.

TAKE CONTROL OF YOUR NETWORK!

Built-in Security including Next Generation Firewalls and Virtual Private Networks

Customized monthly reports detailing your network usage, including bandwidth used, websites accessed, and applications using the network.

Browse to your network management website and discover a real-time view into your network. Who is accessing it and what are they doing.

Content Filtering– Control which websites your users can visit and what type of activity you allow on your network.

Traffic Shaping – Assign the highest bandwidth to the highest priority applications and users on your network. Throttle the bandwidth for low priority uses. Adjust the bandwidth usage for times of day.

Remote Diagnostics – Identify misconfigured ports and faulty cables.

Ask us about performing an on-site demonstration of our solutions and setting up an evaluation system at your site!

*