You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

We service and provide on site troubleshooting and solutions for the following counties: Somerset, Warren, Hunterdon, Northampton, and the Lehigh Valley region.

We offer Remote Services and Support for clients within and outside our operating region. Our supported methods for remote support are GotoMeeting, VPN connection, and Teamviewer.

After services have been provided and upon satisfaction of the client an invoice will be sent, from there you can make your payment.

Usually we can accomodate for emergencies or project based work that needs to be done after hours or on the weekend.

Yes. We have worked with churches and non profit organizations in the past, we can work out something affordable for you.

Hardware: Dell, HP, IBM, Lenovo, Nutanix, and PC / Laptops. Network Hardware: Cisco Switches / Routers, Dell switches, Brocade switches, and Sonicwall devices.

We offer unique solutions and provide services to existing environments across open source Operating Systems such as Ubuntu, Redhat, SUSE, Mandrake, Slackware, CentOS, FreeBSD, OpenBSD. Services we offer include: custom scripts using Bash, sed/awk, Perl, and Python. We also offer solutions and services for Web services, FTP/SFTP, Database, Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, Email Hosting, IT Environment Monitoring, Windows software emulation on Linux, and virtual desktop delivery on Linux.

We support and solution any version of Microsoft Windows. We can upgrade your company computers to a newer version of Windows so your in compliance with Microsofts updates. The list of services and solutions for Windows is as follows: Configure or troubleshoot Domain issues, Dhcp, Dns, IIS, File sharing, DFS, Load Balancing, OS Hardening, Firewalls, User/Group Domain Permissions, Virus Software, Windows Defender, Performance Tuning, Upgrades, Hyper-v, WSUS, and Active Directory.

We support vendor software such as: PowerBroker by Beyond Trust, MoveIT by Ipswitch, Microsoft Office 365 and earlier versions, Lotus Notes, Monarch, Goldmine, SAP, Baan, QuickBooks, Adobe Products, Automation Anywhere, SolarWinds, Internet Explorer, Edge, Firefox, Chrome, Safari, and MSSQL

Custom scripts are provided for Linux and Windows. You tell us what you want to achieve and we develop the script and can even implement it for you. We work largely with automation, if your company is looking to automate processes we can help.

It depends on the severity of the issue. We will work with you on this and try and provide services to get your problem resolved in short time frame.

Absolutely. Getting an IT assessment done prior to project work is mutually beneficial and mandatory.

Typically for a small size company which has a maximum of 250 employees at one location the assessment will take 10 to 12 hours. Larger companies with more assets and locations will take more time. We will provide you an estimate of the time it will take prior to the assessment.

After the Assessment concludes, we will put together a report and send it off to you. The report will have a detailed list categorized by High, Medium, or Low Importance.

Here are a few reasons to get an IT assessment done other than upcoming project based work, and inventory purposes. The assessment will provide you with in depth details of your computer systems, network, and printers. Details provided are: Detect Domain Controllers Identifies domain controllers and online status. FSMO Role Analysis Enumerates FSMO roles at the site. Enumerate Organization Units and Security Groups Lists the organizational units and security groups (with members). User Analysis Lists the users in AD, status, and last login/use, which helps identify potential security risks. Detect Local Mail Servers Detects mail server(s) on the network. Detect Time Servers Detects server(s) on the network. Discover Network Shares Discovers the network shares by server. Detect Major Applications Detects all major apps / versions and counts the number of installations. Detailed Domain Controller Event Log Analysis Lists the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs. Web Server Discovery and Identification Lists the web servers and type. Network Discovery for Non-A/D Devices Lists the non-Active Directory devices responding to network requests. Internet Access and Speed Test Tests Internet access and performance. SQL Server Analysis Lists the SQL Servers and associated database(s). Internet Domain Analysis Queries company domain(s) via a WHOIS lookup. Missing Security Updates Identifies computers missing security updates. System by System Event Log Analysis Discovers five system and app event log errors for servers. External Security Vulnerabilities Lists the security holes and warnings from External Vulnerability Scan.

The easiest way to setup an appointment is to use the Contact Form on the Contact Us page. We will respond within 24 hours to your request to address your company needs.