top of page
clouds.JPG

SERVICES

Wall_street.JPG

Services

Application Development

Applications are an important part of any business. Whether is it an off the shelf Microsoft Office Suite or a custom application, we can help. We have integrated hundreds of applications, provided support and developed numerous websites. In addition, our SQL database analysts have created highly available high performing customized database environments for many industries. We have also developed highly available Exchange messaging platforms and remote access systems.

Application Development Services:

  • Application installation and packaging

  • Database design, performance tuning and backups

  • Database conversions and migrations

  • Document Management Systems

  • Legal litigation support and e-Discovery solutions

  • Licensing and proper use

  • Matter-centric applications for law firms

  • Messaging: Outlook and mobile solutions

  • Microsoft Office

  • Paperless office solutions

  • Records Management Systems

  • Patching and updating

  • Word template systems

  • Sharepoint website design

  • Website design  

Business Continuity-Disaster Recovery

Business Continuity/Disaster Recovery is important to all firms but is not always taken seriously. We have developed and tested a number of Business Continuity/Disaster Recovery procedures for several firms in the NY/NJ/PA area. As part of your BC/DR  plan you should be sure that you identified those who can 'declare' an emergency and that you can recover from a disaster that impacts your firm's ability to conduct business. Conduct a Business Impact Analysis, inventory all systems, create an Incident Response Team, schedule annual penetration tests, identify those critical systems and staff needed to keep the firm in business in the case of a disaster. Most important is to test the actual BC/DR plans before a disaster occurs. Many times this process is skipped and it is assumed by management that everything will work in a disaster but to be proactive it is best to identify pilot testers in all departments, simulate a disaster over a weekend, recover/test those systems thoroughly and then regroup for a postmortem meeting. Lastly, be sure you update documentation and test BC/DR plans annually. You don't want to find out that a newly installed critical application was not added to the BC/DR Plan. Most auditors will request proof that the BC/DR Plan is updated and tested annually or you will fail those audits. 

Business Continuity - Disaster Recovery Services:

  • Audit and Identification of critical systems

  • Backup/Restore setup and testing

  • Documentation and Planning

  • Emergency communication

  • Remote access 

  • Simulated testing

  • Temporary office space

Cloud Solutions

Cloud services reduce overhead and allow IT to focus on critical projects rather than on maintaining systems. When selecting a Cloud provider the SLA is key. The location of the vendor's 'cloud ' can have a huge impact on the performance of your systems due to latency. Latency is the delay for an electronic signal to cross over a distance to its destination. Measured in miliseconds, you want a maximum of 20 milliseconds of latency if possible between your office PC/Laptop and your cloud data center.  Housing your cloud data center 1,000 miles from your office is a bad idea. The closer the 'cloud' data center is to your office location, the better the office performance (user experience) will be. For a Windows environment in a MPLS/VPLS network we found that having your cloud data center less than 500 miles from your office will provide good latency as a general rule of thumb. You can choose to have your data center >1,000 miles away but this may require expensive WAN 'accelerators' to accomplish achieving the acceptable level of performance you require at your desktop.

Cloud Solutions:

  • High Availability

  • Review and selection of IAAS, SAAS, PAAS cloud services 

  • Review of SLAs

  • Selection of vendors

  • Testing against cloud provider

Cybersecurity

We have extensive experience in all areas of security. Whether conducting audits or addressing data governance issues. We have developed many technology and legal security related policies over the last 5 years. We responded to and addressed various client audits from Fortune 100 banking, pharmaceutical, health, insurance and transportation clients resulting in meeting 100% compliancy with no loss of future business for our clients and with a minimum investment. Below is a subset of policies we have created. We have also developed Incident Response Plans and Security Awareness Training videos.

Cybersecurity Services:

  • Assessment

  • Backup and restores

  • Client audit responses

  • Data Loss Prevention solutions

  • Designing a locked-down desktop

  • Equipment Disposal

  • Firewall rules

  • Hard drive encryption

  • Internet Secure File Sharing

  • Mobile Device Management

  • Patch Management

  • Penetration and vulnerability testing

  • Secure WIFI

  • System Monitoring 

  • Two factor authentication 

Sample Policies:

  • Account Management Policy                 

  • Asset Management Policy     

  • Background Check Policy      

  • BYOD Policy      

  • Computer Use Policy      

  • Departure Policy           

  • Document Destruction Policy      

  • Dual Factor authentication Policy   

  • Email Usage Policy   

  • Encryption Policy       

  • Lockout Policy     

  • Offsite Storage Policy     

  • Password Change Policy            

  • Remote Access Policy     

  • Secure File Sharing Policy      

  • System Change Policy         

  • Third Party Contractor Policy    

  • Visitor Policy   

Desktop

Physical, virtual or thin client, we have designed and deployed thousands of desktops at various firms.

 

Desktop design requires tuning and integrating of Windows 7/8/10 and all firm applications to create a high performing, stable and secure desktop, enhancing the user experience. In addition, configuring boot up, login, profile, services, anti-virus and drive mappings to standardize the desktop and simplify access to all firm applications. Our methodology is to take a subset of users from each department and let them 'kick the tires' of the new prototype PC then regroup and discuss what works, does not work and what would be nice to have. We use web based surveys to gather feedback, it is a great way to save time, track all the issues and customize the desktop to the user's needs. 

Desktop Services:

  • Anti-virus/Malware remediation

  • Application Integration

  • Citrix desktop design

  • Copying/imaging processes

  • Desktop/Laptops/Tablets configuration 

  • Leasing and Financing options

  • Patching process

  • Performance tuning

  • Physical or Virtual 

  • Windows or Wyse/thin client design​​

 

Network Solutions

We have handled various network implementations. Built in-house data centers, hosted data centers and partnered with cloud data center providers. In addition, we have migrated and virtualized data centers, creating highly available infrastructures using Microsoft clustering architecture for Windows, IIS, Active Directory, SQL and Exchange platforms to create a highly available environment. Deployed secured WIFI solutions. Designed remote access platforms supporting firms with over 5,000 users.  

Network Solutions:

  • Architecture - WAN/LAN selection

  • Firewalls

  • Storage

  • High Availability

  • Penetration Testing

  • Remote Access

  • Router & Switch Implementation

  • Security Audits

  • WIFI

Support

Support is critical to a firm's operations. We provide all levels of support for your technology needs. Whether it is first level Help Desk support or third level network and application support. We have also developed SLAs for various firms to improve their support and target those areas which require a higher skill set. In addition, we can perform an analysis of your Support Desk and recommend ways to improve the overall service provided to the user community.

Support Services:

  • After hours support

  • Escalation procedures

  • Identifying trends

  • Analysis and development of reports

  • SLA development

  • Ticket handling

bottom of page