The Fully Managed Workstation Solution is designed to proactively maintain workstations by delivering regular maintenance, monitoring, management, unlimited remediation, Helpdesk and emergency support. All fully managed services are delivered by our 24/7 Network Operations Center, and are designed to reduce the likelihood and impact of an unwanted technology failure, while resolving any identified issues, for a fixed monthly price.
Managed Workstation services is an excellent option for anyone who would like the management and user benefits of being in a well-managed environment without the technical burdens.
Service levels and rates allow flexibility in managing and reducing your information technology (IT) costs.
Basic elements included are:
- Operating System Support and management
- Windows and Mac Updates
- Scheduled Pre-Defined Patch maintenance windows
- Anti-virus software installation and maintenance
- Proactive security mitigations for high risk vulnerabilities
- 24/7 Cloud Monitoring
- Asset Discovery for Hardware & Software
- Hacker Checks
- Daily, Weekly, Monthly and Executive Reporting
- Day to day support of your workstation including software installation
- Full Alerting including SMS to your Mobile devices
- ONLINE Dashboard for centralized administration
- Multiple Site Support – Set views and alerts of Workstations and Server by site
- Aegisys Helpdesk Expert Remote Support
- Mobile Apps – View your PC status with Aegisys Mobile apps from anywhere
Scheduled Preventative Maintenance
Regular preventative maintenance required to maintain the basic operation of Windows workstations, including:
The following services are not included in the Fully Managed Workstation Solution:
|Please note that Out of Scope activities may be billed at our hourly rate based on agreement. Aegisys Helpdesk will contact the customer for approval before performing any out of scope task.|
Unlimited Remote & Onsite support
Aegisys will remediate issue related to the covered devices, identified either via monitoring & notification, or those initiated through contacting the Service Desk. In both cases, a service ticket will be created and prioritized based on severity. The service desk will attempt to resolve the issue remotely, escalating to level 2, then level 3 engineers as required. If the issue cannot be resolved remotely, a field technician will be dispatched where applicable.
Why Secure Mobile?
More employees than ever now work remotely and this is the new norm. More than ever, employees need a secure mobile app experience that is as good as the end-user app experience they get while working in the office on their desktop or laptop. It’s important that enterprise data can be accessed quickly from mobile devices and as a consequence, these devices are also increasingly targeted by hackers because of their limited security. Furthermore, mobile devices can be lost or stolen, and it is critical for companies to prevent the wrong people from accessing their data and other intellectual property. As long as employees have a need to conduct work business on personal devices, security risk will remain high.
Mobile threats are on the rise and you need a easy cost effective method of securing your mobile devices. Get Managed Mobile!
Powerful Security with Easy Management
Aegisys Managed Mobile is a secure platform for employees accessing Corporate Data via Private and Corporate mobile devices. Managed Mobile is FIPS-compliant and uses AES 256-bit encryption to secure your organization’s proprietary data and IP both on employees’ devices and in transit.
Managed Mobile places a heavy emphasis on both functionality and security, giving remote employees the freedom to collaborate away from the office as if they were still in the office. A full suite of mobile-enabled productivity applications is available via the Aegisys Toolbox including, Office 365, Enterprise Chat, Geo-location Services, File Sync & Online Backup and Secure Mobile App Management & Development functions, and more.
Manage your smartphones and tablets from our single multi-factor protected ONLINE dashboard.
We help manage your data plan costs and protect Corporate Mobile Data contents. Privately owned mobile device policies are available to offer Cyber protections on CYOD (Choose your own Device) to Corporate Data. Remotely setup email and remote features previously to have been a headache for IT Support teams.
- Location Tracking
- Ownership details
- Data Usage monitoring
- Remote Features
- Multiple device types supported
Discover how Office 365’s integrated experience can help you start and grow your small business. Empower your employees with Office 365 tools that they need to collaborate efficiently, communicate on the go, and access files with ease. Run your business with Microsoft’s must-have Business Apps, allowing you to manage bookkeeping, customer scheduling, referrals and more. These include, Word, Excel, Powerpoint, Outlook, Teams, Skype and more. All subscription based. Pay for what you use and upgrade at anytime.
Pick the right productivity suite for your business
Compare and choose from our best-in-class, secure solutions, and get advanced, world-class security with Microsoft 365.
With Aegisys Firewall Security Services, we will be alerted as potential threats are identified and mitigated so you can stay secure at all your locations. To protect your organizations’ locations effectively, you need a closely managed firewall in place. protect your organization’s data, and meet compliance requirements.
Our Managed firewall service solution is for our clients firewall operation, administration, monitoring, and maintenance of a clients entire firewall infrastructure. Aegisys will help you establish, maintain, and modify firewall rules, monitor your network, and provide feedback, reports, and analysis.
IT personnel are often expected to just “make things work.” There is tremendous pressure to keep systems up and running for day-to-day business operations. This pressure sometimes results in careless or risky configurations like in the case of a merchant where, whenever there was a problem with the firewall, an IT employee would just apply the any/any rule while diagnosing the origin of the issue. Doing so left the merchant’s network extremely vulnerable. And there is always the added risk of failing to disable/remove this rule once the testing process is complete.
For these reasons, Aegisys performs routine security checks often called pen or penetration testing looking for vulnerabilities and mistakenly open ports placing your organization at risk.
Aegisys helps you manage your business risk unlike any other.