Managed IT Services
Inteloc provides comprehensive coverage of company workstations from an array of attack vectors.
Our ability to scale with customers and provide base monitoring of incoming data from email, the web, and network traffic keeps all workstations covered.
Through use of multiple IT software platforms we can eliminate downtime of the network and workstations by preventing malware, phishing attempts, and viruses.
Our ability to remote manage allows for ease of support by being able to access your companies computers from our offices to quickly resolve issues that may arise.
This allows small businesses to get the IT coverage required to protect data and keep workers online while saving costs of having in house IT professionals.
- Office 365 E-Mail
- 1TB OneDrive Cloud Storage
- Managed Anti Virus
- Web Filtering
- Email Protection
- Documents Backup
- Risk Intelligence Audits
- Mobile Device Protection
- Remote Management
- All the Features of Basic
- Proactive Monitoring
- Patch Management
- Office Suite
- AYCE Support
- End Point Protection
- Multiple Devices Per User
BLOCK ALL VIRUSES, BOTH OLD AND NEW
Protecting your system against viruses is like dealing with a moving target. Once an antivirus program knows how to block known malware, suddenly a new, unknown threat appears to potentially infect your workstations and servers.Managed Antivirus can help your system proactively stay ahead of all malware threats, both known and emerging.
Managed Antivirus not only keeps your network’s security up-to-date with protection against the latest known threats by using traditional signature-based protection, but it also protects against new viruses by using sophisticated exploratory checks and behavioral scans of your system.
BLOCK ALL MALWARE, BOTH KNOWN AND EMERGING
•Signature-based scanning – Extensive, signature-based threat detection works to block all known threats.
•Heuristic checks – Protect against previously unknown threats using heuristic checks, which detect unrecognized viruses in a sandbox environment away from a business’s core systems.
•Continuous, real-time monitoring – Ongoing scans of your system help detect programs that perform behaviors and actions commonly associated with malware exploits.
MINIMIZE RESOURCES NEEDED FOR THREAT PREVENTION
•Lightweight scans – By reducing the size of scans,system resources can maintain high performance levels.
•More accurate scanning – Scans that are more precise will reduce the number of false positives.
•Scheduling options – Schedule deep scans for off-hours so you don’t disrupt employees during important productive hours.
CONTROL MORE OF YOUR VIRUS PROTECTION
•Default policies – Save time by using our default policies for servers, desktops and laptops.
•Customization – Create your own policies by modifying factors such as quarantine rules, exclusion settings and definition update schedules.•Better control – Depending on your system needs, you can pause or cancel scans.
•Easy roll out – Deploy Managed Antivirus in bulk across sites, servers and workstations.
•Endpoint branding – Set up your Managed Antivirus instance to include your company name, website and support details.
Web filtering allows network operators complete control over what can and should be viewed from a server. Block lists, allow lists, device policies and access restrictions help employees stay focused and on-task, while limiting the chances of harmful applications and viruses from halting productivity, rewriting code or stealing money from accounts.
Active Discovery allows users to view every device on the network, add new devices, and categorize them. Users can also track addresses, IP addresses, Operating Systems and hostnames — all while blocking unmanaged devices from compromising networks.
Web Protection secures networks against websites and lets users track trends with detailed reporting.
- Stay on top of bandwidth usage with alerts when devices exceed thresholds
- Block users from visiting suspected and confirmed unsafe sites
- Set white lists and black lists to override category based filters
- Apply Web Bandwidth checks
- Filter Internet activity by day, category and URL to reveal trends, spikes and irregularities
- Complete with detailed reporting tools to let you analyze browsing activity and demonstrate the effectiveness of web security
Email Protection provides best-in-class protection against email-based threats, such as spam, viruses, phishing, malware, ransomware, harvesting, and more.
The systems are in sync with the central intelligence databases—core to the Intelligent Protection & Filtering Engine—and receive real-time pattern-based threat-recognition updates to help protect against emerging email-borne threats.
Mail Assure offers protection for your businesses at an affordable price.
The Mail Assure solution uses some of the most sophisticated malware detection and antivirus, anti-spam (AV/AS) technology, leveraging a constantly updated threat engine based on input from over 13 million domains added to the system—of which over two million domains are actively processing email per month.
For example, if a new phishing attack arises in Brazil, it is added to the Mail Assure threat database, helping protect other users throughout the rest of the world. The threat engine incorporates the results of SMTP behavior and reputation checks, content checks, user input from quarantine management, and more.
BACKUP & RECOVERY.
Our ability to do backup of documents allows for quick access in case of loss of data.
.DOCX—Microsoft Word Open XML Document
.ODT—OpenDocument Text Document
.PDF—Adobe® Portable Document Format
.RTF—Rich Text Format File
.TXT—Plain Text File
.WPS—Microsoft Works Word Processor File
.ODG—OpenDocument Drawing File
.PPS—PowerPoint® Slide Show
.PPTX—PowerPoint Open XML Presentation
.ODP—OpenDocument Presentation File
.CSV—Comma Separated Values File
.XLR—Microsoft Works Spreadsheet
.XLS—Microsoft Excel® Spreadsheet
.XLSX—Microsoft Excel Open XML Spreadsheet
.numbers—Apple® Numbers® Application File
.ODC—Office Data Connection File
.ODF—Apache® OpenOffice Math File
On top of document backup our offerings also include full backup of data including all data on the workstation in either the 100GB or 500GB allotments.
MANAGE AND SECURE YOUR MOBILE DEVICES
Today’s IT support solutions need to account for mobile devices and on-the-go employees.
You need a way to equip your users to be as productive as possible, while keeping your devices and data safe and secure.
Mobile device management capabilities allow you to manage and secure mobile devices.
With scalable, easy-to-configure and easy-to-manage features and a single, unified dashboard – our Mobile Device Management service offers the best solution available for securing your mobile users.
IMPROVE YOUR EFFICIENCY
•Streamline processes – Fast, automated setup and maintenance of mobile.
•Remote configuration – Easily configure email and Wi-Fi access remotely.
•Centralized view – Access all information within a single dashboard view.
•Access the information you need – See device ownership and handset details.
•Track your devices – Use location tracking and reporting for a detailed breakdown of locations where devices have been logged.
•Bandwidth monitoring – Monitor devices for data usage.
GAIN GREATER CONTROL
•Safeguard data – Remotely lock, set passcodes or wipe devices.
•Protect devices – Configure detailed security settings.
•Comprehensive device management – Support for Apple iOS, Google Android and Microsoft Windows phone devices and tablets.
MINIMIZE DISRUPTIONS AND MAXIMIZE SUPPORT WITH REMOTE ACCESS
Maintaining a secure environment that limits interruptions to users is vital to keeping them productive and delivering a positive user experience. Remote Access allows fast, secure access to any server or workstation with one click from your dashboard.
Remote Access is comprised of two parts: Take Control and Remote Background Management.
Take Control lets you offer 24/7 remote IT support whether the user is present or not.
Remote Background Management enables you to work on machines remotely to fix problems with no interruption to the end user.
•Fix problems quickly – Connect immediately to resolve issues, even through firewalls.
•Lower costs – Provide faster support to more users without additional staff and travel expenses.
•Keep productivity high – Remediate issues from your own desk.
•Report – Track, analyze and report on details regarding Remote Access sessions.
OFFER SEAMLESS SUPPORT
•No disruption to users – Remedy issues behind-the-scenes while users continue working.
•Attended or unattended – Access machines whether the end user is present or not.
•Secure connection – Access machines through a highly secure connection that has low impact on bandwidth.•Anytime access – Solve IT issues anytime, even outside of working hours from a mobile device
•Manipulate the file system – Move, copy and delete files remotely.
•Map network drives – Map drives, edit the registry and install software.
•Manage processes – View running processes and their sources they’re using, kill non-responsive processes and add a process check to monitor problem processes.
•Monitor dependencies – Show service dependencies and add a Windows Service Check to monitor problem services.
•Control services – Start, stop and restart services and change the startup type of a particular service.