Business

This is a complete, 24/7 server monitoring, remediation, maintenance and management solution. Typically, a single server generates between 5-10 alerts per day. Our engineers watch the alerts, analyze them and intelligently escalate issues. Our engineers will monitor and troubleshoot server problems based on alerts and early warning information received. Icon Systems Inc. provides 24/7 advanced remote monitoring and management of Windows Servers – including applications designed for small and medium sized businesses.

  • Unlimited Support
  • 24/7 monitoring and troubleshooting
  • Windows 2000/2003/2008 Server support
  • Windows Small Business Server support 
  • Microsoft Exchange Maintenance and Administration
  • Backup Monitoring and Administration
  • Event Log Monitoring
  • Drive Space Monitoring
  • Log File Maintenance
  • Microsoft Patch Management 
  • Service Pack Installation Early Warning and Preventative Maintenance
  • User Account Administration
  • File Sharing Permission Administration
  • Security Administration
  • Anti-Virus Management

As a small business your data is as important as the data stored by large enterprises; however your information is likely at far greater risk. Without the time to routinely back up your data, you are just one virus attack away from major data loss. The bottom line is that it’s not the size of the organization that determines the value of the data. Mission-critical data is mission-critical regardless of who produces that data and it deserves appropriate protection. 

At Icon Systems Inc., we do back-up both your servers and computers to an appliance on your local network. We then also securely back that up to an offsite data center. So you have a local back up in the event that a computer crashes, and you can instantly recover that computer. You also have an offsite backup in the event of a disaster such as a flood or fire.

Firewalls, biometrics, authentication, ssl, vpn, ipsec, 3des, encryption, viruses, spyware, web attacks, content filtering. Does all this confuse you and cause you to scratch your head?

Firewalls and Virtual Private Networks protect your organization’s digital assets from external threats while providing secure access. Icon Systems Inc. will work with you to find the right solution for your organization. Our firewall partners also offer VPN solutions as a dedicated appliance or as part of the firewall.

This is the process of encoding information in such a way that only the person or system with the key can decode it. The product suite we provide protects data and communications with strong, proven security. These solutions are used to secure emails and attachments, files and folders, and entire hard drives. 

Uncontrolled web access can have a negative impact on individual productivity, network performance and your organization’s bottom line. With web filtering you can actively monitor network use and abuse in your organization. These solutions include more than limiting unauthorized web surfing. These solutions will also protect your network from being exposed to Web based email, file downloads, IM, and P2P. More importantly these solutions decrease your organization’s legal liability and significantly increase network and employee performance. 

Traditional password authentication requires one factor to gain access to a system. With multi-factor authentication you are required to use multiple forms of authentication to gain access to a system. This can be in the form of biometrics, tokens, or smartcards. 

This is commonly referred to as IDS or IPS (Intrusion Detection/Prevention System). This technology detects all types of malicious network traffic and computer usage that can’t be detected by a conventional firewall. An IPS is typically composed of three components. First, there are sensors that generate security events. Second, there is a console that monitors events and controls the sensors. Third, there is a central engine that records events logged by the sensors. IPS can be network based or host based. Network based IPS monitors network traffic while host based IDS consists of an agent that monitors all activity on that host. 

Security attacks can come from anywhere – outside hackers, internal users, branch offices, remote users, or business partners. Can you honestly determine how solid your existing security infrastructure is? Would you like an objective assessment of your company’s security? The purpose of this is not to sell or recommend a security solution. The purpose is to provide an unbiased, impartial and updated report on your organization’s vulnerabilities. To uncover any bugs, configuration changes, vulnerabilities or human error that could expose your network to hackers.

Highly reliable and hassle free. As the largest independent Hosted Exchange Email ServiceIcon System Inc. manages your email communications so you will not have to deal with the hassle or the expense. Find out how Icon System Inc. can help your organization immediately realize a cost-effective, enhanced email communications platform  today.

We set your organization up for hosted exchange email success
Request for Quote
close slider
Supportscreen tag