IT Management

Business

cog wheels, gear, wheel
  • Unlimited Support
  • 24/7 monitoring and troubleshooting
  • Windows 2000/2003/2008 Server support
  • Windows Small Business Server support 
  • Microsoft Exchange Maintenance and Administration
  • Backup Monitoring and Administration

 

  • Event Log Monitoring
  • Drive Space Monitoring
  • Log File Maintenance
  • Microsoft Patch Management 
  • Service Pack Installation Early Warning and Preventative Maintenance
cyber security, internet security, computer security
 
  • User Account Administration
  • File Sharing Permission Administration
  • Security Administration
  • Anti-Virus Management

Backup & Recovery

As a small business your data is as important as the data stored by large enterprises; however your information is likely at far greater risk. Without the time to routinely back up your data, you are just one virus attack away from major data loss. The bottom line is that it’s not the size of the organization that determines the value of the data. Mission-critical data is mission-critical regardless of who produces that data and it deserves appropriate protection. 

cloud, computer, backup

At Icon Systems Inc., we do back-up both your servers and computers to an appliance on your local network. We then also securely back that up to an offsite data center. So you have a local back up in the event that a computer crashes, and you can instantly recover that computer. You also have an offsite backup in the event of a disaster such as a flood or fire.

security, cryptocurrency, bitcoin

Firewalls, biometrics, authentication, ssl, vpn, ipsec, 3des, encryption, viruses, spyware, web attacks, content filtering. Does all this confuse you and cause you to scratch your head?

Firewalls and Virtual Private Networks protect your organization’s digital assets from external threats while providing secure access. Icon Systems Inc. will work with you to find the right solution for your organization. Our firewall partners also offer VPN solutions as a dedicated appliance or as part of the firewall.

This is the process of encoding information in such a way that only the person or system with the key can decode it. The product suite we provide protects data and communications with strong, proven security. These solutions are used to secure emails and attachments, files and folders, and entire

Uncontrolled web access can have a negative impact on individual productivity, network performance and your organization’s bottom line. With web filtering you can actively monitor network use and abuse in your organization. These solutions include more than limiting unauthorized web surfing. These solutions will also protect your network from being exposed to Web based email, file downloads, IM, and P2P. More importantly these solutions decrease your organization’s legal liability and significantly increase network and employee performance. 

c1

Traditional password authentication requires one factor to gain access to a system. With multi-factor authentication you are required to use multiple forms of authentication to gain access to a system. This can be in the form of biometrics, tokens, or smartcards. 

This is commonly referred to as IDS or IPS (Intrusion Detection/Prevention System). This technology detects all types of malicious network traffic and computer usage that can’t be detected by a conventional firewall. 

An IPS is typically composed of three components. First, there are sensors that generate security events. Second, there is a console that monitors events and controls the sensors. Third, there is a central engine that records events logged by the sensors. IPS can be network based or host based. Network based IPS monitors network traffic while host based IDS consists of an agent that monitors all activity on that host. 

PENETRATION TESTING & VULNERABILITY ASSESSMENT

Security attacks can come from anywhere – outside hackers, internal users, branch offices, remote users, or business partners. Can you honestly determine how solid your existing security infrastructure is? Would you like an objective assessment of your company’s security? The purpose of this is not to sell or recommend a security solution. The purpose is to provide an unbiased, impartial and updated report on your organization’s vulnerabilities. To uncover any bugs, configuration changes, vulnerabilities or human error that could expose your network to hackers.

Small Office Home Office(SOHO)

At Icon Systems Inc., we have highly trained Certified Engineers standing by to help you with your computer problems. Icon Systems Inc. provides comprehensive support for all your home computers at a great value. Our computer repair and support specialists provide desktop and laptop technical support for over 70 software applications and hardware including all peripherals i.e. printers, scanners etc…

We can help with a range of computer problems; from simple start-up errors and device conflicts to blue screen errors & system freezing. Whatever your issues, avoid the headache and hassle of a broken PC with our repair service. We can get your computer up and running fast and efficiently so you can get on with your life and make the most of your computer.

We have the tools and knowledge to help you with any computer problem. Icon Systems Inc. can remotely (i-visit) access your computer through the Internet and our Certified Technicians can set-up and install your PC in no time or you can call for onsite visit. Our service contains a complete diagnosis of the problem with a comprehensive solution, including:

HOME NETWORKING:

Icon Systems Inc. Computer Repair Tech can assist you with setting up a home network, adding a computer to an existing network, troubleshooting and repairing your network, firewall support, and configuring adapters for desktops, gaming consoles, media devices, and more.

OPERATING SYSTEM & OPTIMIZATION:

Icon Systems Inc. Computer Consultants can conduct an extensive diagnosis to discover the cause of a computer crash, lock-up, unusual slowness, or Internet connectivity problems and can assist you in getting things running smoothly.

COMPUTER SOFTWARE & HARDWARE:

Icon Systems Inc. computer consultants can help you install new software, upgrade existing software, repair programs, and troubleshoot software issues. Icon Systems Inc. Technicians can also install your software and hook up your computer with printers, scanners, cameras, MP3 players, gaming consoles, and more. 

Icon Systems Inc. Certified Technicians can diagnose and troubleshoot issues with your Microsoft® Office® and other Microsoft® software. We can fix your Internet browsing problems, resolve conflicts and compatibility issues, make sure your Microsoft software and drivers are up-to-date, and optimize Microsoft operating system’s speed and performance.

SECURITY & VIRUS

The first step in securing your computer is to determine where you are at risk. By executing right security services for your system, you will to a great extent improve your chances of staying secure.

Spyware and other malicious programs have evolved beyond annoying to become a serious security threat for computers. Icon Systems Inc. offers effective spyware removal services to keep your system secure against security threats, be it external or internal. We are available 24×7.

Our security & virus support include:

  • Antispyware Installation and Configuration
  • Remove viruses and Spyware from your computer
  • Protect your Computer against malicious attacks
  • Remove Trojan, Worms and Browser Hijacks
  • Audit your security settings
  • Configure Anti-virus and Anti-spyware
  • Scan computers and helps you quarantine viruses and block spyware, adware, and popups
  • Safeguarding your Computer against hijackers of sensitive and personal information
  • Set up Windows firewall in your Computer

E-MAIL RULES SETUP:

Do you want your email to work better for you? Did you know that you can create rules within your email program, like Microsoft Outlook and Outlook Express etc. These rules can help you to manage your email flow, e.g. you want all emails from your boss to be highlighted as priority. Or another example is that you want all emails from you son and/or grandson to be automatically forwarded to your spouse.

These are just a few examples of how creating email rules can help you manage your inbox and your communication flow. Try it!

  • Microsoft Outlook
  • Microsoft Outlook Express
  • Eudora Mail
  • Configuring web accounts

SETUP NEW INTERNET CONNECTION:

Get online fast with existing or new broadband or cable Internet connection. Icon Systems Inc. technical experts will set-up your computer to connect with the modem and also optimize your browser settings for fast Internet browsing.

Set-up & configure computer with modem or router for wireless or cable Internet.

Set-up & configure computer with modem or router for wireless or cable Internet Configure Internet Explorer & Netscape browser for fast internet access. Update security, firewall and delete cookies and history.

DATA BACKUP & DATA RECOVERY:

Icon Systems Inc. Technician will advise you the best way to protect your vital document and family picture. In a situation where your PC is dead, our experts will recover all your data including the family pictures.

ONE-ON-ONE TRAINING:

Icon Systems Inc. also provides one on one computer training on:

  • How to use internet
  • How to send and receive
  • E-mail
  • How to use eBay. etc

Technical Support

24/7 SERVER MONITORING:

24x7x365 monitoring for up to one server. Additional servers can be monitored for an additional $99/mo. each.

DESKTOP MANAGEMENT AND MAINTENANCE:

You get unrestricted access to the Network Monitoring Dashboard for yourself or any employees you specify

ONSITE AND OFFSITE BACKUP MANAGEMENT:

Any on-site service required. This is for any issue that can’t be addressed remotely (fixing a workstation doesn’t have network or Internet connectivity, physically installing hardware, etc.)

Consulting Services

CONSULTING

o Site Survey
o Network Security
o Project Management
o Technology Assessment

PLANNING

o Integration
o Technology selection
Contact us
close slider