System
Watch is a combination of trained engineers and
automated tools that continuously monitor, alert and maintain computer
systems. System Watch can significantly reduce your risk of system
downtime which can translate to a healthier bottom line.
Why System
Watch?
• You want to run your business without computer interruptions.
• You know that when your workers stop so does your cash
flow.
• Automating IT functions save money.
ICS monitors your computers
and network 24/7. We alert you to problems and potential issues.
You choose to make corrections yourself or have ICS make
corrections for you. We also provide you with reports that
summarize your networks health and activity. Managed-ICS allows
you and your staff to stay focused on business initiatives instead
of computer problems.
Minimize
your business continuity risk by using ICS.
Call us for a free quote 480-905-0024
MORE ON SYSTEM WATCH
ICS watches your computer network while you focus on your core business.
We do this by monitoring your network 24/7, report potential threats
to your systems and offer solutions to avoid a disruption in your
business.
Outsourcing
is a key operational strategy for highly focused business entities
when competition becomes more intense and skilled labor scarce.
Management must focus on their core business to achieve a competitive
advantage and outsource the non-core functions to specialized companies
like ICS. We have the resources to assist companies to reduce IT
costs. If you are looking at more than the regular run-of-the-mill
repair services, ICS’s Managed Network Services can offer
you a service package that is customized to your particular needs
which may includes the following:
Network Monitoring
ICS will monitor network access, Internet use and employee web usage
24/7. We also deploy an intrusion detection system to defeat and
report attempts to compromise your network. Viruses and Trojans
can be located by IP address of the infected computer to speed removal
and repair.
Network
and Internet Availability
Network and Internet availability is an important management performance
criterion for any organization. It represents the overall network
health and operational readiness for business transactions. ICS
will provide a report of the network and Internet availability on
a regular basis or as requested. ICS can set up internet failover
and load balancing upon request.
Virus,
Trojan, Spyware and Malware Prevention
ICS will install a device on the perimeter of your network that
will inspect all traffic to and from the internet for known Viruses,
Trojans, Spyware, Malware and block them. This device updates its
Virus, Trojan, Spyware and Malware definition files every hour to
insure that your network is protected from the latest threats. Our
premium service package includes periodically checking every computer’s
Virus, Trojan, Spyware and Malware programs to insure that they
are working and have the latest definitions.
SPAM
Blocking
ICS will use Real-Time Blacklist Spam Filtering at the perimeter
of the network. It uses DNS to query Real-Time Black List (RBL)
services that track well-known spam and open-relay SMTP servers,
and to deny SMTP connections from servers that appear on the lists.
Intrusion
Detection and Blocking
ICS will monitor, block and report on over 2000 typical perimeter
intrusion attacks with the latest technology. When a threat is discovered
the data packets are dropped, the event is logged and alerts are
sent out.
Security,
Web Usage and Bandwidth Reports
We produce and e-mail reports periodically on security breach attempts,
employee internet use, content filter (website) blocking including
which machine attempted to access forbidden websites and how many
times a site was visited. Bandwidth usage is also reported. These
reports can help you increase employee productivity by curtailing
web abuse on company time. Plan for bandwidth needs and help secure
the network.
Web
Content Filtering
Web content filtering blocks specific website access from the entire
company or specific groups. It is an effective tool to combat web
abuse. A 2002 FBI Computer Crime Survey found that 78 percent of
businesses have detected employee abuse of Internet privileges at
work, such as downloading pornography or pirated software. Employee
access to inappropriate Web content is a drain on small business
resources and employee productivity. Then there's the liability
of allowing access to racist or pornographic content. Any business
is liable if it provides an unsafe work environment. With state
of the art tools and databases that are updated hourly ICS will
block unwanted web content by website type or by specific site URL’s
you provide.
Custom
Reports
Custom reporting is available. Individual or aggregate reports can
be generated about virtually any aspect of appliance activity, including
individual user or group usage patterns, events on specific appliances
or groups of appliances, types and times of attacks, resource consumption
and constraints, and more.
Software
Updates
Hardware and software manufacturers regularly release new firmware
or software updates. ICS will update firmware and software to the
latest version at the appropriate time. Some of these updates may
require customers to have a software maintenance contract with the
software manufacturer.
Patch
Management
Microsoft operating systems, Office programs, backup software and
other software require patches to fix holes and vulnerabilities
to remain at their best to resist attacks from Viruses, Trojans,
Spyware, Malware hacks and other threats that exploit those holes.
ICS will insure that those patches and updates are kept current
minimizing your networks risk to a successful attack.
Performance
Management
Together we will set up performance criteria for your computers
and network. Using the necessary tools, ICS will monitor the computers
and network to see that they perform within an acceptable level
and report periodically.
Hard
Drive Monitoring
Periodic defragmentation of hard drives keeps them running at optimal
speed. ICS will defragment them as needed and monitor disc capacity.
When discs near capacity ICS will alert you before it disrupts your
business continuity.
Back
Up Confirmation
ICS will check back up logs and report any failed back up attempts.
We also advise having ICS develop a disaster recover plan and then
test that plan by simulating disasters and attempting restoration
to insure the process works.
Offsite
Data Storage
Offsite data storage should be part of any disaster recovery plan.
ICS and its partners offer secure offsite data storage. Offsite
data storage can be purchased separately from our managed network
services. Click here for more information.
Fault Analysis
Failure rates are monitored closely. ICS will work with the equipment
manufacturer to improve on the reliability of the system or network.
This analysis will also help us to identify the root causes of frequent
failure with a view to improve network or system availability.
Server
Event Monitoring
Server event monitoring is an import part of keeping your server
working at optimal levels. Did you know that certain events can
disable your server from being restored even though it seemed to
be running perfectly before a crash? Monitoring server events and
taking corrective action helps keep your systems working and able
to be restored incase disaster strikes.
Configuration
Management
Information about your computers, network and related equipment
such as network topology, authorized traffic flow, constraint parameters,
product codes, software revision, parameter settings, etc are important
to help engineers diagnose problems quickly and to conduct capacity
planning and network optimization. ICS will create documentation,
keep a copy onsite and at the ICS office. This documentation can
also be used as part of your disaster recovery plan.
Asset
Management
ICS will maintain an inventory list of all assets under contract
including information such as site address, location at site, model
number, serial number, expiration dates etc. Field audits shall
be conducted at an agreed frequency.
On
Site Service
If needed ICS will be on call to make onsite repairs at an agreed
upon response time and rate. Click here for
more information.
Single
Point of Accountability
Regardless of the complexity of your system or network in terms
of multitude of subsystems or components, ICS will be your single
point of contact. You do not have to worry about the finger-pointing
that you often experience with multi-vendors. We will work with
third parties to ensure that the system or network will experience
the lowest possible downtime. |