HOME
ABOUT
   AWARDS
   PROFILES
SOLUTIONS
   COMMERCIAL
   SMALL BUSINESS
PARTNERS
CAREERS
NEWS
  
 

 

 

  
 
 
 

IT SUPPORT | AVIATION | CHARTER FLIGHTS | REAL ESTATE| CONSTRUCTION

 
 

 

 

FULL SERVICE IT SUPPORT

  PC support
  Managed network support
  Hardware and software support
  Disaster recovery
  Maintenance

Leveraging of Our Entire Staff
In providing Full IT Service, customers gain access to the expertise from our entire team. We can provide value guarantees because we only implement proven solutions and deliver using the best talent in the organization.

Absolute Value Guarantee™
UTS guarantees delivery of technical solutions. Clients are guaranteed the technical integrity of every solution delivered.

Response Time Guarantee
UTS provides a guaranteed 2 hour response time for all contract clients.

Network Services
  LAN/WAN Design, Implementation, and Support
  Technology Assessment
  Internet Connections
  Work from Home
  Disaster Recovery
  Administration
  Software
  Migrations
  Remote Support
  Business Application Support
  Maintenance

Databases
UTS‘s Database Development & Administration Team provides key services in managing database environments and providing development services to our government and commercial customers. Our services include supporting the Software Development Life Cycle for database application support, as well as, supporting mission critical databases through solid and proven administration procedures and techniques.

  Custom Application Development
  Oracle DBA Support
  Web Database Development
  Data Modeling
  Oracle Security Audit
  Database Optimization
  Database Migrations
  Oracle Installations
 Application Maintenance

Hosting
  Email
  Web
  Server
  Application
  Streaming Video

More Than Hosting
The UTS philosophy is to be more than a hosting service provider. Additionally, we bring our customer expertise in all areas associated with premium hosting solutions to provide the best overall solution, including:

System Administration
  Database Administration
  Web Programming & Web Content
  Security Analyst

Customized Solutions
We provide premium hosting solutions with hands-on support. It’s not about volume and pushing the same service on all of our customers. We work directly with each customer to deliver the best hosting solution for each business situation. Moreover, we don’t over-subscribe our bandwidth and server space to ensure our customers get the best value and service.

Security
UTS provides proactive management of network perimeter security. Comprehensive and affordable managed security solutions enables businesses to focus their resources on core operations while maintaining peace of mind that their information assets are being watched over.

  Managed service minimizes cost and maximizes quality of service
  24 x 7 monitoring ensures around the clock protection
  Daily reporting communicates the latest information on security initiatives
 
Managed Security Services

  Managed Firewall
  Managed Intrusion Detection
  Managed VPN
  Managed Anti-Virus
  Spam Filtering
  Content Filtering
Professional Security Services

  Security Awareness Training
  Business Continuance Planning
  Penetration Testing
  Security Policy Development and Review
 

 

Managed Firewall

Firewall management is available in a variety of configurations to secure your always on broadband connection. Firewalls are configured, installed, monitored and replaced upon failure. This complete service provides for 24x7 monitoring and logging, unlimited policy changes, firewall updates, firewall activity reporting and regularly scheduled vulnerability assessments.  
BACK TO TOP

Managed Intrusion Detection

Network-based intrusion detection sensors are strategically installed and configured to detect suspicious activity. Notifications of high priority incidents are sent immediately to the appropriate incident response personnel. Recommended response scenarios are provided with each event notification. UTS provides 24 x 7 IDS monitoring.
Further reading on IDS
BACK TO TOP

Managed VPN

VPN management extends communication and connections to home users, remote workers, partners and/or mobile users while ensuring the data being exchanged is safeguarded. This VPN solution covers all of the important features. IPSec compatibility gives you interoperability with existing equipment. Des or 3DES Encryption and SHA-1 or MD5 Authentication makes sure your data is safe in transit.
BACK TO TOP

Managed Antivirus

Anti-virus scanners are the front line technology for preventing virus attacks. Because anti-virus software is primarily a reactive measure against known threats, updating, detection and policy enforcement play a key role in meeting the latest threats and protecting networks from infection. Updating your anti-virus software in the fastest time possible is the only way to minimize damage to your network. Today's virus protection is all about time-to-protection, and by integrating this security feature with the firewall additional safety can be provided with auto-enforcement and rapid a-mail attachment blocking.
BACK TO TOP

Spam Filtering

Unlike most spam filtering solutions, which use one or two spam-classification techniques, UTS employs MX Logic’s Stacked Classification FrameworkSM, which aggregates the most effective spam filters and techniques in the industry, currently leveraging the strengths of five top spam-fighting filters.

No contract minimums required and can be provided on a month to month basis, thus providing the opportunity to implement a solution without a large initial investment for software; hardware and administrative time to implement.
BACK TO TOP

Content Filtering

Web content filtering enforces your Internet usage policy. Integrated with the firewall management, this service will provide confidence that employees are using the Internet for the benefit of the business and reduce corporate liability.
BACK TO TOP

Security Awareness Training

Education and training are essential components to any good security program. People are the most critical element for the overall security of an organization. People are responsible for implementing security controls. People are responsible for following security policy. People make critical decisions for your organization every day. Not only must they understand what to do, they should also have a firm understanding of why. Understanding has been shown to be the largest factor contributing to employee compliance with security policy.
BACK TO TOP

Business Continuance Planning

Business Continuance Planning (BCP) is an important piece of any company's successful recovery after a malicious act has occurred. To ensure a full recovery to a state of being able to continue business as usual, the BCP should include a Disaster Recovery Plan (DRP) as well. Here we have shown a few things to consider when developing your BCP and DRP.
BACK TO TOP

Penetration Testing

At UTS we consider penetration testing to be the capstone of any thorough security audit. Penetration testing is the final validation of security controls that an organization has implemented. A penetration test exposes security gaps and demonstrates the effectiveness of security controls. We feel that penetration testing should be performed after you are reasonably confident in the security of your systems.
BACK TO TOP

Security Policy Development & Review

A security policy is the administrative component of the controls that provide security to your organization. It is a statement to both your business partners and employees that you consider a secure computing environment a priority in your organization. UTS will review your existing security policy and collaborate with your management and technical teams to develop a customized policy. 
BACK TO TOP



    

  

 
Site Map Contact Us Legal         6533 Blackwell Road Warrenton VA 20187 PHONE 703.625.4600