|
FULL SERVICE IT
SUPPORT
● PC support
● Managed network support
● Hardware and software support
● Disaster recovery
● Maintenance
Leveraging of Our
Entire Staff
In providing Full IT Service, customers gain
access to the expertise from our entire
team. We can provide value guarantees
because we only implement proven solutions
and deliver using the best talent in the
organization.
Absolute Value
Guarantee™
UTS guarantees delivery of technical
solutions. Clients are guaranteed the
technical integrity of every solution
delivered.
Response Time
Guarantee
UTS provides a guaranteed 2 hour
response time for all contract clients.
Network Services
● LAN/WAN Design, Implementation, and Support
● Technology Assessment
●Internet Connections
●Work from Home
●Disaster Recovery
●Administration
●Software
●Migrations
●Remote Support
●Business Application Support
●Maintenance
Databases
UTS‘s Database Development & Administration Team provides key services in managing database environments and providing development services to our government and commercial customers. Our services include supporting the Software Development Life Cycle for database application support, as well as, supporting mission critical databases through solid and proven administration procedures and techniques.
●Custom Application Development
●Oracle DBA Support
●Web Database Development
●Data Modeling
●Oracle Security Audit
●Database Optimization
●Database Migrations
●Oracle Installations
●Application Maintenance
Hosting
●Email
●Web
●Server
●Application
●Streaming Video
More Than Hosting
The UTS philosophy is to be more than a hosting service provider. Additionally, we bring our customer expertise in all areas associated with premium hosting solutions to provide the best overall solution, including:
System Administration
●Database Administration
●Web Programming & Web Content
●Security Analyst
Customized Solutions
We provide premium hosting solutions with hands-on support. It’s not about volume and pushing the same service on all of our customers. We work directly with each customer to deliver the best hosting solution for each business situation. Moreover, we don’t over-subscribe our bandwidth and server space to ensure our customers get the best value and service.
Security
UTS provides proactive management of network perimeter security. Comprehensive and affordable managed security solutions enables businesses to focus their resources on core operations while maintaining peace of mind that their information assets are being watched over.
Managed service minimizes cost and maximizes quality of service
24 x 7 monitoring ensures around the clock protection
Daily reporting communicates the latest information on security initiatives
Managed Firewall |
Firewall management is available in a variety of configurations to secure your always on broadband connection. Firewalls are configured, installed, monitored and replaced upon failure. This complete service provides for 24x7 monitoring and logging, unlimited policy changes, firewall updates, firewall activity reporting and regularly scheduled vulnerability assessments. |
BACK TO TOP
Managed Intrusion Detection |
Network-based intrusion detection sensors are strategically installed and configured to detect suspicious activity. Notifications of high priority incidents are sent immediately to the appropriate incident response personnel. Recommended response scenarios are provided with each event notification. UTS provides 24 x 7 IDS monitoring.
Further reading on IDS |
BACK TO TOP
Managed VPN |
VPN management extends communication and connections to home users, remote workers, partners and/or mobile users while ensuring the data being exchanged is safeguarded. This VPN solution covers all of the important features. IPSec compatibility gives you interoperability with existing equipment. Des or 3DES Encryption and SHA-1 or MD5 Authentication makes sure your data is safe in transit. |
BACK TO TOP
Managed Antivirus |
Anti-virus scanners are the front line technology for preventing virus attacks. Because anti-virus software is primarily a reactive measure against known threats, updating, detection and policy enforcement play a key role in meeting the latest threats and protecting networks from infection. Updating your anti-virus software in the fastest time possible is the only way to minimize damage to your network. Today's virus protection is all about time-to-protection, and by integrating this security feature with the firewall additional safety can be provided with auto-enforcement and rapid a-mail attachment blocking. |
BACK TO TOP
Spam Filtering |
Unlike most spam filtering solutions, which use one or two spam-classification techniques, UTS employs MX Logic’s Stacked Classification FrameworkSM, which aggregates the most effective spam filters and techniques in the industry, currently leveraging the strengths of five top spam-fighting filters.
No contract minimums required and can be provided on a month to month basis, thus providing the opportunity to implement a solution without a large initial investment for software; hardware and administrative time to implement. |
BACK TO TOP
Content Filtering |
Web content filtering enforces your Internet usage policy. Integrated with the firewall management, this service will provide confidence that employees are using the Internet for the benefit of the business and reduce corporate liability. |
BACK TO TOP
Security Awareness Training |
Education and training are essential components to any good security program. People are the most critical element for the overall security of an organization. People are responsible for implementing security controls. People are responsible for following security policy. People make critical decisions for your organization every day. Not only must they understand what to do, they should also have a firm understanding of why. Understanding has been shown to be the largest factor contributing to employee compliance with security policy. |
BACK TO TOP
Business Continuance Planning |
Business Continuance Planning (BCP) is an important piece of any company's successful recovery after a malicious act has occurred. To ensure a full recovery to a state of being able to continue business as usual, the BCP should include a Disaster Recovery Plan (DRP) as well. Here we have shown a few things to consider when developing your BCP and DRP. |
BACK TO TOP
Penetration Testing |
At UTS we consider penetration testing to be the capstone of any thorough security audit. Penetration testing is the final validation of security controls that an organization has implemented. A penetration test exposes security gaps and demonstrates the effectiveness of security controls. We feel that penetration testing should be performed after you are reasonably confident in the security of your systems. |
BACK TO TOP
Security Policy Development & Review |
A security policy is the administrative component of the controls that provide security to your organization. It is a statement to both your business partners and employees that you consider a secure computing environment a priority in your organization. UTS will review your existing security policy and collaborate with your management and technical teams to develop a customized policy. |
BACK TO TOP
|