Infrastructure
Network Assessments
Implementation
Troubleshooting
Disaster Recovery
HIPAA
Key Areas
E-Business
Security
Wireless
Secure VPN
Secure Desktop
Secure Messaging
Secure Web Portal
Certificate Services
ASP
Web Development
Hosting
Security
Firewall
Security Analysis
SAN/NAS
SAN Benefits
NAS Benefits
Centralized
Thin Client
Citrix
Netilla
Televideo
Thin Planet
TriCord
New Moon
WYSE
TriCerat
Other Partners
Help Desk
Application Support
Network Support
Custom Services
In-Sourcing
Out-Sourcing
Repair
Depo
On-Site
Warranty
Out of Warranty

MSA
Platinum
Premiere
Plus
Standard
Engineering
Break/Fix
Hardware
Computer Systems
Networking
Peripherals
Connectivity
Storage
Software
Most Application Software
Symantec
TRACK-it!
Training
On-Site
Customized
Day or Night
Certification

Infrastructure:

Network Assessments: The best tool for understanding problems your network is facing or how to properly grow your network to it's next step is understanding the infrastructure you have in place now. Jade has developed a comprehensive methodology to assess your IT infrastructure using state of the art hardware and software tools. Our certified engineers assess all aspects of your IT network, staff, and procedures/policies to design and deploy long-term solutions customized to your business's needs. As an example, our standard assessments include a review of all installed hardware and software, review of licensing status, review of security policies and procedures, review of current backup and restore procedures, identifying vulnerabilities of physical and logical network infrastructures, assessing antivirus software, installation, and revision control, assessment of network OS setup, configuration, upgrades, patches, examining password policy, user account policy, and group memberships, and physical security of vital company resources. Review of email systems, firewall reviews, review of all policy and procedure manuals, staff interviews, before staff reviews, examining wireless configurations, confirmed proper VPN configurations, reviewing router configurations, and general physical wiring review. Our assessments end with a unique customized report that details all aspects of your IT infrastructure and makes recommendations applying industry best practices.

Implementation: From theory to practice, our highly certified engineers work with our team to efficiently integrate solutions based on your business needs. We offer workstation and server installations, VPN design and implementation, including encryption and authentication. Firewalls and interruption detection systems, hardware setup and configuration, switching and router configuration, and implementation. Complete network architecture design and analysis, systems inventory, remote solutions, training and support, and more.

Troubleshooting: When your systems fail, every minute is critical in recovery. Companies can lose thousands of dollars a minute due to failed hardware or connectivity links. Jade's response team working in conjunction with our 24/7 help desks and TACs can insure that the right engineers with the right equipment can arrive as fast as possible. Jade provides emergency support to all businesses through our MSA offerings. For more information, click here.

Disaster Recovery: Today's fast growing companies realizing that achieving an acceptable "return on investment" for their contingency dollars means finding and implementing unique approaches versus those traditionally offered in a disaster recovery solution. Today's approaches must support a single critical objective: integrating systems availability, disaster recovery, and business resumption into a seamless continuity that covers their business on a daily basis as well as in the event of a site disaster.

Jade combines best practices in disaster recovery and business recovery planning with leading edge high availability clustering disk mirroring, SANs and rapid restoration technologies to provide it's clients with the most advanced business continuity solutions on the market today. Jade's certified engineers are the experts of choice when it comes to achieving disaster resistant processing, highly available systems and continuous operating environments in mutliplatform multisite enterprises. Jade implements these leading edge technologies within the framework of complete business continuity solution addressing critical objectives such as process point of failure, application data cycles, production failover and failback, system availability, data availability, and preemptive crisis communications.

Advanced continuity strategies are custom strategic formulations through rapid IT recovery, business resumption, high availability and continuous operating capabilities. Strategic services include configuring alternate facilities structures, enhancing process/application durability, and modifications of network and storage structures for failover and failback. Advanced continuity services designed to avoid and avert interruptions as well as recover from disasters in worst case scenarios. Service components can include system and data availability architectures, recovery, and continuity plan development, point of failure analysis, preparedness , reviews, crisis communications and testing and maintenance services.

Advanced continuity implementation of highly recoverable, highly available and continuously available architectures and systems including turnkey system implementations in conjunction with our integration partners. Implementations can include processor cluster failover, disk mirroring, automated backup and restoration systems, and data transformation and data replication across all platforms.