Take the first step and give us a call.
Together we will put together a plan that will turn your business technology systems into
effective, efficient components that will help you focus on and grow your business.
Contact us to arrange a 15 minute no obligation virtual meeting to see how much JK Consulting can save your business.
MANAGED SERVICE TERMS EXPLAINED
Application Deployment—Application Deployments define the package of software components that make up an application in a particular environment.
Application & System Log Monitoring—Log monitors are a type of software that monitor log files. Servers, applications, network and security devices generate log files. Errors, problems, and more information is constantly logged and saved for analysis. In order to detect problems automatically, system administrators and operations set up monitors on the generated logs. The log monitors scan the log files and search for known text patterns and rules that indicate important events.
Asset Management—IT asset management maintains and develops standards, policies, processes, measurements and systems which enable the organization to properly manage its IT assets with respect to risk, control, governance, costs and business compliance and the performance objectives that have been set by the organization. IT asset management is an integral part of an organization’s IT strategy, as it involves intensive data gathering of detailed software and hardware inventory information.
Backup and Data Recovery—In information technology, a backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Data Recovery involves a set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Data recovery focuses on the IT or technology systems supporting critical business functions.
Daily System Audits—An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization’s goals or objectives.
End User Support Portal—A support portal, or web support portal, is a self-serve, web-based customer service tool customers can use to get help quickly. Support portals enable customers to find information, request support, and resolve issues online easily and autonomously.
Monthly Management Reports—Network management reporting is an essential tool for network administrators. Comprehensive network management reporting provides IT teams with data to monitor their infrastructure, increase productivity and aid in decision-making. From reporting on the total number of unresolved issues, to CPU utilization, interface errors, application performance or rogue wireless activity, reports hold the key to capacity planning, network architecture validation and SLA compliance.
Remote Management—Remote monitoring and management (RMM) is the process of supervising and controlling IT systems (such as network devices, desktops, servers and mobile devices) by means of locally installed agents that can be accessed by a managed service provider.
Functions include the ability to:
- Install new or updated software remotely (including patches, updates and configuration changes)
- Detect new devices, automatically install the RMM agent and configure the device
- Observe the behavior of the managed device and software for performance and diagnostic information
- Generate alerts and provide reports and dashboards
App and O/S Patch Management—A patch is a set of changes to a computer program, or its supporting data, designed to update, fix, or improve functionality. This includes fixing security vulnerabilities and other software flaws.
Spyware Removal and Management—Spyware is a type of malware that aims to gather information about a person or organization, without their knowledge, and send such information to malevolent actors. Furthermore, spyware asserts control over a device without the consumer’s knowledge, sending confidential information to another entity without the consumer’s consent.
Virus Protection Management—Antivirus software, also known as anti-malware software, is a computer program used to prevent, detect, and remove malware (malevolent software).