Falcon IT Services provides a broad range of IT products and services to help you consolidate your IT portfolio. We offer three bundles with different levels of service and security as well as the ability to purchase additional products and services a-la-carte. Contact us for a consultation and to learn which level is right your business.

Standard Managed IT Services
Unlimited Help Desk Support: We provide unlimited telephone and remote support with near-instant access to our bi-lingual technical staff so that your employees get their issues resolved quickly. Most calls to our help desk are answered within 1 minute.
Unlimited On-Site Support: We provide unlimited on-site support* so that issues that cannot be resolved remotely are resolved on-site.
Desktop and Server Management: We manage your desktop PCs, servers and cloud platforms professionally so that you don’t have to.
On-Site Backup: We make backups of your important server files to a local storage device.†
EDR/XDR Managed Antivirus: Our antivirus platform doesn’t just protect you against malware, it also provides us with real-time telemetry so that we can proactively act against attacks.
Host Based Intrusion Detection & Prevention: HBIDS is an important security piece for the work-from-home office. HBIDS not only protects devices wherever they are, it also alerts us to devices that are connected to networks that have malware and/or poor security.
Internet Connection Monitoring: We monitor your Internet connection and work directly with your ISP when there is an outage or during times of high latency.
Network Printer Management: We help in connecting, managing and supporting your printers.
Software License Management: We keep track of your software licenses to make life easier for your admins.
Managed VPN w/ MFA: We provide your employees with remote access to your network via a secure VPN coupled with multi-factor authentication, perfect for travelers and work-from-home staff.
Gateway Malware, IDS and Botnet Filtering: The gateway is the division between your secure network and the Internet. We protect this point of access with a variety of security tools and monitor inbound and outbound traffic for signs of attacks, internal abuse and intrusions.††
Gateway Based Geo-Fencing: We can block Internet access to any country of your choice (that you do not do business with), greatly reducing your organization’s security exposure.
Windows Patch Management: We remotely update your PCs and servers as well as applying Microsoft security patches for.
Systems & Network Health & Performance Monitoring: We receive health telemetry from many of your infrastructure systems and monitor them to identify and preempt hardware failures.
Microsoft 365 Auditing: We audit your Microsoft 365 cloud to proactively prevent security issues.
Vendor Relationship Management: We never tell your employees to call a vendor directly for support. We will always contact the vendor directly and work to resolve vendor-related issues.
On-Line Behavior Analysis: We can identify users that exhibit risky behaviors (visiting risky Web sites, using cracked software, etc.) and work with them to help improve their cyber hygiene.
URL Web Filtering: We can block access to Web sites based on category or URLs. Different rules can be applied to groups within your organization.
Blacklist Filtering: Our security suite maintains a real-time database of malicious Web sites and networks, and blocks communications to those sites. This is extremely useful in preventing ransomware and phishing.
Employee Cybersecurity Training: We work with your HR department to help train your employees and promote cybersecurity in the workplace. We provide employees that pass our cyber-security exam with gratitude, prizes and a certificate of completion.
Premium Security Services
Device & Service Monitoring: We monitor your internal network devices (sensors, gateways, switches, etc.) and receive telemetry to identify failures and disconnects. Services can also be monitored to ensure that your important back-office applications and processes are always running.
Third Party Patch Management: We monitor your endpoints for out-of-date third party software and apply the necessary security patches.
Compliance Support: We work with you to identify and fix IT security gaps and help you achieve your compliance goals. We can also help you draft acceptable use policies, incident response plan (IR) and a written information security plan (WISP).
ADDS Auditing: We audit your Active Directory database changes and ensure freshness.
Windows Server File Auditing: We maintain logs of when important files have been accessed or modified and can trigger alerts based on data sensitivity.
SYSLOG Logging Services: We provide firewall extended logging to maintain a centralized history of network traffic, account control changes and VPN access.
SIEM (Security and Event Monitoring): We monitor, analyze and maintain an extended database of important security related events.
Vulnerability Scanning: We scan your network for unpatched software and other types of vulnerabilities.
Secure Asset Disposal: We log and securely dispose of your unused PCs, servers, copiers and other devices that may contain sensitive data and provide you written confirmation.
Threat Hunting: We install device sensors that collect data and report anomalous traffic such as internal port scans, multiple failed logons and other indicators of compromise for SOC review.
Employee Cybersecurity Training Lifecycle Management: We maintain a database of your employees and their cybersecurity training status and test scores, and coordinate with your HR department to ensure that employees are up to date on their training requirements.
Other Products & Services
Off-Site Backup: Back up your data to a secondary off-site location for added protection. We offer off-site backups to mitigate threats such as fire, hurricanes and other types of disasters that can affect your on-site backups or cloud-based backups.
Telephony: Full featured, cloud based, managed IP phone service. We offer a full-featured, managed telephony service featuring Cisco® IP phones.
Private Cloud Hosting- Locate your infrastructure in a secure data center. Our private cloud hosting services can accommodate your IT infrastructure in a secure, redundant data center for high availability. We offer a variety of options based on budget and risk acceptance.
Redundancy: Mirroring and clustering for you on-premise mission critical servers. We help protect your local server’s mission-critical business processes from hardware failure with server mirroring and clustering.
Environmental Controls: Humidity and temperature monitoring. We help protect assets such as IT infrastructure, food products, medications and other temperature-sensitive products by using environmental control and alerting services.
Mobile Device Management: Smartphone management and threat defense. We manage and help protect your smartphones and tablets with anti-malware and lock down defense.
* Excludes cabling, construction and unauthorized device tampering; other restrictions apply. For details visit our privacy policy section. † Requires NAS (network access storage device) or external disk. †† Requires managed firewall.

 

error: Sorry, copy/paste is disabled
Skip to content