Service List

Overall Systems Design & Integration Project Management
  • A/V Design and Installation
  • Application Development and Installation
  • Backup and Recovery
  • Complete IT Systems
  • Database Development and Integration
  • Fire Protection
  • Systems Lifecycle
  • Management Migrations
  • Power Management
  • Software Consulting
  • Structured Cabling
  • System Upgrades
  • System Administrators Training
  • Capital Budgeting
  • Enterprise Resource
  • Planning
  • Implementation
  • IT Support Transition
  • Needs Assessment/Requirements Analysis
  • Post-Mortem Analysis
  • Process Review Project
  • Management Quality Assurance
  • Risk/Threat Analysis
  • Strategy Planning
  • System Evaluation
  • Time Sensitive Delivery
  • Vendor Liaison and Procurement
IT Consulting Training
  • IT Support Transition
  • Needs Assessment/Requirements Analysis
  • System Evaluation
  • Process Review
  • Project Management
  • Capital Budgeting
  • Vendor Representation
  • Threat Analysis
  • Microsoft Curriculum
  • Audio/Video/Projection systems
  • Application Training
  • Training System Administrators
Network Services Managed Computer Services
    • 24×7 Automated Network Monitoring and Notification
    • Broadband Acquisition
    • DSL/ T1
    • WiFi/ WiMax/Wlan
    • Frame Relay
    • Fault Tolerance Solution Implementation
    • Networks and Access Load-Balancing
    • Bandwidth, Routers, and Switch Management
    • Network Infrastructures
    • Network Monitoring
    • Phased Network Migration Planning
    • Telephone, Internet, and Data Network Relocation
    • PSTN/VoIP Service and Design

Quality of Service (QoS)

  • Surveys and System Analysis
  • Systems Installation and Configuration
  • Telecom – Telework Solutions and Cabling Data
    – cat 5e, cat 6, fiber Voice
    – cat 3, cat 5e, cat 6
  • VPN Services
  • 24×7 Automated Monitoring
  • Microsoft Exchange and SQL Server Administration
  • Servers and Network Administration
  • Asset Tracking
  • Backup Services
  • Broadband Management
  • Data Center Operations
  • Scheduled Enterprise-Wide Software Deployment Execution
  • Cisco SmartNet Contract Fulfillment
  • Hardware Asset Management and System Documentation
  • Patching and Updating Operating Systems, Applications, and Firmware
  • Scheduled Preventive Maintenance
  • Software Installation
  • System Documentation
  • Technical Support/ Help Desk/Live Chat
I-Solutions and Commerce (Part 1) I-Solutions and Commerce (Part 2)
  • Corporate Intranets
  • Client/Employee/Partner Access Portal Creation
  • Customer Relation Management/Supply Chain Management
  • E-Business Integration (WAP Technology, XML, ERP)
  • E-Business Intelligence (Data Warehousing, Data Mining, Operation Data Stores)
  • E-commerce/Storefront/Kiosk Management
  • EDI/XML Development
  • FTP Sites
  • Knowledge Base Management/Collaboration
  • Object Orient Design and Programming in Java/C++
  • Outlook Web Access Services
  • Internet Security and Data Encryption
  • Search Engine Technology
  • Data Mining and Warehousing Set-up
  • Web & Email Hosting
  • Web Design (ASP, ASP.Net ColdFusion, JSP, EJB, Web 2.0)
Multimedia – Video Remote Desktop
  • Auditoriums
  • Background Music
  • Hearing Assistance
  • Media Rooms
  • Paging
  • Sound Reinforcement
  • Video Conference Rooms
  • Video Recording and/or Distribution
  • Terminal Server and RDP Configuration
  • Global Helpdesk
  • Global Remote Deployment
  • Instant Messaging
  • Polycom, Tandberg, Radvision, Webx, Wiredred, and Other Support
  • Video & Web Conferencing
  • VPNs
  • Web Presentations
  • Web Touring
Data Security (Part 1) Data Security (Part 2)
  • Access Controls
  • Anti-Spyware
  • Anti-Virus
  • Building and Managing Firewalls
  • Closed-Circuit TV (CCTV)
  • Collection of IP and MAC Addresses of Access Points and Clients
  • Compliance Assurance
  • Developing Security Policies and Procedures
  • Ensuring Fault Tolerance, Redundancy, and Remote Access
  • Filtering Internet Content
  • Updating Firmware
  • Independent Verification and Validation (IV&V)
  • Internet Filtering
  • Monitoring and Responding to Breaches
  • WiFi Monitoring for Rogue Access Points
  • WiFi Monitoring for Signal Leakage to Unwanted Areas
  • Penetration Tests
  • Infrastructure Protection against Disruptions
    -Compliance with Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act,
    -SEC Rule 17a, Senate Bill 1386 NIST/FISMA, HIPAA, and Other Regulations
  • Risk Assessment
  • Securing Email
  • SPAM Protection
  • Threat Analysis
  • Total Data/Disaster Recovery
Our Process
Discovery Research & Component
We will sit and chat to you. We want to fully understand your mission and objectives. We assess your requirements and prepare recommendations along with a schedule and budget. Based on your individual requirements, we research the top products and enter into negotiations and acquisitions on your behalf. This ensures the best pricing and most appropriate technology for your solution.
Implementation & Integration Superior Management
This is the heart of your solution. This is where the crucial elements are put into place. IEG installs, tests, integrates, assembles, configures, migrates, trains and tests again, until you are satisfied with our products and services. Throughout the process, starting with one office to a complete enterprise-wide engagement, we keep close watch on and help control the milestones. Planning, time management, budget considerations, full documentation, diagramming your network, are our determining factors in our work with you, as we ensure a fluid transition.
Monitoring
The health of your network is based on proactive approach. Essential offerings include: help desk, on-site and virtual support, preventive maintenance and network monitoring for everything from overload, probability of a crashed server, network connections and other devices.