Let’s be honest, most people don’t like change. Part of that is due to unclear expectations about the process, and how that may affect your business, work, or goals.

As we tour your facility, we will pay careful attention to MANY things. Below is a sample list of facets we’ll be looking for. That said, we aim to be as inobtrusive as possible; we can abbreviate the onsite assessment, deep diving against the data we collected.

We’ll also inquire about your current Managed Service Provider (MSP) or IT Support. This is preparatory: upon signature of our MSA, we will offer to engage directly with your current provider to ensure a smooth transition of services (e.g., ensuring all assets they own are designated for return, credentials for email providers, domain registrars, core applications are shared, license keys shared, etc.). We won’t contact them without your written consent.

    • Physical Infrastructure Assessment
      • Server Room/Data Center Inspection
        • Check environmental conditions (temperature, humidity, cleanliness).
        • Inspect server racks, cabling, and power supply.
        • Assess physical security measures (locks, access control).
    • Hardware Inventory
      • Verify the physical condition of servers, workstations, networking equipment.
      • Check for any outdated or unsupported hardware.
    • Network Infrastructure Assessment
      • Network Design and Topology
      • Review network diagrams.
      • Evaluate the network layout for efficiency and redundancy.
    • Network Devices and Configurations
      • Inspect switches, routers, firewalls, and wireless access points.
      • Check device configurations and firmware versions.
      • Assess the use of VLANs, QoS, and other network features.
    • Systems and Software Assessment
      • Servers and Virtualization
        • Review server roles and configurations.
        • Assess virtualization platforms and resource allocation.
      • Workstations and Endpoints
        • Check operating system versions and patch levels.
        • Assess software installations and licensing compliance.
      • Backup and Recovery Systems
        • Verify backup schedules and storage locations.
        • Test recovery procedures and data integrity.
    • Security Assessment
      • Physical Security
        • Evaluate access controls to sensitive areas.
        • Check for surveillance systems and visitor logs.
      • Network Security
        • Review firewall rules and intrusion detection/prevention systems.
        • Assess VPN configurations and remote access policies.
      • Endpoint Security
        • Inspect antivirus and antimalware solutions.
        • Verify encryption and endpoint protection measures.
    • Policies and Procedures Assessment
      • IT Policies and Documentation
        • Review IT policies, procedures, and guidelines.
        • Check for up-to-date documentation and version control.
      • User Access and Permissions
        • Assess user account management practices.
        • Verify access control lists and group policies.
      • Compliance and Regulatory Requirements
        • Ensure adherence to industry-specific regulations (e.g., GDPR, HIPAA).
        • Check for data protection and privacy measures.
    • Data and Application Assessment
      • Database Management
        • Review database configurations and maintenance plans.
        • Assess data integrity and performance.
      • Critical Applications
        • Evaluate application performance and user satisfaction.
        • Check for software updates and patches.

We’ll admit – we’re new to your business. While we’ve toured, evaluated and supported many organizations, we know that no two organizations are identical. 

Following your onsite assessment, we have troves of data to pour through, as we want to ensure a complete and accurate portrayal of your risks, needs, and requirements is communicated. This process usually takes 2-3 business days to fully complete.

As we work through the information, we’ll author a “Findings and Recommendations” document, in addition to a proposal for day-forward IT Management. We’ll leave both in your hands for deliberation.

After we’ve negotiated the scope to be managed, equipment ordered, etc., your Technical Account Manager will send an eSignature package to you. 

The package will include clear designations of what charges you’ll expect, and the frequency(ies) agreed, in addition to the terms and conditions for service.

Our Managed Services agreement stipulates all facets related to our services:

  • Services provided to your organization, as well as the costs for each service (itemized)
  • Devices covered, and any excluded
  • Softwares & Vendors to be managed under the contract
  • Escalation and Support criteria
  • Contract Period Coverage, Renewal clauses, and termination procedures.

Once you’ve digitally signed the documents, we’ll be automatically notified, and initiate purchase orders for all required components.

After we’ve reached an accord on recommendations and expectations, we’ll acquire the required hardware, software and compile the required configurations before returning onsite. Delivery lead times vary based on the equipment and quantity required but is typically less than 2 weeks.

Once everything is delivered to us, we’ll notify you to begin coordination of installation.

The day has finally come! All of the equipment has arrived, been configured, and is ready for install. 

We’re aware that you’re actively OPEN while we’re onboarding. We’ll be absolutely flexible with your staff to ensure a smooth transition:

  • For network equipment (modems, access points, routers, switches), we’ll gain approval before disconnecting any existing equipment – allowing time for employees to commit/save any data that might be displayed.
  • For computer replacements, we’ll securely transfer user profiles between devices, install any additional applications which are required, re-configure any peripherals (scanners, printers, etc.) which are connected.

Once all of the equipment is in place, we’ll deploy our remote management and monitoring (RMM) client to all supported devices. When each device checks in with our solution, Endpoint Protection (aka Anti-virus software) will be automatically deployed. Devices won’t be automatically rebooted, same day. 

Before we leave your facility, we’ll connect with each employee to confirm no issues exist. There’s nothing worse than noticing an issue AFTER your IT Support has left the building. 

As is outlined in our Managed Services Agreement, your organization will have access to our team by phone or e-mail. If text-messaging is better suited to your needs, we’ll absolutely oblige.

You’ll also gain access to our:

  • Client Portal for efficient access to log or review status of tickets. 
  • Documentation tool (IT Glue), explicitly linked to your organization. Access is limited to 2 members of your organization, unless otherwise negotiated.
  • vCIO platform for central access to generated reports, recommendations, assessments, etc.

Leave a Reply

Your email address will not be published. Required fields are marked *

Learn how we helped 100 top brands gain success.

Let's have a chat