Akita take a proactive approach to supporting our customers’ networks and provide real-time server monitoring.
Through our proactive approach to server monitoring, we can work to prevent potential problems occurring through:
- Using monitoring software which will alert us to potential problems
- Advising on how to get the best from available hardware and software
- Ensuring software patches are applied regularly
- Ensuring anti-virus and where necessary anti-spyware and anti-spam software is in place and up to date.
- On-site checkups where we can discuss any IT queries.
- Ensuring your data and network security systems are adequate.
Our monitoring service will proactively check the status of your systems. This means that issues can then often be resolved before our clients are even aware of them. Preventing small issues from developing into big problems increases your users’ productivity as there is a lower chance of user disruption.
This proactive approach ensures that your system uptime is maximised. And by having greater involvement with your network, we can improve performance as well as minimising security risks.
A multitude of services can be monitored including:
- Microsoft Exchange
- Terminal Services
- SQL Server
- Active Directory
- Directory size function
- CPU usage function
- Disk drive function
- Disk space function
- File existence function
- File size function
- POP3 Email
- Web Server
More specifically, these can be broken down into standard monthly reports. You can then be provided the sort of granular information, and comprehensive IT audits, previously only available to enterprise-level organisations.
NETWORK INFRASTRUCTURE AUDIT
An audit of your network infrastructure enables us to document switches, ports in use and ports available, router information including firmware / OS version. It enables us to understand wide-area connection details, Local, WAN and gateway IP addresses, DNS, WINS, DHCP, and MAC address, inventory of internal and external network links, Password policy & ISP details.
Our comprehensive software audits include: Operating System version (Service Pack Level & optional hotfix level), other installed software, licences, version number, paths and descriptions, PUPs (Potentially Unwanted Programs such as file-sharing software, music streaming applications and any non-business software), Anti-virus Software (Updates and Version), Anti-malware Software (anti-spy / anti-phishing /anti-ransomware).
Hardware audits enable a complete asset list to be compiled, detailing: Manufacturer and model, Service Tag or other manufacturer identification Disk Space, Processor Type, PCI Cards, Approximate age of machine, Printers, Misc network hardware details.