Assessments & Architecture
Our Orange Book is a comprehensive inventory and analysis of your existing technology. We take those results and work with you to create a strategic digital transformation roadmap for the future of your Information Technology. Our expert recommendations and extremely detailed deliverables will help you avoid pitfalls on your IT journey, budget for upcoming projects, and position your business for the future.
Cloud Assessments & Strategy
Navigating the clouds can be a challenge, but our engineers can show you the way. Whether you’re thinking about getting into cloud computing or are already there and need some expert guidance—we’ll define your cloud objectives, outline your current situation, and provide next steps to reach your cloud goals.
Every organization is unique—so why accept a bland, mass produced solution for your network and systems? Our architects will design a custom infrastructure that works for your business while taking into account your past investments and future priorities. We’re here to help you uncover your IT needs through systems review, mentoring, discovery, and detailed documentation including both logical and physical diagraming.
Everyone needs a guiding hand once in a while. If your IT journey has taken a detour and you’re not sure your organization has the knowledge base to make the right call—help is here. The vCIO will form to fit any organization’s needs, align your business goals and IT strategy, and make IT serve the needs of your business.
Security & Compliance
Security Operations Center (SOC)
Security Operations Center (SOC)
SOC Technicians are up 24×7 reviewing your logs, scans, network traffic, and more – performing digital forensics on a variety of potential precursors to past and future attacks or even breaches. We’ll dig into:
- Intrusion attempts
- Unauthorized traffic
- Malware/virus infections
- Vulnerability scan reports
- Plus much more
IT Security as a Service
IT Security as a Service
You don’t want to piecemeal your IT security—picking up bits and pieces of security offerings. That’s how things slip through the cracks. Our IT Security as a Service is an all-encompassing solution: analysis, scanning, patching, policies, consulting, training, IPS & firewall management, and two-factor authentication. We take care of keeping your business safe, so you can focus on making your business a success.
Does your staff need a security tune-up? Our Security Awareness Consulting will help you reduce human error by training your company on a wide array of security principles. Our security experts will explain security best practices, mobile device and emailing handling, ID/password management, and social engineering/phishing awareness. An educated workforce, or the human firewall, is your best defense in keeping your organization safe from malicious actors.
Pre/Post Audit Support
Pre/Post Audit Support
Prepare for impending audits, questionnaires, & evaluations, plus post-audit planning and remediation.
Whether it’s HIPAA or PCI, client mandated or governing body, audits can be daunting affairs. We’ll help improve your policies, procedures, and controls, and assess the current state of your governance then address any issues we find.
24x7 Support & Monitoring
Atomic Monitoring Solution
Not all monitoring systems are created equal. That’s why we’ve taken the best open source visualization, reporting, database, and service check platforms and custom-built our Atomic Monitoring Solution (AMS). Our design cuts down on monitoring “noise” to better focus on preventing IT disasters. AMS is designed from the ground up to be flexible, available, user friendly, and all-encompassing.
Network Operations Center
Our 24x7x365, Minnesota-based NOC is your ticket to more restful nights. We’ll customize an incident response plan, ranging from ticketing, escalation to your resources or ours, all the way to truck-roll and issue resolution. Plus it’s all backed by robust SLAs, a deep bench of subject matter expertise, and the best possible tools.
Every minute your workforce is halted by application or hardware issues equates to lost revenue and opportunities. Our Minnesota-based Service Desk is standing by 24x7x365 to provide expert support to get your employees back to work. Our experienced Service Desk technicians can remotely support a multitude of hardware and software products using advanced remote management tools.
There when (and where) you need us.
On-Site Support – Project work, scheduled visits, break-fix, and on-premises management.
Our experienced On-Site engineers get to know your business to become an expert extension of your staff. We’ll come to your office for scheduled & emergency visits, project work, planned maintenance, software & hardware upgrades, repairs and deployments, and more. We’ll work with you to determine the best frequency depending on your environment.
Embedded Support – A dedicated & highly customizable extension of On-Site Support.
You’ll get a full-time resource, intimately acquainted with your business, IT pain points, VIP users, and network. Designed to provide consistent, yet lower-cost technical expertise, this in-office technician will be your first line of defense for all end user and simple infrastructure issues.
Embedded techs spend 30 hours per work at your locations, with the remainder spent escalating issues to other teams, sharing knowledge, and maintaining documentation.
Server and Workstation Management
Maximize your IT investments without sacrificing performance or security. With Atomic Data’s Workstation Lifecycle Management Services, you’ll get inventory management, deployment, patching, remote maintenance, and more. We use industry best-practices to determine what hardware you need, and when—then we’ll procure, image, deploy, maintain, and when required, securely dispose of your hardware.
Unpatched systems are a massive vulnerability. Bugs, vulnerabilities, and backdoors are constantly being discovered and patched. Though daunting, keeping up is a basic compliance requirement. Atomic Data Patch Management is an automated, lightweight client-based service that ensures your servers and workstations are always running the latest and most secure versions.
Cut your ransomware risk and maintain productivity. Our lightweight antivirus clients can be deployed onto servers and workstations remotely and run silently in the background. This gives our engineers the ability to manage a vast network worth of devices with a few mouse clicks. Definitions and software updates are pushed automatically to ensure the latest threats are always in our crosshairs.
The end-to-end solution for any size network. We’ll design, build, manage, monitor, and operate large and medium scale private and public-facing networks. Your patrons, vendors, and employees will stay connected with powerful, secure networks. Plus we’ll provide boots on the ground for events, 24x7x365 remote support, and our Game Day monitoring dashboard.
Connectivity & WAN
Our Private Connectivity services take away your need to deal with Internet Service Providers, while keeping your business connected and maintaining the availability and security of your internal networks. We offer metro ethernet, Private MPLS routing, Traditional TDM, Wave Division Multiplexing, Direct Internet Access, Software-defined Wide Area Network (SD-WAN) and traditional WAN Architecture, Quality of Service (QoS), BGP Peering, VPN tunneling, and much more.
Office Moves & Additions
Everyone needs a helping hand when moving. But when you’re moving offices along with hundreds of people, switches, circuits, and workstations, the task gets even trickier. Let our engineers design, plan, and execute your office move or expansion. The entire network, from routers to phones, servers to workstations, all moved and setup in a smooth, pre-planned manner to minimize disruption and cut down on day one support.
Data Center Services
Utilize our SOC 3® attested data centers for colocation services, managed firewall, load balancing, VPN, and more. With locations around the globe and plentiful power and network capacity, we can provide:
- Shared and full rack/cage colocation
- Virtual next-gen firewall services (VPN, IPS)
- Virtual load balancing (F5-VIPRION)
- Peering and cross connects
Your equipment is mission critical. Don’t trust its procurement to non-authorized sellers. Unauthorized sales channels are not guaranteed by manufacturers, and may include second-hand, third-party, or counterfeit products. We’ll make sure you get the quality appliances you need, and work with vendors to maintain and manage your warranty and support renewals.
Disaster Recovery Planning & Playbooks
Sooner or later your business will experience a disaster, natural or man-made. What do you do then? You need a plan—our architects and engineers will create custom DR plans and playbooks for your business to follow in the event of a disaster. They’ll provide you with a way forward when you need it most.
Atomic Black Box
Consistent, automated backups of your most critical on-premises Windows® servers. Ransomware attacks, human error, hardware failure, and countless other incidents can mean your business-critical email, directory, and database servers are dead in the water. Backup your servers using our automated, leased appliance and rest easier knowing your data is in safe hands.
- Hourly backup snapshots of on-premise Windows servers
- Customized retention schedules suited to your RPO objectives
- Optional standby virtual servers for rapid recovery
- Optional off-site data replication for geographic isolation
Disaster Recovery as a Service
Let us handle disaster recovery for you. Our architects will design, implement, and test custom DR systems and infrastructure with enterprise-grade solutions to fit your RTO and RPO requirements. We’ll take the guesswork out of DR planning and ensure your business is highly available at all times.
- Redundant HA systems design and architecture
- Geo-isolated, redundant computing and networking hardware
- Redundant, auto-failover network design and implementation
- Disk and/or tape based data archival, monitoring, and management
- Customized Disaster Recovery Playbooks to guide you through an event
Backup from anywhere with our Endpoint Backup solutions. All you need is an internet connection to take advantage of automated, encrypted, lightweight workstation backups. Data backs up to our secure data centers monitored 24x7x365 by our NOC. We’ll alert you of failed backups and work to resolve any issues so that your data is always protected.
Line of Business
Line of Business
Can’t find the right software solution for your business? Our skilled software developers will create web-based, full client applications, and custom API integrations to suit your needs. They leverage .NET and PHP frameworks to create new custom software, or rewrite and support existing software that you already have in place.
Using the latest and most popular content management systems like WordPress, Drupal, and Umbraco, our developers can build new, custom web sites (like this one!) and web services, or support existing sites. With a custom back-end developed by our software team, we can incorporate your design, or work with designers to bring your vision to life.
Help create and foster collaboration within your organization with a custom SharePoint site. Microsoft SharePoint acts as a safe storage for company knowledge, accessible from anywhere. Our SharePoint services run from Architecture and Design, custom workflows, full custom build-outs, and upgrades to existing SharePoint designs.
Database & Reporting
Database & Reporting
Where and how you store and retrieve your business critical data is crucial to the success of your applications. Our services provide you with custom database designs, optimization, and care and feeding. Our SQL experts can also write custom reports, migrate aging databases, and mentor your database administrators.
Voice over IP (VoIP) systems can be a hassle, but they’re a necessary part of a modern business. Let us relieve that hassle by creating a comprehensive voice solution powered by Mitel. We’ll provide a hosted VoIP solution from our secure, 24x7x365 monitored data center and take care of the handsets, switches, licensing, and setup.