Support AS Needed Or Maintenance Agreements:

We are committed to providing technical services and support as if we were employees of your company. Our Maintenance Agreement is a perfect fit for companies with Information Technology requirements that don’t justify a full-time employee but see the value that technology brings to a company.

Computers are like cars – every now and then they need a tune-up. It’s when you skip your tune-ups you start having system slow downs, lock ups, and the infamous “illegal operation errors or the blue screens of death”.

Many financial and security benefits are realized through our Maintenance Agreements: reduced hourly rates, eliminated travel charges, priority support and computer consulting to verify you are spending your IT dollars the most efficiently.

Client selects the number of hours per month. Any unused hours roll over until they are used.

Support and Maintenance agreements can include: Remote Support, Disaster Recovery, Offsite Backup/Storage options, Virus/Spyware Removal and Protection, and Hardware and Software Sales and Recommendations.

Business Re-Location

KennahIT, LLC will manage your entire re-location process from redesign, planning, all the way to occupancy. And if you need to upgrade any of your existing technology, we can assist you in that process as well.

Design, Planning and Project Management services focused on the technology aspects of a single/multi-office re-location, from minor reconfigurations and facility planning, to the opening of a branch office to the design and re-location of your mission critical applications to a new data center.

_________________________

Security Solutions

KennahIT, LLC provides everything from  network security appliances, 24/7 monitoring, corporate anti-virus solutions, external vulnerability audits, and immediate issue resolution. Your business will be protected from the Internet, internal vulnerabilities and hackers.

KennahIT will set up:

Blocking network based attacks
Examples: firewall, antivirus gateways, secure email, spam protection, and secure web filtering, intrusion detection and prevention


Blocking host based attacks
Examples: personal antivirus, personal firewalls, spyware removal, host intrusion prevention


Eliminating security vulnerabilities
Examples: patch configuration management and compliance, vulnerability management and penetration testing


Safely supporting authorized users

Examples: strong passwords, VPNs, secure remote access, and file encryption


Tools to minimize business losses and maximize effectiveness
Examples: backup, log management, regulatory compliance tool

KennahIT, LLC