• When can they start?
    Thanks to our 15+ staff and extensive experience, we can be at your service the very next day after signing a contract. Since not all knowledge and tasks are concentrated in one person, there is no problem in finding a replacement.
  • Why do I need a system administrator if I’ve been doing fine without one?
    The question is how much more effective would it be with him? There must have been occasions when a task was only partially solved because there was not enough capacity or a competent expert present. A system administrator also means the protection and security that is needed today. They ensure that systems are secure against breaches and viruses. System administrators play an essential role in risk mitigation planning.
  • Is the security audit customisable?
    Yes, of course. However, there are some cornerstones of system security that are absolutely justified to be covered, while at the same time the tests can be extended as required according to the individual company profile.
  • What investment does your work require from me?
    If you are interested, please contact us to arrange a meeting in person to assess your needs. We have a range of packages to choose from, but we can also tailor them to your needs to make our service as convenient as possible for you.
  • What does a system administrator actually do?
    He is a professional who is responsible for network setup, annual maintenance of servers (mail servers and file servers) and much more. His or her responsibilities include providing a reliable working environment, in-depth knowledge of software, hardware and networks. He or she has to design, organise and modify while maintaining operating systems, business applications, security tools, web servers, emails, laptops and desktops, but in fact it’s a never-ending list.
  • What areas does a system security audit cover?
    It includes an overview of the procedures that define safety standards and guidelines. It also includes a review of the access rights concept, access controls and critical access rights, and their design if necessary.
  • Do you need technical assistance to hire external workers?
    He or she owns a laptop, which is not part of the corporate system, but it is important that he or she can access his or her company’s resources from it. He or she needs instant access, while being able to work in the corporate system (or even in several systems of several companies at the same time) without affecting his or her own individual preferences. We have many years of experience in designing the most efficient workstations for external workers.
  • Can you help us train our colleagues?
    Of course, when it comes to the introduction or parameterisation of new systems, we are also happy to help with the initial training of colleagues. We are also available if you need a demonstration of IT systems or just need to brush up on your everyday IT knowledge.
  • What is a system security audit?
    Our experts can help you identify problem areas, conduct detailed investigations, and resolve identified security weaknesses.
  • What are the needs of mobile users?
    In most cases he or she works outside the workplace, but needs to be in possession of relevant, up-to-date information at all times. You need to be able to react immediately in unexpected situations, e.g. if your laptop is stolen, the data on it cannot fall into the wrong hands, but your settings and files cannot be lost, and your working environment must be reproducible quickly. Of course we can help you with that too.
  • We would only use the service a couple of times, is that possible?
    If you are interested, please contact us to arrange a meeting in person to assess your needs. It is of course possible to create individual, flexible rates or even hourly rates, but you should also browse our fixed fee packages.
  • What is system monitoring?
    It is the primary role of the system administrator. He or she will take care of setting up new accounts and active directory administration, creating access levels and user authentication frameworks. Tracks server performance, runs reports on system performance, monitors results.
  • What are the needs of the classic office user?
    He or she usually works from a desk, but may also travel or prepare his or her presentation in a meeting room. He or she needs high system performance and customised applications, so it’s important to have his or her settings available on all machines and to be able to access the files he or she needs quickly, wherever he or she is. That is: roaming profile and folder management, creation of a central file server, application virtualisation (App-V), desktop virtualisation (Med-V). Leave the most optimal design to us!

5400+ elvégzett project