IT Support and Technical Expertise
  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • Microsoft Office 365

    Microsoft Office 365Whether in your office or on the go, you get cloud email, document storage and Office applications - always the latest Read More
  • 24/7 PC Monitoring

    24/7 PC MonitoringWe treat our home and business clients in exactly the same way, delivering a friendly, professional service to the very
  • Business IT Support

    Business IT SupportOur specialist support packages for businesses enables us to ensure that our clients' technology stays operational. We provide staff with Read More
  • Website Design

    Website DesignPersonal blogs, Micro Business-Card Websites or large CMS/eCommerce sites. We can design and develop the perfect site for you or Read More
  • Domains & Email

    Domains & Email.co.uk only £4.99/yr, .com just £9.99/yr - Register your domain and get started in minutes. Read More
  • 1
  • 2

Quality Service

Focused on providing quality service to all clients. We want to understand what the client is asking for and to ensure that they receive it.

Professional Honesty

Sometimes the best thing to do will be to start again. Rather than trying to fix something that is not worth it we will advise that it makes more sense to start again.

Punctuality

We will always aim to be on time to any appointment. If it is clear that we will be late we will always call to warn of the delay and apologise.

Communication

We know that for many people IT jargon and “tech-speak” is another language. Pride ourselves on the ability to convey technical concepts or issues in plain English.

Trustworthy

We really care whether the problem presented to us has been solved. We want our clients to trust us with their IT and come back to us for future business.

Friendly

very friendly chaps – and with a good sense of humour too!


Google SSL changes that could affect your website's trust

On October 27th, a new version of Google Chrome will be released that will prominently label any site without an SSL Certificate as “non-secure” in the browser bar.

Your website will be affected by this change if it is not loaded over https://, contains input fields, asks for passwords or any other sensitive data, or is visited in incognito mode.

Read more: Google SSL changes that could affect your website's trust

Certified Tier-1 Microsoft Cloud Solution Provider (CSP)

In 2014, Microsoft unveiled its plans for the Cloud Solution Provider (CSP) programme, since then it has evolved drastically. Currently customers have the choice of purchasing Microsoft Office 365, Microsoft Intune, Microsoft Azureand Microsoft Dynamics CRM Online through the partner channel.

But what does this mean for partners and ultimately you - the customer?

Read more: Certified Tier-1 Microsoft Cloud Solution Provider (CSP)

Your Local IT Support

  • Tunbridge Wells
  • Tonbridge
  • Sevenoaks
  • Maidstone
  • Weald
  • Workforce Productivity
  • Keep Users Safe
  • Complete Control
  • Site blacklists: Set and automatically enforce browsing policies that keep users off non-work related sites like gaming or social media.
  • Time-based browsing policies: Modify blacklist rules to allow employees to visit non-work sites outside of standard business hours.
  • Threat protection: Protect against malware, phishing, adware, botnets, and spam.
  • Bandwidth monitoring: Monitor daily usage with automated bandwidth checks and alerts.
  • Access controls: Keep users off sites that could cause a data breach and protect the business from the legal liability that comes with a data breach.
  • Easy administration: TheTechworx.com Remote Monitoring & Management’s web-based console makes it simple to gain control over your users' web browsing with a user-friendly interface and workflow.
  • Policies: Use Our Remote Monitoring & Management’s default web protection policies or create your own custom rules for desktops, laptops, or servers.
  • Individual site blocking: Want to block specific sites that don't fall within our core site categories? The web protection feature lets you add custom URLs to the blacklist.
  • Benefits
  • Features
  • Staying Safe
  • Complete Control
  • Fully featured protection built on BitDefender's Endpoint Security engine.
  • Pay monthly, per device
  • Centrally managed by TheTechworx.com
  • Infection response from our helpdesk
  • No server required
  • No maintenance required
  • Flexible licensing
  • Award Winning Anti-Virus / Malware Protection
  • Active protection and behavioral scanning
  • Extensive signature-based scanning
  • Automatically always up-to-date
  • Application Control to block unauthorised applications.
  • Device Control to control use of memory sticks etc.
  • Extensive signature-based scanning: Use traditional signature-based threat detection to block known threats.
  • Heuristic checks: Protect against previously unknown threats using heuristic checks, which detect new, unrecognized viruses in a sandbox environment away from a business’ core systems.
  • Active protection and behavioral scanning: Shut down even the most sophisticated malware via continuous real-time monitoring that detects programs performing actions commonly associated with malware exploits.
  • Custom policies: Leveraging default policies for groups of servers, desktops, and laptops.
  • Powerful customization: Create your own policies around quarantine rules, virus definition downloads, etc.
  • Control timing: Pause, schedule or cancel scans to suit your environment needs.
  • Easy setup: Deploy managed antivirus in bulk across departments, servers, and workstations.
  • Proactive notifications: Our helpdesk receives updates in near real-time, as well as in-depth reports across your network to help quickly remedy malware issues.
  • Hybrid Backup
  • Backup & Restore
  • Enterprise Security
  • True-Delta™
  • Accelerator
  • Best of both worlds: Leverage a hybrid cloud architecture that gives you the control and speed of on-premises backup combined with the convenience and added redundancy of a cloud-based approach.
  • Back up a number of devices at almost any level: Back up everything, including workstations, servers, and even virtual machines and servers. Additionally, backups can be set for anything from individual files to applications all the way to full systems.
  • Fast backup: Take advantage of our True Delta technology, which backs up changes rather than full files. This helps to reduce the time it takes to run the backup process, allowing you to back up more frequently.
  • Fast recovery: Get rapid recovery after a disaster using our hybrid cloud architecture that restores from either cloud-based or local copies—whichever is faster.
  • Bare metal recovery: Restore to a bare metal state using nothing more than a bootable USB drive or CD-ROM.
  • Automatic updates: Remote Monitoring & Management can automatically update a standby virtual server after the completion of each live server backup.
  • Minimum resource usage: All backups and restores are lightweight, keeping resource drain to a minimum.
  • Bandwidth throttling: Restrict upload and download bandwidth during a user-defined backup window.
  • Standby image backup: Automatically create a local .VHD/X file of your backup selections during each scheduled backup.
  • Virtual machine support: Back up your virtual environments with host-level VMware® and Hyper-V® backups. You can restore to an existing or alternate virtual environment.
  • Ultra secure: Leverage AES 256 or 448-bit Blowfish encryption to help with keeping data safe on-premises, during transfers, and in the cloud.
  • Private keys: Data can be accessed only by someone holding a private key.
  • Secure data centers: Store your data in one of our global data centers, each of which are SSAE-compliant or ISO-certified.
  • Data archiving: Choose how long you want to retain backup copies, allowing you to keep specific datasets and backups indefinitely. 
  • Block-level changes: True Delta works at the block level, allowing it to transmit changes rather than the full file. 
  • Compatible across platforms: True Delta processes block-level changes for large files, Hyper-V, Microsoft Exchange, SQL Server, and much more. 
  • Better resource usage: By tracking only changes rather than full files, backups become so quick that they no longer have to be scheduled during off-hours. 
  • More frequent backups: With shorter backup windows, you’re able to back up data more frequently, helping ensure that your backups are current.
  • Enhanced backup performance: The Backup Accelerator in Online Backup decreases the backup time for large files when compared to regular file-level backups of the same data.
  • Large file support: By default, Online Backup keeps track of what has changed in selected files that are 5 GB or larger. This makes the backup of changes to databases in SQL Server, Exchange, and SharePoint, as well as changes to Outlook PST files, Outlook OST Files, and Hyper-V virtual machines as fast as traditional backups of changes to smaller files.
  • Full support for Windows: Backup Accelerator is supported on Windows 7 and higher on client machines and Windows Server 2008 R2 and higher on servers.
  • Benefits
  • Features
  • Provide faster support quickly connect to any machine in your managed networks with one click.
  • Lower costs as no longer a requirement to physically visit your site
  • Anytime access means users do not have to be present
  • Custom connection policies to suit your requirements
  • Background routine maintenance
  • File transfers: Remotely upload files, including scripts, to users’ systems without disturbing you as you work.
  • Remote command line: Use the remote command line to solve issues from afar and even issue PowerShell® commands.
  • System preferences: Open the system controls in the background to diagnose computer or network issues, review or kill processes, and more.
  • Session recordings: Record any support session you want, so you can review later for quality control or troubleshooting.
  • Chat transcripts: Review historical chat transcripts broken down by end user or technician.
  • Features
  • Monitoring
  • Reporting
  • Alerts and performance checks: Notifications on device availability, performance, security, and backup statuses.
  • Security monitoring: Monitor antivirus scanning statuses, errors in event logs, and much more
  • Windows, Mac, and Linux compatibility
  • Network performance monitoring: Easily health-check hardware and software on workstations and servers across multiple work locations.
  • Virtual machine monitoring
  • Automation and bulk actions
  • Windows, Mac, and Linux compatibility: Unlike other remote monitoring software that focuses on a single platform, SolarWinds Remote Monitoring & Management enables you to keep track of workstations and servers across platforms and operating systems including Windows, OS X, and multiple versions of Linux.
  • Network performance monitoring: Use SNMP functionality to monitor network devices—including servers, printers, routers, and switches.
  • Mobile device monitoring: Keep track of smartphones and tablets with mobile device checks and monitoring.
  • Virtual machine monitoring: Run checks on all virtual sessions and virtual machines under your control.
  • Background maintenance: Fix issues without disrupting end users or causing downtime by using remote command lines and custom scripts, and by managing system processes and services.
  • Maintenance windows: Set scheduled maintenance to run during off hours so you don’t disrupt employees’ productivity or raise false downtime alarms.
  • Automation and bulk actions: Standardize your checks, rules, and tasks across sites, servers, and workstations. And take full advantage of our automation and scripting tools to help you perform bulk actions automatically across networks and work sites.
  • Executive summary report: Our flagship report is designed to help you quantify and communicate the business and technical value of your services to your users and management. These reports display key metrics and support activities in an easy-to-digest, professional-looking business report that showcases all the critical functions you perform.
  • Additional reports: A wide variety of additional reports helps ensure that you get the level of reporting you need when you need it most. These reports cover such key areas as device inventory, pricing, antivirus protection, backup integrity, user audits, hardware and software checkups, and more. That’s data you can immediately use to improve your IT environments.
  • Multiple report formats: If you want to share reports outside of Remote Monitoring & Management, you can easily export any report.
  • Firewalls
  • Routers
  • Switches
  • Printers
  • Wireless
  • Firewall Rules Management
  • Firewall Configuration Changes
  • 24×7 Monitoring of Firewall Availability
  • 24×7 Response – Remote Support of Firewall Outages
  • Software & Firmware Updates
  • 24×7 Management / Monitoring / Remediation of all VPNs
  • Router/Modem/WAP Configuration Changes
  • Printer Software & Firmware Updates
  • 24×7 Monitoring of Router Availability
  • 24×7 Response – Remote Support of Router Outages
  • Switch Configuration Changes
  • Software & Firmware Updates
  • 24×7 Monitoring of Switch Availability
  • 24×7 Remote Support of Switch Outages
  • Printer Configuration Changes
  • Printer Software & Firmware Updates
  • 24×7 Printer Monitoring of Availability
  • 24×7 Response – Remote Support of Printer Outages
  • Wireless Network Configuration Changes
  • Wireless Network Software & Firmware Updates
  • 24×7 Wireless Network Monitoring of Availability
  • 24×7 Response – Remote Support of Wireless Network Outages
  • Flexible pricing based on your requirements. We support Individuals, Sole Traders, Small and Medium Sized Business
  • Friendly & jargon free support and advice from experienced team
  • No hidden charges. No sudden extras - Just plain and simple, itemised invoicing
  • Online helpdesk and ticket system, backed by telephone support
  • Proactive monitoring of users, desktops, networks and servers
  • Rapid response times
  • Focused advice and consultancy to shape IT strategy
  • Biannual technology and strategy reviews
load more / hold SHIFT key to load all load all