Fully featured protection built on BitDefender's Endpoint Security engine.
Pay monthly, per device
Centrally managed by TheTechworx.com
Infection response from our helpdesk
No server required
No maintenance required
Award Winning Anti-Virus / Malware Protection
Active protection and behavioral scanning
Extensive signature-based scanning
Automatically always up-to-date
Application Control to block unauthorised applications.
Device Control to control use of memory sticks etc.
Extensive signature-based scanning: Use traditional signature-based threat detection to block known threats.
Heuristic checks: Protect against previously unknown threats using heuristic checks, which detect new, unrecognized viruses in a sandbox environment away from a business’ core systems.
Active protection and behavioral scanning: Shut down even the most sophisticated malware via continuous real-time monitoring that detects programs performing actions commonly associated with malware exploits.
Custom policies: Leveraging default policies for groups of servers, desktops, and laptops.
Powerful customization: Create your own policies around quarantine rules, virus definition downloads, etc.
Control timing: Pause, schedule or cancel scans to suit your environment needs.
Easy setup: Deploy managed antivirus in bulk across departments, servers, and workstations.
Proactive notifications: Our helpdesk receives updates in near real-time, as well as in-depth reports across your network to help quickly remedy malware issues.
Keep Users Safe
Site blacklists: Set and automatically enforce browsing policies that keep users off non-work related sites like gaming or social media.
Time-based browsing policies: Modify blacklist rules to allow employees to visit non-work sites outside of standard business hours.
Threat protection: Protect against malware, phishing, adware, botnets, and spam.
Bandwidth monitoring: Monitor daily usage with automated bandwidth checks and alerts.
Access controls: Keep users off sites that could cause a data breach and protect the business from the legal liability that comes with a data breach.
Easy administration: TheTechworx.com Remote Monitoring & Management’s web-based console makes it simple to gain control over your users' web browsing with a user-friendly interface and workflow.
Policies: Use Our Remote Monitoring & Management’s default web protection policies or create your own custom rules for desktops, laptops, or servers.
Individual site blocking: Want to block specific sites that don't fall within our core site categories? The web protection feature lets you add custom URLs to the blacklist.
Backup & Restore
Best of both worlds: Leverage a hybrid cloud architecture that gives you the control and speed of on-premises backup combined with the convenience and added redundancy of a cloud-based approach.
Back up a number of devices at almost any level: Back up everything, including workstations, servers, and even virtual machines and servers. Additionally, backups can be set for anything from individual files to applications all the way to full systems.
Fast backup: Take advantage of our True Delta technology, which backs up changes rather than full files. This helps to reduce the time it takes to run the backup process, allowing you to back up more frequently.
Fast recovery: Get rapid recovery after a disaster using our hybrid cloud architecture that restores from either cloud-based or local copies—whichever is faster.
Bare metal recovery: Restore to a bare metal state using nothing more than a bootable USB drive or CD-ROM.
Automatic updates: Remote Monitoring & Management can automatically update a standby virtual server after the completion of each live server backup.
Minimum resource usage: All backups and restores are lightweight, keeping resource drain to a minimum.
Bandwidth throttling: Restrict upload and download bandwidth during a user-defined backup window.
Standby image backup: Automatically create a local .VHD/X file of your backup selections during each scheduled backup.
Virtual machine support: Back up your virtual environments with host-level VMware® and Hyper-V® backups. You can restore to an existing or alternate virtual environment.
Ultra secure: Leverage AES 256 or 448-bit Blowfish encryption to help with keeping data safe on-premises, during transfers, and in the cloud.
Private keys: Data can be accessed only by someone holding a private key.
Secure data centers: Store your data in one of our global data centers, each of which are SSAE-compliant or ISO-certified.
Data archiving: Choose how long you want to retain backup copies, allowing you to keep specific datasets and backups indefinitely.
Block-level changes: True Delta works at the block level, allowing it to transmit changes rather than the full file.
Compatible across platforms: True Delta processes block-level changes for large files, Hyper-V, Microsoft Exchange, SQL Server, and much more.
Better resource usage: By tracking only changes rather than full files, backups become so quick that they no longer have to be scheduled during off-hours.
More frequent backups: With shorter backup windows, you’re able to back up data more frequently, helping ensure that your backups are current.
Enhanced backup performance: The Backup Accelerator in Online Backup decreases the backup time for large files when compared to regular file-level backups of the same data.
Large file support: By default, Online Backup keeps track of what has changed in selected files that are 5 GB or larger. This makes the backup of changes to databases in SQL Server, Exchange, and SharePoint, as well as changes to Outlook PST files, Outlook OST Files, and Hyper-V virtual machines as fast as traditional backups of changes to smaller files.
Full support for Windows: Backup Accelerator is supported on Windows 7 and higher on client machines and Windows Server 2008 R2 and higher on servers.
Provide faster support quickly connect to any machine in your managed networks with one click.
Lower costs as no longer a requirement to physically visit your site
Anytime access means users do not have to be present
Custom connection policies to suit your requirements
Background routine maintenance
File transfers: Remotely upload files, including scripts, to users’ systems without disturbing you as you work.
Remote command line: Use the remote command line to solve issues from afar and even issue PowerShell® commands.
System preferences: Open the system controls in the background to diagnose computer or network issues, review or kill processes, and more.
Session recordings: Record any support session you want, so you can review later for quality control or troubleshooting.
Chat transcripts: Review historical chat transcripts broken down by end user or technician.
Alerts and performance checks: Notifications on device availability, performance, security, and backup statuses.
Security monitoring: Monitor antivirus scanning statuses, errors in event logs, and much more
Windows, Mac, and Linux compatibility
Network performance monitoring: Easily health-check hardware and software on workstations and servers across multiple work locations.
Virtual machine monitoring
Automation and bulk actions
Windows, Mac, and Linux compatibility: Unlike other remote monitoring software that focuses on a single platform, SolarWinds Remote Monitoring & Management enables you to keep track of workstations and servers across platforms and operating systems including Windows, OS X, and multiple versions of Linux.
Network performance monitoring: Use SNMP functionality to monitor network devices—including servers, printers, routers, and switches.
Mobile device monitoring: Keep track of smartphones and tablets with mobile device checks and monitoring.
Virtual machine monitoring: Run checks on all virtual sessions and virtual machines under your control.
Background maintenance: Fix issues without disrupting end users or causing downtime by using remote command lines and custom scripts, and by managing system processes and services.
Maintenance windows: Set scheduled maintenance to run during off hours so you don’t disrupt employees’ productivity or raise false downtime alarms.
Automation and bulk actions: Standardize your checks, rules, and tasks across sites, servers, and workstations. And take full advantage of our automation and scripting tools to help you perform bulk actions automatically across networks and work sites.
Executive summary report: Our flagship report is designed to help you quantify and communicate the business and technical value of your services to your users and management. These reports display key metrics and support activities in an easy-to-digest, professional-looking business report that showcases all the critical functions you perform.
Additional reports: A wide variety of additional reports helps ensure that you get the level of reporting you need when you need it most. These reports cover such key areas as device inventory, pricing, antivirus protection, backup integrity, user audits, hardware and software checkups, and more. That’s data you can immediately use to improve your IT environments.
Multiple report formats: If you want to share reports outside of Remote Monitoring & Management, you can easily export any report.
Firewall Rules Management
Firewall Configuration Changes
24×7 Monitoring of Firewall Availability
24×7 Response – Remote Support of Firewall Outages
Software & Firmware Updates
24×7 Management / Monitoring / Remediation of all VPNs
Router/Modem/WAP Configuration Changes
Printer Software & Firmware Updates
24×7 Monitoring of Router Availability
24×7 Response – Remote Support of Router Outages
Switch Configuration Changes
Software & Firmware Updates
24×7 Monitoring of Switch Availability
24×7 Remote Support of Switch Outages
Printer Configuration Changes
Printer Software & Firmware Updates
24×7 Printer Monitoring of Availability
24×7 Response – Remote Support of Printer Outages
Wireless Network Configuration Changes
Wireless Network Software & Firmware Updates
24×7 Wireless Network Monitoring of Availability
24×7 Response – Remote Support of Wireless Network Outages
Biannual technology and strategy reviews
30-day rolling contracts as standard - Ask about a 30-day trial of our services.
No hidden charges. No sudden extras - Just plain and simple, itemised invoicing
Complete suite of IT services available - Desktop, Server, Laptop & Mobile, Cloud and Websites Support
Rapid response times
Focused advice and consultancy to shape IT strategy
Proactive monitoring of users, desktops, networks and servers
Online helpdesk and ticket system, backed by telephone support