Call Us: +1 (888) 403-8996 - Mail: info@rexconsulting.net
Search

SMB Solutions.

Rex Consulting, Inc.

Systems Management

Information Technology Infrastructure Design and Planning

  • We help you strategize your IT resources to maximize benefit and eliminate unnecessary costs.
  • Our methods increase your ROI.
  • Proven track-record planning solutions for SMB businesses.

Monitoring / Alerting

  • Monitoring is the key to understanding the health of your applications.
  • Too often, mission-critical IT systems lack appropriate system monitoring functionality, leaving IT staff “blind” to important events.
  • The goal of good monitoring is to be able to anticipate and predict problems and address them before they become problems.
  • We’ve seen ineffective monitoring systems out there that alert on non-events, and miss other critical events. We address situations like these with an audit and follow up with an action plan.
  • Period audits allow you to review your monitoring system, and find and fix gaps.
  • Most standard services can be monitored “out of the box”. We also can build customized service checks.
  • Alerts of important events to your staff and ours by email and SMS.

Anti-Virus

  • From email solutions at the perimeter of the network to the desktop; from email security to browser security, we’ve got you covered.
  • Prevention is the best medicine, but if you have a problem already, we can help you.

Cloud technologies

  • Cloud technology has many good applications, from external website hosting to email and even SSO (single-sign on).
  • Rex Consulting has provided “cloud” based services since before it was called “the cloud”.

Backup / Disaster Recovery

  • Having designed and provided operational support to many critical operations since 1993 at Vandenberg Air Force Base, we are experts in designing robust highly available systems.
  • Email Disaster Recovery Services provide email queuing as well as a backup email server if your email server is down.
  • Website and DNS Disaster Recovery Plans ensure that your external web presence will remain available in the event of a server or datacenter failure.
  • LDAP/Identity Management Disaster Recovery Plans are important to customers who maintain LDAP directories and/or identity management databases. These systems quickly become mission-critical and outages can be prevented with good planning.

Security

  • LDAP security. If you use LDAP or Active Directory in your environment. Typically the sensitive user information stored in directory systems is some of the most important data to protect in a network.
  • SSL Certificate/token Management. Too often small/medium business does not have the internal resources to manage certificate and token life cycles. Rex Consulting provide management and clarity to token and certificate management solutions.
  • Security Threat Analysis. Rex Consulting can help you define your threat model, and audit your network to find and fix gaps in your security.
  • Patch Management. Software vulnerabilities are addressed by patching. We create methods to keep your systems up to date.
Safety-Net

Service Contracts

Stability

  • With a proven track record in high availability, Rex Consulting is a team you can trust with the management of your IT services.
  • We can help simplify the management of your network with our management technique and experience.
  • It can’t always be simple. When the situation is necessarily complex, you need a professional team who can handle complex environments.

Incident Management

  • Excellence in preventing emergency situations using monitoring and log analysis.
  • Excellence in handling problem incidents and emergency situations.
  • Proven track-record in outage management/resolution/root cause analysis.

Monitoring/Alerting Service Contracts

  • Monitoring is the key to understanding the health of your applications.
  • Too often, mission-critical IT systems lack appropriate system monitoring functionality, leaving IT staff “blind” to important events.
  • The goal of good monitoring is to be able to anticipate and predict problems and address them before they become problems.
  • We’ve seen ineffective monitoring systems out there that alert on non-events, and miss other critical events. We address situations like these with an audit and follow up with an action plan.
  • Period audits allow you to review your monitoring system, and find and fix gaps.
  • Most standard services can be monitored “out of the box”. We also can build customized service checks.
  • Alerts of important events to your staff and ours by email and SMS.

Service-level Options

  • Platinum: 1 hour response time, 24 hours a day, 7 days a week.
  • Gold: 1 hour response time, M-F.
  • Iridium: 4-hour response time, 24 hours a day, 7 days week.
  • Silver: 4-hour response time, M-F.
  • Bronze: 24-hour response time, 24 hours a day, 7 days a week.
  • Mercury: 24-hour response time, M-F.
@ sign

Email Solutions

McAfee SaaS Email Security / Inbound Filtering

  • The service blocks billions of spam, viruses, worms, and phishing threats outside the network every month.
  • Activation starts with a simple MX record redirection and then you fine-tune the system to your specifications through our intuitive web-based Control Console.
  • SaaS is easy-to-justify as an operational expense.
  • Integrating these SaaS solutions eliminates the need to hire additional IT staff.
  • Rex Consulting includes 24/7 priority support.

McAfee SaaS Email Archiving

  • Easy to set up with Microsoft Exchange servers.
  • Integrates powerful, rapid search functionality designed for simplicity.
  • Includes a highly-intuitive user interface.
  • Offers the most sophisticated features at an equally-attractive price.
  • Includes unlimited storage at no extra charge.
  • Provides optional retention periods for 1, 3, 5 or 7 years.
  • Offered through our bundled products/pricing or as a stand-alone service.

Email Service Monitoring

  • Our SaaS solutions include service monitoring of your external internet email interfaces.
  • Configurable alerts of important events to your staff and ours by email and SMS.
  • Service response time history and graphing.

IMAP and Outbound email services (SMTP-SASL)

  • If you don’t want to deal with hosting your own email, and want to store your email with someone who you can trust, we offer IMAP services with unlimited storage.
  • Works very well with all popular mobile devices from iPhone, Android, Blackberry, and more.
  • Outbound services from anywhere (even from networks that block email).
  • Enforce TLS from specified sender domains.

Outbound Email Scanning / Data protection

  • If you are concerned about important data leaving your network by email, we offer outbound filtering on content.
  • Notify specified supervisors of unauthorized emailing of sensitive data, or of inappropriate content.
  • Block outbound viruses.
  • Add disclaimer to all outbound email.
  • Enforce TLS on outbound connections to specified recipient domains.

Encryption

  • Opportunistic TLS on all inbound and outbound SMTP connections.
  • Forced TLS on specified inbound and outbound SMTP connections.
  • End-to-end email encryption.
  • Policy based encryption.
Back to Top
Enter your Infotext or Widgets here...