In Computer science and Computer engineering Computer hardware is the collection of physical elements that constitutes a computer system. Computer hardware refers to the physical parts or components of a computer such as the monitor,mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched (known as tangible).[1] In contrast,software is instructions that can be stored and run by hardware.

Business Server Solutions

User Solutions
Notebooks / laptops
Desktop computers
Thin clients

Printing Solutions
Dot matrix
All-in-one multi-function devices

Peripherals / Accessories
Monitors – LCDs, LEDs
Routers / Modems
External Hard Drives

Network Equipment – Hardware
Manufacturers (we can source any specific product of your choice)
• APC Molex 3COM Intel Toshiba GE Cisco Dell Netgear Dlink

IP Telephony – Hardware
Manufacturers (we can source any specific product of your choice)
• Snom NetGear Linksys (owned by Cisco) D-Link Belkin 3Com


Computer software, or simply software is any set of machine-readable instructions that directs a computer’s processor to perform specific operations. Computer software contrasts with computer hardware, which is the physical component of computers. Computer hardware and software require each other and neither can be realistically used without the other. Using a musical analogy, hardware is like a musical instrument and software is like the notes played on that instrument.

Computer software includes computer programs, libraries and their associated documentation. The word software is also sometimes used in a more narrow sense, meaning application software only. Software is stored in computer memory and is intangible, i.e. it cannot be touched.[1]

Commercial Software
We can supply and source almost any commercial software per request. We are partners of most commercial software products. If we cannot resell the specific software we will put you in touch with the relevant companies to do so.

Custom Developed Software
UIT strongly believes that any software can be built by integrating component-based building blocks, regardless of the functionality required. As this is an evolving process, every software development project involves drafting a strategic construction architecture blueprint as part of the detailed design phase to ensure that the design patterns, as well as their interfaces are designed for reusability.
UIT offers a specialized team of architects with experience in designing and building applications. Our team provides strategic technology recommendations that can withstand future demands of changing business processes. We do this by using a unique methodology and by helping our clients select technologies based on industry trends. Some of our important architectural services are: the review of enterprise architecture, component-based definition of functional responsibilities and developing re-usable integration mechanisms.


UIT’s vision behind its enterprise architecture and technology consulting is to provide leading-edge technology solutions and consulting to our clients. Assisting enterprises to develop re-usable technology architecture patterns that can be utilized across the enterprise is one of the key strengths of UIT.


Technical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS/WhatsApp, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services (Microsoft Remote Desktop / Teamviewer) ; while more complicated problems with hardware or software may need to be dealt with in person.


Remote Consultation

RDPRemote Consultation is a method for troubleshooting software related problems usually via remote desktop or Teamviewer connections. Technicians use software that allows them to access the user’s desktop via the Internet. With the user’s permission, the technician can take control of the user’s mouse and keyboard inputs, transfer various diagnostic and repair applications to the user’s desktop, run scans, install antivirus programs, etc. If the remote service permits it, the technician can even reboot the PC and reconnect remotely to continue his/her work without the user’s assistance.tEAMVIEWER

Common repairs available with online computer support providers are computer virus and spyware removal, computer optimization, Windows Registry repair, device driver issues, Web related issues, and Windows security updates.
Normally only software can be “repaired” remotely. A computer with a broken hardware component (such as a motherboard or hard disk) can, in some cases, be diagnosed and worked around but must be repaired or replaced while located with the defective hardware. However hot-swappable components do allow for remote “replacement” of faulty hardware to some extent by switching to the standby device, without the need for physically working on the system in question.


Time and Material

Callout – Time and Materials
This type of consultation has been very common in the services industry. It is also known as “Time and Materials” IT consultation and support. The concept behind this type of support is that the customer pays for the materials (Hard Drive, Memory, Computer, Digital Devices etc.) as well as pays the technician based on their pre-negotiated rate when they have a problem.

Predetermined quantity of hours
Predetermined quantity of hours is basically a way to purchase a bunch of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate it does not have to be so and could just be a standard non-reduced rate, it can also represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use per month. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.



Managed Services (Service level agreement)
Managed Services means a company will receive a list of well-defined services on an ongoing basis, with well-defined “response and resolution times” for a fixed rate or a flat fee. This can include things like 24/7 Monitoring of Servers, 24/7 Help desk for your daily computer issues and On-site visits by a technician when issues cannot be resolved remotely. We also offer additional services like Project Management, Backup and Disaster Recovery and Vendor management in the monthly price.


What is Cloud Computing?
Cloud computing is a topic that many find confusing. It isn’t, though, as confusing as it sounds. In fact, most of those who claim not to understand the subject are part of the majority that use it daily.
In basic terms, cloud computing is the phrase used to describe different scenarios in which computing resource is delivered as a service over a network connection (usually, this is the internet). Cloud computing is therefore a type of computing that relies on sharing a pool of physical and/or virtual resources, rather than deploying local or personal hardware and software. It is somewhat synonymous with the term ‘utility computing’ as users are able to tap into a supply of computing resource rather than manage the equipment needed to generate it themselves; much in the same way as a consumer tapping into the national electricity supply, instead of running their own generator.

One of the key characteristics of cloud computing is the flexibility that it offers and one of the ways that flexibility is offered is through scalability. This refers to the ability of a system to adapt and scale to changes in workload. Cloud technology allows for the automatic provision and deprovision of resource as and when it is necessary, thus ensuring that the level of resource available is as closely matched to current demand as possible. This is a defining characteristic that differentiates it from other computing models where resource is delivered in blocks (e.g., individual servers, downloaded software applications), usually with fixed capacities and upfront costs. With cloud computing, the end user usually pays only for the resource they use and so avoids the inefficiencies and expense of any unused capacity.

However, the advantages of cloud computing are not limited to flexibility. Enterprise can also benefit (in varying degrees) from the economies of scale created by setting up services en masse with the same computing environments, and the reliability of physically hosting services across multiple servers where individual system failures do not affect the continuity of the service.

There is also great choice in the level of security and management required in cloud deployments, with an option to suit almost any business:
A public cloud, for example, is a cloud in which services and infrastructure are hosted off-site by a cloud provider, shared across their client base and accessed by these clients via public networks such as the internet. Public clouds offer great economies of scale and redundancy but are more vulnerable than private cloud setups due their high levels of accessibility.
Private clouds on the other hand use pooled services and infrastructure stored and maintained on a private network – whether physical or virtual – accessible for only one client. The obvious benefits to this are greater levels of security and control. Cost benefits must be sacrificed to some extent though, as the enterprise in question will have to purchase/rent and maintain all the necessary software and hardware.

The final cloud option is a hybrid cloud and this, as the name suggests, combines both public and private cloud elements. A hybrid cloud allows a company to maximise their efficiencies; by utilising the public cloud for non-sensitive operations while using a private setup for sensitive or mission critical operations, companies can ensure that their computing setup is ideal without paying any more than is necessary.
Moving away from deployment models, broadly speaking there are 3 models of cloud computing which describe the service on offer; these are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).

As with the other cloud computing categories, IaaS refers to the delivery of virtualised computing resource as a service across a network connection. IaaS specifically deals with hardware – or computing infrastructure – delivered as a service. Offerings include virtualised server space, storage space, network connections and IP addresses. The resource is pulled from a pool of servers distributed across data centres under the provider’s control, the user is then granted access to this resource in order to build their own IT platforms. IaaS can provide enterprises with great business benefits.

PaaS is an extension of IaaS and describes a category of cloud computing that provides developers with environments in which to build applications, over the internet. In addition to the fundamental computing resource supplied by the hardware in an IaaS offering, PaaS models also include the software and configuration (often known as the solution stack) required to create the platform on which clients can create their applications. PaaS packages can be tailored to meet individual user needs; they can cherry pick the features of the service that are relevant to them while disregarding those that are not. PaaS provides a number of benefits to enterprises, including simplifying the development process for geographically split development teams.

SaaS is arguably the most common of the cloud computing variations; it’s the term used to describe a software delivery model in which applications are hosted (usually by a provider) and made available to customers over a network connection. Many people make use of SaaS without realising it as many web applications are delivered in this way; Gmail, Flickr, Twitter and Facebook are all popular examples of SaaS. Enterprise users also frequently make use of SaaS with many popular accounting, invoicing, sales, communications and CRM systems being delivered this way.



What is Cloud Hosting?
Cloud hosting services provide hosting for websites on virtual servers which pull their computing resource from extensive underlying networks of physical web servers. It follows the utility model of computing in that it is available as a service rather than a product and is therefore comparable with traditional utilities such as electricity. Broadly speaking the client can tap into their service as much as they need, depending on the demands of their website, and they will only pay for what they use.
It exists as an alternative to hosting websites on single servers (either dedicated or shared servers) and can be considered as an extension of the concept of clustered hosting where websites are hosted on multiple servers. With cloud hosting however, the network of servers that are used is vast and often pulled from different data centres in different locations.
A development of the concept of cloud hosting for enterprise customers is the Virtual Data Centre (VDC). This employs a virtualised network of servers in the cloud which can be used to host all of a business’s IT operations including its websites.
The more obvious examples of cloud hosting involve the use of public cloud models – that is hosting websites on virtual servers which pull resource from the same pool as other publicly available virtual servers and use the same public networks to transmit the data; data which is physically stored on the underlying shared servers which form the cloud resource. These public clouds will include some security measures to ensure that data is kept private and would suffice for most website installations. However, where security and privacy is more of a concern, businesses can turn towards cloud hosting in private clouds as an alternative – that is clouds which use ring-fenced resources (servers, networks etc), whether located on site or with the cloud provider.

A typical cloud hosting offering can deliver the following features and benefits:
Reliability; rather than being hosted on one single instance of a physical server the website is hosted on a virtual partition which draws its resources, such as disk space, from an extensive network of underlying physical servers. If one server goes offline, it dilutes the level of resource available to the cloud a little but will have no effect on the availability of the website whose virtual server will continue to pull resource from the remaining network of servers. Some cloud platforms could even survive an entire data centre going offline as the pooled cloud resource is drawn from multiple data centres in different locations to spread the risk.
Physical Security; the underlying physical servers are still housed within data centers and so benefit from the security measures that those facilities implement to prevent people accessing or disrupting them on-site
Scalability and Flexibility; resource is available in real time on demand and not limited to the physical constraints/capacity of one server. If a client’s site demands extra resource from its hosting platform due to a spike in visitor traffic or the implementation of new functionality, the resource is accessed seamlessly. Even when using a private cloud model the service can often be allowed to ‘burst’ to access resources from the public cloud for non-sensitive processing if there are surges in activity on the site.
Utility style costing; the client only pays for what they actually use. The resource is available for spikes in demand but there is no wasted capacity remaining unused when demand is lower.
Responsive load balancing; load balancing is software based and therefore can be instantly scalable to respond to changing demands


Roadmap tp Cloud

Roadmap to Cloud
UIT helps business to assess and identify opportunities to move to a cloud environment to gain optimal benefits based on business objectives. UIT provides clients with a road map to assess existing infrastructure environments and what is needed to successfully migrate to a cloud environment.

Cloud Integration and Migration
UIT has extensive experience working with cloud integration and migration technologies, enabling companies to move their corporate IT processing into private or hybrid cloud solutions. Our team helps firms at all stages of the services lifecycle, from consolidation and standardization of infrastructure environment, to platform virtualization, end-to-end development life cycle, program management, and migration to the cloud.


  • Server Hosting

Dedicated Servers
UIT’s Dedicated Hosting Services provide business critical applications a platform with the stability and performance they demand, and are suited to organisations where regulations and compliance deem it necessary to use dedicated devices. These servers are built using standardised industry leading equipment; however, UIT also provides options for bespoke hardware where necessary.

Data Center

Virtual Servers
Many clients require assistance simplifying their business infrastructure, while enhancing flexibility, availability, and recoverability for infrastructure operating environments. To meet these goals, UIT offers a broad variety of virtualization consulting services. Years of virtualization expertise, technology-specific best practices, and template-based delivery methodologies enable UIT to deliver virtualization services to customers that meet their specific needs. Our clients have objectives that include: consolidating data centers, reducing overall operating costs, deploying platforms rapidly to meet business demands, increasing infrastructure availability, or improving disaster recovery and business continuity processes.

Universal Information Technologies provides a variety of managed virtualisation options which are available within a shared or private infrastructure of resources, or a combination of both. Our virtual server hosting offerings include:

Managed Virtual Servers – Provisioned by allocating resources from an “in the cloud” shared infrastructure of processors, memory and storage. This service typically provides a very economic hosting option allowing customers to provision virtual servers, firewalls and storage.. All virtual devices are configured for high availability, so in the event of a hardware failure the service will automatically restart on an alternative device, meaning near zero downtime whatever the application.

Managed Private Cloud – For solutions where a dedicated VMware infrastructure is a requirement for additional security and reliability, UIT can provide a Managed Private Cloud. This service provides the greatest technical flexibility and performance for services. UIT provides a dedicated cluster of virtual server hosts and enterprise storage, which can scale out as required. Onto this cluster, virtual machines can be deployed in any configuration within the limitations of the infrastructure and software.

Integrated Dedicated Hosting & Virtual Servers – Our dedicated servers and virtual servers offer the option to integrate managed dedicated and virtual services into a single solution to benefit from the best of both infrastructures. This enables organisations to take advantage of virtualisation technology benefits such as reduced CAPEX, simplified upgrades and expansion, and dynamic performance for these types of servers, whilst also providing stable performance and supportable infrastructure for those functions where Dedicated Server hosting is more suitable.

A flexible alternative for your housing needs
Colocation is a cost-effective option for businesses that require a stable, high-performance network while maintaining complete control over hardware and server administration. Hosted in a state-of-the-art Data Centre, you supply the hardware, we offer you the full benefit of a world-class, carrier neutral facility.

Climate Control
N+2 redundancy on our air conditioning units
When ambient temperature allows for it, we make use of direct free cooling
This significantly reduces our power consumption and carbon footprint.

EOH Carrier Services and Internet Solutions are our primary bandwidth providers
Using two network providers significantly increases network resilience
Connectivity is provided through diverse, redundant fibre routes connecting the facility to a 10Gbps fibre ring.

Fully redundant, physically separated A+B feeds provide power to the facility.
A single utility power feed can be disconnected without interruption to service.
Equipment with a single power supply also benefits from this redundancy through our sophisticated static transfer switch design
UPS backup and a standby generator on each feed provides further resilience.

Juniper Network
Juniper offers a high-performance network infrastructure
Our virtual chassis technology increases the redundancy and resilience of our network, allowing for high levels of automation in the provisioning process
A highly responsive environment for accelerating the deployment of services.

Fire Protection
The facility has fire detection through Very Early Smoke Detection Apparatus (VESDA).

24/7 security presence with CCTV camera surveillance
Biometric access is installed on all access points
A high voltage electric fence provides perimeter security.

    • Email Hosting


When you check your email with a POP connection, new email messages are downloaded to your computer and are then deleted from the email server. Some the features included are below:
Access – Since your email is stored on your computer, you must be at your computer to access your email.
Storage – You don’t need to worry about running out of online storage space. Since you’re downloading your emails to your computer, you can keep as many emails as your computer can store.
Backup – You should implement an effective backup system for your computer, in case you need to retrieve lost or deleted emails.
Internet Connection – You will need an Internet connection to download email, but you can view your downloaded email offline (i.e., without an Internet connection).

When checking your email with an IMAP connection, you are accessing and managing your email directly from the email server. Some the features included are below:
Access – Since the emails are stored on the email server, you can access and manage your email and email folders from multiple computers or mobile devices.
Storage – If you have limited online storage space, you may need to delete some emails periodically to avoid exceeding your storage capacity.
Backup – Email is automatically backed up every evening; so, if you accidentally delete an email, your email administrator can retrieve it, even up to 14 days later. It however remains the clients’ responsibility to backup all important mails.
Internet Connection – If you do not have an Internet connection, you cannot access your email.

Microsoft Exchange


What is hosted exchange?
Microsoft Exchange Server is the leading business-grade messaging system. Exchange offers a number of capabilities, including email, calendaring, task management, address lists, and access to shared document repositories, and other functions. Exchange was originally introduced in June 1996 and has been upgraded several times since to include additional and enhanced features.

Hosted Exchange is a robust, business-grade platform that is in use by millions of business users around the world. It offers the full Exchange experience for users who can access it via a variety of platforms, and it frees IT from the burden of having to manage an Exchange infrastructure internally. Moreover, hosted Exchange from leading providers offers a fully redundant email continuity solution that can ensure that downtime is minimized and will typically be better than on-premises solutions. The cost of hosted Exchange is typically much lower than the cost of Exchange when managed on-premises, for both small and large organizations.

What benefits can you expect?

Why should your organization consider migrating to hosted Exchange? There are a number of important reasons to consider doing so that are focused on direct costs, opportunity costs, security and other benefits, as discussed below.
• Lower costs
Many decision makers believe that an internally managed Exchange deployment is less expensive to deploy and operate than hosted Exchange. While in some cases that perception is accurate, very often it is not. The direct cost savings from using hosted Exchange are substantial. It is also important to note that leading providers of hosted Exchange include the licensing costs as part of their service, further reducing the cost of hosted compared to on-premises Exchange.

• More predictable costs
Further, a hosted Exchange deployment provides more predictable costs than on-premises deployments because the cost per seat is fixed over the lifetime of the contract with the hosting provider. This predictability of costs manifests itself in two important ways:
Unforeseen problems can create additional costs for an on-premises deployment, including natural disasters, power outages, moves to new facilities and other events that can add to the cost of managing on-premises Exchange in a somewhat unpredictable manner.

An organization that continually adds users will, at some point, reach the maximum number of users that its infrastructure will support and will then have to add servers and other infrastructure to support new users. This creates a step function in the total cost of ownership for an Exchange environment can drive up the cost of Exchange management dramatically.

• Reduced opportunity costs
Among the more important issues that any organization should consider is that of the opportunity cost of IT staff members or, in smaller organizations, individuals who are charged with maintaining on-premises systems. Most decision makers understand that finding and retaining qualified IT staff is not particularly easy. As a result, in-house IT staff members should be used in a manner that allows them to provide maximum benefit to their employer, while also giving them a satisfying work experience that will motivate them not to go elsewhere. Using hosted Exchange frees IT staff members from the requirement to constantly monitor the servers to ensure continuous uptime, freeing them for work that is not only more interesting to them, but also more compelling for the business.

With hosted Exchange, IT staff can be deployed on projects that offer more competitive value to the organization and can also result in greater IT job satisfaction. For example, if an IT staff member can manage a messaging capability very well, he or she provides some level of value to the organization. However, if the same staff member spent the same amount of time implementing new CRM capabilities that could convert a higher proportion of prospects into customers, it is very likely that much greater value could be realized from the same level of effort.

• Access to exchange expertise
Although Exchange is an easy system for users to employ, it is not a simple system to manage internally. It requires expertise in a number of areas, particularly when deploying a new version of the system, it requires expertise in each of the several server roles that comprise the Exchange platform, and it requires expertise in various other technologies that are integral to the Exchange ecosystem. The cost to develop this expertise can be high and, for smaller organizations, often prohibitive. In contrast, the use of a hosted Exchange provider can offer access to well-trained technical support staff.

• Robust business continuity and data backup
One of the more compelling benefits of hosted Exchange is the fact that a third party is managing the entire backend infrastructure, thereby minimizing the impact of major and minor services outages and the ensuing loss of email that can impact any business. For example, power outages or storms can bring down messaging capabilities for hours or even a few days. While these events can also impact providers of hosted Exchange services, leading providers will back up their customers’ email, allowing uninterrupted receipt of email for customers until they can come back online. This is something that a non-technical staff member or senior executive can do.

Further, in the event that a customer’s facilities are made unavailable for any length of time, employees can still access their hosted Exchange accounts from anywhere using a Web browser, a mobile device or a copy of Outlook or Entourage on their home computer.

• Rapid deployment and scaling
One of the chief benefits of hosted Exchange is the speed with which email services can be deployed. For example, deploying hosted Exchange typically requires little more than the modification of an MX record and a change in the configuration of local email clients. Adding new users to an existing hosted Exchange deployment normally requires just some simple modifications in a Web-based administration tool. This makes it easy to add or eliminate small numbers of users, or even entire business operations, which is particularly important when integrating merged or acquired companies into an Exchange infrastructure.

• Deployment flexibility
A hosted Exchange capability allows organizations to be more flexible in the way that they deploy email to their employees. For example, a company may opt to manage Exchange in-house for its corporate headquarters, but provide hosted Exchange to each of its field offices that do not have an in-house IT staff. This allows the organization to provide highly available messaging services that provide a consistent user experience across the entire organization, but at much lower cost than if the IT staff was used to manage the satellite offices.

• Relatively painless migration to new exchange versions
Migrating from one version of Exchange to another is just that – a migration, not an upgrade. Because Exchange does not allow an in-place upgrade to a new version, the cost of migration can be very high and even prohibitive for smaller organizations. Using a hosted Exchange provider, on the other hand, minimizes or even eliminates the cost of migration, since some providers will migrate their customers to a new version at no charge. Not only does this minimize the IT pain and the time required to migrate, not to mention the potential for downtime in the system, but it also dramatically reduces the overall cost of Exchange management over the long term.

• Minimizing the impact on the internal network
Another important benefit of hosted Exchange is that much of the network traffic that would normally take place with an on-premises deployment of Exchange is transferred to the hosting provider. For example, a hosted Exchange provider that also offers anti-virus and anti-spam filtering will eliminate 75% or more of the email that would normally come into the network as spam, only to be quarantined and eventually discarded by end users. This saves significantly on both bandwidth and storage, costs that are growing exponentially and unpredictably in smaller organizations.

• Robust physical security
Virtually all leading hosted Exchange providers operate very secure physical facilities that include video surveillance capabilities, multiple employee access points using multi-factor authentication, tracking and monitoring tools and other capabilities that protect their customers’ data from being compromised. In most cases, the security provided by hosted Exchange providers exceeds the security that their customers could afford to deploy.

Benefits for end users
While IT can benefit significantly from a hosted Exchange deployment, so can end users. Among the many user benefits associated with the use of hosted Exchange are those discussed below.

• A variety of access options
A hosted Exchange account can be accessed via Microsoft Outlook on Windows or a Mac, as well as from any leading Web browser. This permits users to access their email, calendar, tasks, address lists, Exchange public folders and other content and data sources from virtually any desktop, laptop, netbook or other platform. In addition, an Exchange account can also be accessed from any POP or IMAP client, including VMware’s Zimbra desktop client.

Windows and mac support
While Apple Mail, the mail client that comes with Mac OS X, has allowed users to access Exchange for many years as a POP or IMAP client, OS X began providing full support for Exchange in August 2009 with the introduction of Snow Leopard. Exchange support is also built into iCal, the default Mac calendaring application; and Address Book, all of which come standard on a Mac. While lacking some of the features of Outlook 2011 for the Mac, Mail, iCal and Address Book provide robust and native functionality for hosted Exchange users.

• Mobile access
In addition to a variety of desktop and browser-based platforms, a hosted Exchange account can also be accessed using BlackBerries, iPhones, Android smartphones, iPads, Android tablets and Windows Phones, among other platforms. This is a critical issue, since a large and growing number of email users consider their mobile platform to be an essential component of their email access – for some users, it is their primary email platform after hours.

• Synchronization across all platforms
One of the key benefits of hosted Exchange is that users who create content in Exchange will see it automatically synchronize across all of their access devices. For example:
A user can create an appointment in Microsoft Outlook on their desktop and it will appear very shortly thereafter on any mobile devices connected to Exchange.
An email can be created using Outlook Web Access on a laptop and then appear in the Sent Items folder in Outlook on their desktop at home.

• Support for “big m” mobility
Mobility in the context of being able to access email, calendars, etc. on mobile devices is important. However, “Big M” mobility – the ability for individuals to work from any location on any device – is becoming more important as fewer workers have a permanent location assigned for their work. For example, a growing proportion of organizations allow employees to work from home and come into the office only when necessary, thus providing significant savings on facilities’ leasing costs, power, HVAC and taxes.

Hosted Exchange is a key enabler of this capability because it allows workers to have access to their email, calendars, address lists, task management tools, etc. regardless of where they might be working – be it from home, a hotel room or a client’s conference room. This can further add to the cost savings provided by a hosted Exchange deployment far beyond the IT-related savings that it provides.

Mail Archiving
A single, accessible cloud archive for your business’s most important information
Businesses today are obliged to retain increasingly more data for compliance purposes. Email has long been a primary repository for Human Generated Data (HGD) and the corporate IP held within it, so the need to archive email is well established. Increasingly, though, HGD is fragmented across the enterprise, stored in siloes – both in the cloud and on-premises – and represents a potentially huge headache for IT. This data also represents a company’s corporate memory, and is therefore critical that it is protected and stored, not only for compliance purposes but so as to realize the untapped value of that information in the longer term.

A unified archive in the cloud
Our Enterprise Information Archiving provides a secure, dependable and highly scalable solution to growing information management challenges. A single, tightly integrated cloud platform delivers unified and secure enterprise email archiving as well as file archiving and IM archiving.
Instantly protect valuable intellectual property assets through a purpose-built, highly secure and trusted cloud platform with 100% service availability SLA.
Delight users and speed workflows with rapid search and content retrieval through a single, intuitive search interface across a choice of desktop and mobile apps.
Reduce cost and complexity through a single cloud platform and administrative console.

    • Web Site Hosting

Our hosting plans include everything you need to get your personal or business website online and manage with ease.

Business Website Hosting
This fully featured web hosting plan gives you the resources you need to host your growing website. Business Hosting offers more of everything including disk space, data transfer, email.

Windows Hosting
For clients who need to use ASP.net and other windows based languages, our Windows hosting offers affordability along with a rock-solid Windows based Shared Hosting platform. Our products feature unlimited web traffic. Hosted on a reliable infrastructure at one of our many state of the art data centres, you can rest assured that your servers are hosted at facilities that offer the very best redundancy and security features to ensure the best performance always.

    • Domain Hosting

Domain Hosting

Choosing the right domain name.
When customers want to find a business, whether it’s a local restaurant or a global retailer, the Web is the first place they look.
Domain names not only make it easy for customers to find your business on the Web, they also give you a place where you can create your own unique online presence, from a full-blown Web store to a simple online business card with your contact information, hours and location.

How you choose your domain name depends on where you are with your business. If you’re already up and running with a brick-&-mortar location, you’ll want to choose a domain that matches your business name. You’ve worked hard to create a name and a brand that customers know and love, so you having the matching domain only makes sense for your customers.

Of course, if you have a popular name (like AAA Plumbing), your first choice may not be available. If that’s the case, don’t worry — there are virtually endless domain variations available. Try a different domain extension like .NET, .BIZ or .CO instead of just .COM or CO.ZA. Another tip is to add a local element to your name, such as AAAPlumbingPretoria.co.za. This not only differentiates your business from others that may be located across the country, it can help improve your search engine results for local customers.

If you’re just starting out — or you’re launching a business that will only exist online — choosing your domain name is essentially choosing your company name. You want a name that’s memorable and represents your business, if not literally, then at least your company’s personality or attitude.

And all businesses, new and established, can benefit from a few best practices when it comes to choosing a domain, such as making your name easy to spell and keeping it short.

How domain names can build & protect your brand.
As a small business owner, you’re constantly working to build your brand — making sure your company is known for unbeatable quality and remarkable service. While social media websites like Facebook® and Yelp® are valuable tools in helping you establish a stellar reputation, they’re no replacement for your own unique domain name.
More than anything, a domain name gives your business a level of professionalism and legitimacy you simply can’t get from a social media profile. While the process of domain name registration is easier and more affordable than most people realize, taking the time to register a domain shows a level of commitment and dedication. In short, it shows customers that you’re serious about your business.

A domain name also gives you a secret weapon in marketing your business: a domain-based email address, like you@yourcompany.com. What makes this so special? Well, like a domain, it shows a level of professionalism that you can’t get from a free email address. But just as importantly, it promotes your brand every time you send a message. Instead of seeing an email from a Gmail™ or Yahoo!® address in their inbox, customers see your company name — and the more they see it, the more they’ll remember it.

Domain services
Domain Pointing
Pointing your domain name is what we call the process to update where your domain name is hosted. When we point your domain name to your website we begin hosting your domain name. There are marketing advantages to pointing your domain name rather than simply redirecting/forwarding it. One major advantage is that your domain is more likely to be recognized by search engines. Search engines will not index websites that have a redirection.

In addition, when you modify your domain name servers to our servers, pointing your domain name to us, your website is branded with your domain name. All email correspondence from your website will show your domain name as your website address rather than the actual address.

Domain Forwarding
Domain Forwarding allows you to access your website via your domain name without changing the domain name server information. However, once you hit your website, the URL address defaults back to the actual URL address, losing much of the effectiveness of your own domain name.

Domain Parking
When Do You Park a Domain Name?
Very often, when people “buy” a domain name, they are only just starting out on a new website. Since getting a domain is the first step of many in creating a website, most people don’t have any website at the time they register the domain. As such, they can’t point the domain name anywhere.

Domain name registrars, the companies through which you register a domain, work around this problem by allowing you to point your domain name to a dummy web page. When visitors type the address of a domain that has been parked, they will see this placeholder web page in their web browsers. The content placed on the dummy web page varies from registrar to registrar, and it’s possible that some registrars place advertisements or links to themselves on your parked domain.

Backup MX
If you run your own mail server, our backup mail service is essential to make sure you receive all of your important email. If your mail server is down or unavailable, Backup MX will accept the messages and then deliver them once your mail server is restored.

The historical reasons for backing up the MX records included both redundancies and allowing for a secondary (slower) route or the secondary was the Bastian host, with the primary behind the firewall. In the days of 9600 baud UUCP or even 1200 baud dialup links, it made a lot of sense. You wanted to incrementally and in small steps get the email closer and closer to its final destination. Also, the primary could be down for DAYS! Remember the default sendmail settings, the warning after 4 hours (2 hours for high priority), and a bounce after 5 days. Can you imagine an MX server down for 5 days?

Today’s reasons for backing up MX records are mostly used for load balancing. If you look at some of the larger mail server sites, they have the same MX ‘weight’ for all servers.

Dynamic DNS
Dynamic DNS is a method that allows you to notify a Domain Name Server (DNS) to change in your active DNS configuration on a device such as a router or computer of its configured hostname and address. It is most useful when your computer or network obtains a new IP address lease and you would like to dynamically associate a hostname with that address, without having to manually enter the change every time. Since there are situations where an IP address can change, it helps to have a way of automatically updating hostnames that point to the new address every time.


SSL Certificates
Unlike other products, most businesses can benefit from multiple security products or services. Here’s a quick overview of what we offer and how we protect you and your customers
An SSL Certificate protects the data that’s transferred to and from your site by encrypting it so hackers can’t read it.

As mentioned above, an SSL Certificate encrypts sensitive data that users submit to your site – such as credit card numbers, password and more – so hackers or other online criminals can’t read it. Certificates are issued in minutes and can be installed. But where they really shine is with our powerful SHA-2 and 2048-bit encryption, as well as the ability to cover unlimited servers.

A Code Signing Certificate is for developers. It keeps the software you write from being tampered with or flat-out stolen.
Write your own software? Protect your hard work with a Code Signing Certificate. It keeps hackers from altering your code and tells legitimate users you’re worthy of their trust.

If you’re an independent software developer, this certificate is invaluable. Code Signing Certificates places a unique digital signature on your software that proves who wrote it, lets users know if anyone has tampered with your code and even gets rid of the “Unidentified Publisher” warning that’s a red flag to your customers. We also offer a Driver Signing Certificate, which gives your hardware drivers the same level of protection and is required by Microsoft® for operating systems Vista and later.

  • Web Application Hosting

Traditionally, businesses have had to build and maintain infrastructure to run on-premises applications. With the Software-as-a-Service (SaaS) model, businesses can consume applications that are hosted online, enabling them to lower their costs by paying only for what they use, enjoy seamless and painless upgrades in functionality, and integrate easily with their existing data and systems.

Application providers who are building SaaS-based applications quickly learn that owning and operating the infrastructure on which these solutions are hosted can be expensive and complex, especially when customer demand is uncertain.

Whether you are an enterprise looking for a cloud environment in which to deploy your existing on-premises solutions, or an application vendor evaluating a cloud platform on which to deploy a new application or SaaS offering, you should consider the following questions:

• Can I use the programming language and application platform of my choice?

• Can I use the operating system and environment on which my existing applications are already deployed?

• What commitments or contracts will my cloud provider require? Will I have to make an up-front investment?

• How quickly can I respond to spikes and lulls in demand from my customers or application computing loads?

• Does my cloud provider have experience in maintaining a global, redundant, and resilient infrastructure?

• What security considerations has my cloud provider addressed?


SEO – Search Engine Optimization

Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine’s “natural” or un-paid (“organic”) search results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine’s users. SEO may target different kinds of search, including image search, local search, video search, academic search, news search and industry-specific vertical search engines.

As an Internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic.

Getting indexed
The leading search engines, such as Google, Bing and Yahoo!, use crawlers to find pages for their algorithmic search results. Pages that are linked from other search engine indexed pages do not need to be submitted because they are found automatically. Two major directories, the Yahoo Directory and DMOZ both require manual submission and human editorial review. Google offers Google Webmaster Tools, for which an XML Sitemap feed can be created and submitted for free to ensure that all pages are found, especially pages that are not discoverable by automatically following links.

Search engine crawlers may look at a number of different factors when crawling a site. Not every page is indexed by the search engines. Distance of pages from the root directory of a site may also be a factor in whether or not pages get crawled.

Preventing crawling
To avoid undesirable content in the search indexes, webmasters can instruct spiders not to crawl certain files or directories through the standard robots.txt file in the root directory of the domain. Additionally, a page can be explicitly excluded from a search engine’s database by using a meta tag specific to robots. As a search engine crawler may keep a cached copy of this file, it may on occasion crawl pages a webmaster does not wish crawled. Pages typically prevented from being crawled include login specific pages such as shopping carts and user-specific content such as search results from internal searches. Increasing prominence.

A variety of methods can increase the prominence of a webpage within the search results.

Cross linking between pages of the same website to provide more links to most important pages may improve its visibility.

Writing content that includes frequently searched keyword phrase, so as to be relevant to a wide variety of search queries will tend to increase traffic.

Updating content so as to keep search engines crawling back frequently can give additional weight to a site.

Adding relevant keywords to a web page’s meta data, including the title tag and meta description, will tend to improve the relevancy of a site’s search listings, thus increasing traffic.

URL normalization of web pages accessible via multiple urls, using the canonical link element or via 301 redirects can help make sure links to different versions of the url all count towards the page’s link popularity score.

Do you need an SEO?
SEO is an acronym for “search engine optimization” or “search engine optimizer.” Deciding to hire an SEO is a big decision that can potentially improve your site and save time, but you can also risk damage to your site and reputation. Make sure to research the potential advantages as well as the damage that an irresponsible SEO can do to your site. Many SEOs and other agencies and consultants provide useful services for website owners, including:

• Review of your site content or structure
• Technical advice on website development: for example, hosting, redirects, error pages, use of JavaScript
• Content development
• Management of online business development campaigns
• Keyword research
• SEO training
• Expertise in specific markets and geographies.

Keep in mind that the Google search results page includes organic search results and often paid advertisement (denoted as “Ads” or “Sponsored”) as well. Advertising with Google won’t have any effect on your site’s presence in our search results. Google never accepts money to include or rank sites in our search results, and it costs nothing to appear in our organic search results.

If you’re thinking about hiring an SEO, the earlier the better. A great time to hire is when you’re considering a site redesign, or planning to launch a new site. That way, you and your SEO can ensure that your site is designed to be search engine-friendly from the bottom up. However, a good SEO can also help improve an existing site.

While SEOs can provide clients with valuable services, some unethical SEOs have given the industry a black eye through their overly aggressive marketing efforts and their attempts to manipulate search engine results in unfair ways. Practices that violate our guidelines may result in a negative adjustment of your site’s presence in Google, or even the removal of your site from our index.




What is VoIP?
VoIP is also called Voice over Internet Protocol (IP). It simply means sending voice calls over the Internet as opposed to traditional telephone lines. For the user it feels exactly the same as making a conventional call.

Transmitting voice over the Internet is almost equivalent to sending any other data over the Internet.
We have direct connection agreements with other telephony service providers. You therefore receive reduced call rates which in turn save you money on your overall telephony costs.

Reduced telephone bills: Per second billing from the first second

Increased Capacity: With VoIP you can increase and decrease telephony capacity by using software and bandwidth.

Complete Mobility: You can make or receive calls from anywhere, provided you have an Internet connection.

Scalability: More than one phone call can be transmitted over one broadband line. Additional call capacity can be added by increasing the size of the Internet line.

Number Porting: You can port your current number from any network.

Number for Life: Numbers are issued for life, no matter the company that is supplying your connectivity.

Independent Licensed Operator: You can have peace of mind that you are dealing with the network operator and not a reseller.

Carrier-grade Voice Quality: We have four voice distribution centres (Johannesburg, Nelspruit, Cape Town and Durban). Allowing you to connect to the closest voice centre for the best possible quality.

Suitable For:
All VOIP clients
Clients wishing to port their numbers
Businesses looking to save money

How can VoIP assist my business?
Virtual Private Branch Exchange (VPBX) is often referred to as “Cloud PBX” or “Hosted PBX“. A business can use it to route external calls through a network of internal phone lines. It is software based and completely replaces the traditional, hardware based PBX. Eliminating the need for an on-site PBX and in turn reducing set up costs.
VPBX means that your call comes through to our data center. We use our secure technology to reroute the call and direct it appropriately.
This solution can provide you with a range of features not available on a traditional PBX. And since it is software based, the installation is relatively quick and easy.

Virtual PBX
It works with any VoIP, SIP compliant IP phone or analog phone. We can provide you with the Virtual PBX as well as VoIP ready IP Phones.

Range of features: Call recording and IVR (Auto-attendant) are available from your own computer
Billing reports: Available from your own computer
Managed equipment: Less expensive maintenance, insurance and housing of equipment
Expandable: Ability to grow and expand with your business, without extensive costs or hardware upgrades
No large upfront costs required
Number portability: Always keep your number

Suitable For:
Clients that need their PBX to grow and expand with the business
Clients wanting to eliminate extensive costs or hardware upgrades
Clients requiring a range of features that the traditional PBX cannot offer

IP PBX Solutions
An IP PBX is a switchboard or Private Branch Exchange which uses Internet Protocol.

It is a server which uses your Internet Connection to route all your incoming and outgoing calls. Your customers can get hold of the right person immediately. Routing can be based on any means you choose: Time, skills or hunting.

You can either use your existing Internet Connection, or we can assist you in setting up a wireless solution at your premises.
Additional features of the PBX can be installed remotely with the click of a button. This means no costly call out fees when you want to make changes on your PBX.

Important Features
Time based routing: Night and weekend messages.
Skills based routing: Messages to be distributed to the relevant people.
An Interactive voice response (IVR): Allows incoming calls to be controlled automatically, 24/7.

Soft switch: The software-based platform allows for seamless add-on features as well as standard features found on conventional PABXs.
IP-based infrastructure: Because it works on your existing IT network, you only need a single network point for your computer and phone.

Your extension is always where your computing device is.
Remote Access: Because there is no dedicated infrastructure, maintenance and upgrades can be handled remotely.

Expandable: Communigate grows with your business, giving you local or remote extensions on or off site. Add users, even branches, to one IP PBX.

No license costs: Pay a once off up-front fee.
Cost-effective technology: With minimal hardware, remote support and a flat rate for all the features, it lowers your operating costs.
Automatic failover in the event of a failure.
Suitable For:

Businesses wanting to save money
Businesses looking to be able to make changes to their PBX from a remote location, saving money on call out fees.
Call Centres looking for a Feature Rich, System Ready, Web Based PBX.




Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. It does this by utilizing frequencies that are not used by a voice telephone call. A splitter, or DSL filter, allows a single telephone connection to be used for both ADSL service and voice calls at the same time. ADSL can generally only be distributed over short distances from the telephone exchange (the last mile), typically less than 4 kilometres, but has been known to exceed 8 kilometres if the originally laid wire gauge allows for further distribution.

At the telephone exchange the line generally terminates at a digital subscriber line access multiplexer (DSLAM) where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL are typically routed over the telephone company’s data network and eventually reach a conventional Internet Protocol network.

Capped ADSL
Capped ADSL provides superior bandwidth, but requires more data usage management than uncapped accounts and can become costly for high usage. This is word from South Africa’s top Internet service providers (ISPs). A large portion of South Africa’s ADSL subscribers moved to uncapped accounts, but capped services remain a popular choice in some environments.

Capped services can bring cost savings for low monthly usage, and is also seen as offering a better network performance than uncapped products.

On our capped ADSL products you will always get the full speed that your ADSL line and exchange is capable of. Our capped products have the least amount of shaping and bandwidth management across the shaped range and are best suited to users who value performance over volume of data. Our capped product performance is closely aligned to unshaped products. Unshaped offerings is also available.

Uncapped ADSL
Our uncapped service is never throttled, but may be shaped during peak network times to ensure that capped and business users have full speed. Shaping involves slowing down non-real-time protocols like torrents during peak network times.

Business DSL
Business ADSL range has been designed to provide you and your business with the best internet service possible. We have ensured priority for business applications such as email, ftp downloads and voice over IP (Skype and so on).
We offer two types of Business ADSL products: Business Uncapped;

Business Capped:
• Uncapped v Capped
Uncapped packages allow you to use the internet as much as you want (subject to our transparent and fair Acceptable Use Policy). The convenience of Uncapped is that you don’t have to worry about running out of GBs or having to top up if you do. Capped data packages simply set a monthly ceiling on your data usage.


Premium Broadband Services for Small and Medium Sized Businesses
Using our superior and robust fibre infrastructure, Fibre delivers an unparalleled internet experience to businesses looking for an uncapped and unshaped solution with speeds of up to 100Mbps. Ideal for businesses looking for a superior, effective, convenient and fast Internet solutions.

Fibre is Symmetrical
This means that your upload and download speeds are equally fast! Most currently available broadband services are asymmetrical, which frequently results in poor upload speeds. Our fibre solution provides equal upload and download speeds, ensuring that important emails with large attachments or urgent work documents that you need to upload will always go through at high speeds.

Low contention
Contention Ratio refers to the number of users sharing, or contending for the same data capacity. The lower the contention ratio, the higher the quality of service. A 10:1 contention ratio means that up to 10 broadband customers are sharing the same capacity at any one time.
Our broadband has a substantially lower contention ratio than most competitive broadband offerings.

Superior Fibre Network
Our fibre network suffers from no congestion, resulting in superior speeds and low latencies. It is also unaffected by copper theft which all too frequently leaves your business stranded without connectivity for days on end – severely impacting your ability to trade, lowering productivity and putting pressure on your bottom line.

Your broadband service is entirely flexible and can be shaped to meet your connectivity needs.

Single Point of Contact
We offer end-to-end customer support for all service issues, so you won’t have to deal with multiple vendors and service providers.

“SLA” Service
Thereis a SLA attached to all our broadband services, our enterprise service desk and IP consultants are always available to assist you at all times.

UIT will include a new configured router on any new broadband service.

Wireless Solutions

Our Wireless Internet packages are ideal for businesses looking for quality Internet Connection. With a guaranteed 99% uptime, you don’t have to worry about downtime affecting your business.
We can provide you true Last Mile Connectivity with a guaranteed 99% uptime. And when your business expands, your Internet package can too.
Key Features:
• Fixed pricing irrespective of distance within metro regions
• End to end network management
• Unlimited data usage
• Licensed microwave technology


Network Services


Networking Cable

Network Installation

Network cabling is one of those commodities that are transparent but still critical to the operations of nearly all businesses. At the heart of every commercial facility is a computer network, often connecting multiple computers to each other, to the internet, to one or more private intranets, and to a variety of other peripherals and hardware.

The wiring used to connect all of these devices must be of the highest level of quality possible. To ensure that it is, and to ensure that the support backing up the cabling is equally excellent, the selection of an ideal provider of network cabling is vital.

A few things to take into consideration when deciding to do a Network Installation:
How long has the company been in business? This will impact the reliability, not only of the products they carry but also the services that they provide. Remember that you may need customer support should the cables have any potential difficulties or if they need upgrading or replacing.

Experience also shows that they will be knowledgeable about the products you may need. This assists in the purchasing process and the accuracy of orders and deliveries processed by the cabling company you are considering. Furthermore, their experience shows that they hold a higher likelihood of being in business for years to come.

Client Portfolio
Have a look at their list of prior customers with which they have done business. Do they have a substantial number of clients? How about testimonials (quotes) that tout the virtues of their products and services? This should give you a solid guideline of what you can expect from a particular network cabling company with respect to quality and dependability.

Customer Support
This almost goes without saying when it comes to choosing a company for any product or service, but it is worth pointing out. Premium quality customer support is beyond essential. If your network is vital to the primary functions of your business, then you will need responsive tech support.

You will need immediate answers when you run into issues or concerns. The customer support should also be clear with communication and quick to resolve any problems that you may encounter with the cabling they supply for your network.

Track Record
It is preferable to select a company that has a name in the business of network cabling, if you are going to get desirable results in terms of quality and support. Word of mouth from others in your industry is a great way to get a feel for the public perception of the network cabling companies you are considering. Choose the most reputable one with the most competitive rates.

Key Areas
• CAT 5, CAT 6 & CAT 7 cable installations
• Optical Fibre for high speed connectivity or long distances
• Cabinet installation & preparation for servers, switches, routers and other network devices
• Documented patch panel layouts
• Cable testing
• New installations, moving existing network points and generally tidying.

Cat5e Cabling
Category 5 cable, most commonly known as Cat 5, has four twisted pairs in a single cable jacket. It’s an unshielded twisted cable pair designed specifically for high signal integrity. Back in 2001, with the inclusion of the TIA/EIA-568-B standard, the CAT 5 cabling specification was made outdated and obsolete, and was then superseded by the category 5e specification. It is commonly used for 100Mbit/s networks, but with IEEE 802.3ab defined standards can also support 1000BASE-T – gigabit Ethernet over cat 5 cable.

Cat6 Cabling
Cat 6- Category – 6, (ANSI/TIA/EIA-568-B.2-1) CAT6 contains four twisted copper wire pairs and is a cable standard for Gigabit Speed Ethernet and additional network protocols that is backward compatible with both Category 5/5e and Category 3 standards. The CAT6 cable standard is usable for 10BASE-T / 100BASE-TX and 1000BASE-T (Gigabit Ethernet) connections, and provides outstanding performance up to 250 MHz. When CAT6 is used for a patch cable, Cat6 is typically terminated with an RJ-45 connector. All cables defined by TIA/EIA-568-B have the maximum allowed length of 90 meters, including CAT6. A complete channel may be up to 100 meters. (Including horizontal cords on each side of the run)



Fiber Optic Cabling
Fiber Optic cabling provides much greater bandwidth than standard copper wiring options and is commonly used for backbone connections between local networking pieces of equipment. It is the preferred choice for most IT staffs for the superior quality and high reliability it provides. Although the cost can be prohibitive for your typical desktop applications, fiber optic cabling provides the high security link possible with immunity from EMI (electromagnetic interference). It has now also become the preferred standard solution for inter-building links, inter-network links, and additional connections that are beyond the maximum 90 meter limit for Category 5e copper cabling.
Several types of fiber optic cabling systems are offered, and all of our cables are graded for either internal or external.




Wireless LAN Services
The invisibility and the uncertainty of RF propagation can make wireless LAN performance and network planning a complex task. Whether investing in a new 802.11ac WLAN network, migrating from a legacy 802.11 a/b/g/n WLAN network or using a mixed environment, proper planning keeps critical applications running at peak performance and sensitive data secure.

Universal Information Technologies offers a comprehensive set of professional services that cover the entire wireless implementation lifecycle including planning, design, site survey, installation, configuration, and security.

Customers will benefit by optimizing WLAN performance without unnecessary capital expenditure, minimizing help desk calls from unsatisfied users and maximizing performance of critical applications while securing the network from wireless threats.

Wireless Installation
Ensure the success of your wireless LAN rollout. Universal Information Technologies detail oriented project management skills can assist with even the most complex network designs to ensure that your project is delivered on-time and on-budget while meeting all of your organizations performance and security requirements.
Universal Information Technologies’ wireless installation services include:

Physical Deployment Services
• Network Cabling for Access Points- Pulling Cat5E or Cat6 cabling to the AP location, terminating and testing
• Mounting Access Points- Installing access points on walls or ceilings
• Rack and Stack- Physical installation of networking components: switches, controllers, and servers
• Project Management- Project ownership: managing the physical deployment of access points, as well as the configuration and turn over of the complete wireless system

Wireless Configuration and Integration Services
• User Roles – Creating Role Based access to the wireless LAN to be able to control client access based upon who, what, when, where and how they are connecting to the network
• Device Roles – Creating roles for specific devices such as wireless phones, tablet PC’s, notebooks, and Scanners
• Policies – Creating policies to be applied to User Roles and Devices. These policies increase security by limiting users and devices to only the resources necessary for them to function on the network. They also improve functionality by assigning priority to latency sensitive applications running on devices.
• Authentication, Authorization, Accounting (AAA) – 802.1X setup authentication method utilizing centralized directory database and strong encryption to secure communications.
• Service Set Identifier (SSID) – Configuration broadcast SSID of client WLAN access across appointed access points.