Search results

Choose a category

Apply filters

Clear filters
Supplier type
User support
Staff security clearance
Minimum government security clearance
Pricing options
6 results found

6 results found containing westgate it in Cloud support

Server Support and Maintenance

Westgate IT

Westgate IT provide professional support for your servers. This service includes monitoring, patching, problem and incident management and reporting

End-User Cloud Support

Westgate IT

Westgate IT provide a comprehensive End-User Remote Support and Service Desk package. Our approach is to provide one contact point for all problems including support on all aspects of a solution covering software and general advice.

Engineer Resource Provisioning

Westgate IT

Westgate IT provide an engineer resource, either on-site or remotely to assist with projects or tasks not covered by other cloud frameworks agreements. For example, roll-out of workstations, devices, software or complete server installations that require a competent qualified engineer resource.

Cloud Migration and Consultation

Westgate IT

Westgate provide customers an effective budget centric path to cloud environments. Our teams have successfully migrated dozens of our clients to a cloud based environment, including public and private clouds. Cloud Modernization – More costly up front, but takes full advantage of cloud agility, elasticity and pricing.

Managed Security (Pro Secure)

Westgate IT

Pro Secure is a comprehensive managed security solution that protects your systems and provides an instant snapshot of cyber readiness across the organisation Providing certainty that systems and data are protected, confidence that an expert team is there to provide fast response, investigation, and protection should an incident occur.

Firewall and Communications Support

Westgate IT

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices need to be provisioned patched. Security policies and configurations requires regular updates to ensure appropriate access controls. Network traffic must be monitored continuously