HIDING IN YOUR NETWORK
On average, attackers are in a victim's environment for over two weeks before being detected.
About Us
Located in Stark County, Ohio, EAI Technology is dedicated to customer service. We are intimately familiar with the business needs of our clients, and with the application of technology to meet those needs. We have the technical expertise to provide rapid, efficient, cost-effective solutions to our clients.
EAI is security focused and specializes in the design, installation, and support of desktops, servers, and network infrastructure.
Managed Services
EAI Technology offers managed services to monitor and manage your IT infrastructure, so that you can focus on what matters most – your business.
Online Backup that will keep you safe
Cloud or On-Premise
- Continuous Recovery – We can restore your business’s systems at any time from a standby virtual server
- Data Archiving and Versioning- Archive data and records for as long as you need them. You choose the minimum number of file versions to retain.
- Security-Focused Storage – All data is encrypted and housed in either ISO-certified or SSAE-compliant data centers.
- Bare Metal Recovery – Recover full systems from bare metal using a bootable USB drive.
- Faster Backup and Restore – Optimize your backups and restores and reduce backup windows with True Delta technology.
Email Security
Anti-Spam and Antivirus
- Dependable Email Delivery – If your email server ever goes offline due to an internet outage, we will store incoming mail for up to seven days or reroute your mail to another location.
- Built-in Blacklists and Whitelists – Our integrated whitelists and blacklists are updated constantly.
- Web-based Quarantine – All blocked emails are stored in the cloud and can be managed from anywhere.
- Detailed Reporting – Quarantine statistics are available at all times. Users can opt to receive daily spam queue summaries and virus interception notices via email.
- Superior virus and outbreak detection – We are constantly incorporating the latest research into our managed solution.
Anti-Virus
Endpoint protection for your desktops and servers
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.
- Identity and Privacy Shield
- Web Threat Shield
- Intelligent Outbound Firewall
- Virtualization, Terminal Server & Citrix Support
- Mobile Smartphone and Tablet Support
Helpdesk and Remote Support
Proactive Support
- Remote access support with an Online helpdesk and ticketing so nothing falls through the cracks
- Proactive monitoring of hardware issues on your desktops and servers
- Defragments and deletes clogging temp files from hard drive
- Patch scanning & deployment of Microsoft security patches
- CPU utilization, memory and disk space reporting
- Windows system, security, and software event log monitoring
Real Time Monitoring and Alerts
Real Time Monitoring and Alerts of Servers, Desktops, and Networks including:
- System resources
- Logged in users
- Network & IP Monitoring
- SNMP Monitoring
- Windows updates
- SQL Server
- Exchange
- Active Directory
- VMware
- Hyper-V & SNMP enabled devices
IT Automation
We provide pre-configured administrative and maintenance tasks which can be applied to servers and desktops.
These include:
- Creating a System Restore Point
- Deleting Temp Files
- Deleting Internet History
- Reboots and Shutdowns
- Defragmenting (All disks)
- Running Checkdisk (All disks)
- Running a Full System Scan
- Checking for New Updates
EAI news
Thoughts, musings, and ruminations.
Security,Vulnerability,HackLast year, Tesla issued an update that made its vehicles easier to start after being unlocked with their NFC key cards. Now, a researcher has shown how the feature can be exploited to steal cars. Martin Herfurt, a security researcher in Austria, quickly noticed something odd about the new...Security,VulnerabilityThere is a newly discovered vulnerability in MS Word (and likely other MS Office apps) that could install malware so you should be especially vigilant about opening any attachments. This exploit can be triggered with a hover-preview of a downloaded file that does not require any clicks (post...Security,CryptoFour Quick Security Tips to Keep Your Crypto Safe! Multifactor Authentication (MFA) 1. Turn on MFA everywhere. All exchanges. Your email. Wherever MFA is available, enable it. Use Google Authenticator or Authy. Don’t use SMS unless there are no other options. Something is better than nothing....- Free AssessmentsWondering where to start?Let us help you with a free assessment of your current technology.Fill out the form below to get started.