Managed Services

Veritas_ManagedServices_IconNot quite big enough for a dedicated IT person? Or maybe you are that size but don’t want to dedicate the salaried position. Let us manage it for you. Companies know that managing IT requires focus, experience, and time. Technology can be a major distraction if not managed well and can be very costly in both downtime and wasted resources.

veraTECH Solutions provide IT support services, hardware and software to companies just like you. Our operation is optimized to provide pro-active monitoring and maintenance of our customers equipment, ensuring highest availability for them and reduced downtime. Our comprehensive plan offers exceptional personalized service that allows you to increase your productivity while lowering your IT costs. How many times have you received a bill that you couldn’t understand or begin to determine if it was justified?

Our tiered approach to services gives us the ability to customize a solution that is right for your business as well as your budget. Whether you’re just looking for general maintenance for your network with help desk support or you’re looking for an all in one solution that includes hardware, software and service, veraTECH Solutions is the technology solution for you. Be proactive in your IT maintenance.

veraTECH Solutions Managed Services:

  • Total Network Management and Support of your network and users
  • Customizable packages to suit your needs
  • Fixed monthly fee means no surprise IT costs
  • Increase efficiency and productivity
  • Proactive Maintenance and monitoring for peace of mind
  • Exceptional personalized service

24/7 Emergency Support available!

Managed Infrastructure

We look after your technology, giving you peace of mind.

Protection of your IT systems from threats gets more and more challenging every single day.  Today’s enhanced and sophisticated IT knowledge makes data security that much more important to any business that knows how damaging a data breach would be.  The Managed Infrastructure service for your network, server, and workstations focuses on minimizing the possibility of a security breach, checking the health of the system and mitigating the impact on your customer’s business should a problem occur.

Managed Infrastructure ensures that you are monitored and protected 24/7.  The service ensures that you can have complete peace of mind around your data, including your client’s information, so that you can focus on the things that matter to you.

What it includes:

  • Monitoring the status of your IT
  • Building a clearer picture of your systems
  • Analyzing Risks
  • Producing regular reports
  • Highlighting potential issues
  • Minimizing downtime
  • Providing support to get you up and running

How does it work?

Getting your systems protected is easy. There is no hardware to install or any training required. Simply give our team a call now and they will have you up and running in no time.

You can choose the level of service you’d like, so start basic and build it up a step at a time, or you can maximize your protection and minimize your downtime.


For less than the price of a cup of coffee a day, this service protects your critical IT systems and helps keep your business running. It helps you to avoid the following common issues:

  • Downtime
  • Virus attacks on your network and PCs
  • Attempts to hack into your network
  • Slow internet connection
  • Lack of access to important data

What might seem like a small IT problem can often lead to a major business headache. Managed Networks prevents this through four core services:
From automatic back-up and antivirus checks to full systems diagnosis and reporting, your IT infrastructure will be taken care of, freeing up your time to focus on growing your business.

How does it work?
Getting your systems protected is easy. There is no hardware to install or any training required. Simply give our team a call now and they will have you up and running in no time.


Managed Workstations helps look after your IT by providing a continuous service health check through the following:

  • Building a clear picture of each workstation
  • Producing reports on issues
  • Highlighting potential risks
  • Updating and upgrading software
  • Enhancing performance
  • Reducing downtime
  • Providing on-going support

This all helps you to concentrate on growing your business and increasing your profits. Managed Workstations is an easy, cost-effective way of monitoring all vital components of your PC network, from anti-virus through to hardware. It offers:

Make sure your PCs are always running, so you can concentrate on growing your business. To find out how, contact us today.


Keeping You Up & Running with a Daily Server Health and Safety Check
We want to be proactive with your technology needs. Rather than waiting for you to discover a problem and call us, we’ll monitor your server and if we find a small problem before it becomes a big issue – saving you hours of downtime and frustration.

Our Daily Server Health Check Service checks your systems every single morning before you start work. We’re able to nip problems in the bud before many times before you even know about it. We’ll continue to monitor your server throughout the day to ensure optimal performance.

Our Daily Server Health and Safety Check includes:
And to keep you informed, our system will send you a short note whenever you need them to confirm the checks we’ve done and their results. You’ll see clear evidence of the value we deliver each and every day.

Managed Backup

Have you ever said?

  • “Our back-up didn’t work and I lost access to crucial customer details”
  • “Our office was flooded, resulting in no access to IT for several days. This has a massive impact on our sales”
  • “When our server goes down the whole office grinds to a halt, meaning lost revenue”
  • “We forgot to backup our server last week”
  • “I left my backup in my car and it was broken into last night”
  • “Our backup hasn’t been verified in 6 months!”

With veraTECH Solutions Managed Backup, we have all your backup solutions covered!

Managed Backup provides a cost-effective, affordable solution to a range of IT issues faced by businesses, such as data loss, fire or flood damage to IT equipment, theft of data and more. Getting your systems protected is easy.  If nobody regularly checks your backup system or you’re not sure that your backup system is even working, assume it’s not.

We keep your data safe.

Files and Folders

Just need to backup certain files and folders? That’s no problem. Files & Folders is a Granular selection of files and folders for backup, including files that are open or in use. Increase the speed of backups containing large files, applications and databases by automatically tracking changes to those files in between backup jobs. This keeps backup windows short and improves backup performance. Recover critical files with file versioning. Backups are kept for a standard retention period. This is ideal in a world where files are continually changing but if a file hasn’t changed in the last 60 days you’ll only have one copy of it. ‘File versioning’ allows you to specify the files for which multiple versions should be kept, even if the older versions surpass the default retention period.

Disaster Recovery

Disaster recovery is a plan of backup that includes all of your programs, including your data. It’s really a true snapshot of your entire computer at a specific point of time. It is a fast and efficient tool which will restore a physical or virtual machine’s System State and file level backups to a compatible virtual machine. This tool automatically restores a machine with file level backup and system state backup to a virtual environment without reinstalling everything manually.

Managed Email


Hosted Exchange provides users with essential productivity tools—and admins with control, simplicity and choice.

For users: High desktop and mobile productivity

  • Business-grade email, shared calendars and shared contacts
  • Sync your data across all your devices
  • Online Web Access or connect with Outlook
  • Extend mobility to smartphones and tablets on any OS
  • McAfee-powered virus and spam protection

For admins: Simple but powerful control

  • No hardware to buy, no software to manage
  • More control and security than on-premises—but less complexity
  • Centralize your management of users, devices and services
  • Integrate with your on-premises Active Directory
  • Plan flexibility: mix and match users and services
  • 99.999 % uptime guarantee, equivalent to less than six minutes of downtime per year

Spam Filter

McAfee Email Protection is bundled with every mailbox to identify, quarantine and block suspicious email. It keeps you safe from threats that can disrupt your users, damage your hardware, compromise your security, and – worst of all – spread infections on to your customers and partners.

McAfee Basic Email Protection offers:

  • Patented spam blocking that blocks 99%+ of spam
  • Industry-leading, signature-based antivirus engine
  • Automated 24×7 threat monitoring
  • Proprietary worm detection to intercept zero-hour mass mailings
  • Content and attachment filtering
  • Protection against denial of service, directory harvest, email bombs, channel flooding, etc.
  • Gray mail and bulk mail filtering
  • Daily report of quarantined messages to help spot false-positives

HIPAA Encryption

Don’t be the one who doesn’t take the steps to become HIPAA compliant. Failure to do so can result in not only thousands of dollars in fines, but it also reflects on your businesses reputation.

A joint study from the Ponemon Institute and IBM estimate the average cost of a data breach for EACH lost or stolen record to be around $154. Healthcare emerged as the industry leader with the average cost per stolen record reaching as high as $363. That means if you are a doctor with 1,000 patients, you could face a hefty total bill of $363,000 for not securing your patient data.

Help control data leaks and maximize security

  • Perform a risk assessment
  • Make sure anti-virus and patches are up to date
  • Encrypted delivery is designed to ensure information is only read by intended recipients
  • Help keep your customers’, partners’, patients’ and clients’ personal data private
  • Facilitate compliance with federal and state laws for your employees
  • Implement a disaster recovery plan

Partner with us to determine which regulations affect your business and which users you need to control. We host and manage the hardware and software to enable the encryption/decryption process and manage digital identities. We provide a powerful web-based administration console from which you set, review, and customize your organization’s privacy policies and administer users.

Jumpstart your efforts with a wide variety of commonly used rules, dictionaries, and expressions or create complex rule chains to suit your organization’s unique needs. You can monitor all messages and reject those that do not comply with company policies and procedures. Our analytics tool tracks every message that’s been processed and provides summary diagrams and detailed searchable reports.

Both Encrypted Mail solutions are backed by a globally-recognized Certificate Authority.

  • Standards-based technologies are used, such as Public Key Infrastructure (PKI), S/MIME, and X.509 certificates to establish confidentiality, message integrity, and user authentication.
  • Ensures the best commercially available encryption security for your messages
  • All encrypted messages are digitally signed and can be validated to prove compliance as required


veraTECH Solutions Email Archiving helps keep your email securely archived and easily accessible using your central control panel. It offers the preservation, protection and restoration features you need to help safeguard intellectual property, facilitate compliance, and speed eDiscovery.

Email Archiving delivers an integrated, easy-to-use experience for both users and administrators. And with high levels of security and reliability, it assures a Worry-Free Experience™ that keeps you focused on business.

Why choose veraTECH Solutions Email Archiving?
The volume of email produced by your business is continuing to rise. At the same time, industry regulations and legal risks are compelling you to retain your business communications in perpetuity. veraTECH Solutions cloud-based Email Archiving helps provide the solution for the institutional knowledge contained in your email.

By integrating email storage, security and recovery features with your other Veritas Technology Solutions services, Email Archiving lessens the legal pressures to preserve your intellectual property, facilitate compliance with hundreds of industry regulations, and simplify eDiscovery. Features include:

  • 100% data capture across devices and platforms (including POP/IMAP accounts)
  • Unlimited storage and scalability
  • Facilitation of compliance with regulations including FRCP, SEC, GLBA, HIPAA, HITECH and SOX
  • Housing of archived data in systems in eight disparate datacenters (separate from our Exchange datacenters)
  • Simple, flexible searching, filtering, tagging and recovery methods
  • Export options include PST, SF, EML, HTML, PDF and other formats
  • Encryption of data both in-transit and at-rest
  • Now available standalone for popular email platforms including Microsoft Office 365 or Exchange, Google Mail, Zimbra, IMail, Scalix, and others.


Microsoft Lync Secure Instant Messaging from veraTECH Solutions gives you secure, business-grade communication and collaboration including chat, video, desktop sharing, web conferencing and more.

Lync Secure Instant Messaging includes robust features that take office communication to a new level while providing a secure and professional alternative to personal instant messaging services.

With Lync, your employees get a full range of collaboration and communication tools rolled into one powerful cloud-based solution:

  • Instant Messaging. Communicate in real time with colleagues, customers and partners from virtually anywhere.
  • Rich Presence Capabilities. Know immediately if contracts are “available,” “away,” “bust,” and more.
  • Group Chat. Chat with everyone on the team, regardless of where they’re located.
  • Voice and Video Chat. Reduce travel costs by holding voice-and video-enabled meetings.
  • Security. Keep messages secure with strong end-to-end security architecture
  • Dependability. Always available (99.999% reliability)

Managed File Sharing

ShareSync’s easy-to-use file sync and share service enables intuitive collaboration and mobility while helping to keep company data secure and protected. ShareSync keeps files and folders in sync across virtually every device—and helps make it simple to share those files inside and outside of the company.

ShareSync can help employees become more collaborative and more mobile. Business owners and managers will like ShareSync because the comprehensive security features, permissions-based sharing and 99.999% uptime mean there’s no sacrifice in control, security or reliability.


  • Sync Files: Automatically sync files across desktop, mobile devices, and the web
  • Share Folders: Share folders with co-workers or external users with one click
  • Share Files: Share files with anyone via web link
  • Security Features: Data Encryption, Remote Wipe, Audit Log Tracking
  • Office Integration: Save files to ShareSync directly from the ribbon on Word, Excel, and PowerPoint. Share files without leaving Outlook


  • Intuitive functionality helps shorten the learning curve
  • Files are always synced and always available across every device
  • File sharing is intuitive for recipients – a simple click of a link in email
  • Offers full control and protection of company data
  • Sharing permissions are easy to set and manage at any time
  • Integrates with Exchange, Outlook, Office, and Active Directory
  • 99.999% service level agreement uptime


Data Security & Protection

Customer Data on ShareSync

  • 256-bit encryption for at-rest and in-transit data.
  • Unique encryption key for each account (much better than sharing keys between customers)
  • 99.999% uptime SLA.
  • SSAE 16 SOC2 Type II Reports.
  • Reporting and audit trail of account activities on both users and content.
  • Administrators can remotely wipe data from any registered device.
  • Ability to grant specific access permissions to each collaborator.
  • Locking features to prevent overwrites, conflicts or deletions.
  • Secure file links sent inside and outside your organization.


  • Global Intrusion Prevention System protects cloud services.
  • Datacenter-level backup and file replication protects against loss or corruption of information.
  • Datacenters guarded by video monitoring, motion detection and access control technology as well as 24/7 security personnel.

ePHI Security and Integrity

  • Security systems that guard against unauthorized access to ePHI during electronic transmission, whether in email and attachments or during the file-sharing process.
  • Both electronic and physical security to protect ePHI wherever it is stored. Technology and policies to secure ePHI from improper alteration or destruction.