Managed IT Services for Your Business

IT should enable your business to grow, not slow it down. As one of the top managed IT support services providers, Obsidian IT helps you manage the technology essential to the success of your business.

Level Up Your Business

Our Managed IT services are tailored to meet your needs, from managing your employee endpoints to adequately managing your complex IT infrastructure. Our proactive approach, backed by our friendly customer service and communication will keep your business IT infrastructure up and running.

We've always known that for businesses large and small, IT can be a real challenge to manage. Staying on top of your technology includes controlling the costs associated with keeping in-house staff up-to-date with training, certifications and current trends. Every business is unique, and it’s not always clear which IT managed services are best for your current infrastructure. We will collaborate with you and provide ongoing strategic IT consulting and guidance that will help take your organization to the next level.

Managed IT Plans

IT Management Redding

Fixed Managed IT

A simple, predictable managed IT services pricing agreement, with no term commitment required. Perfect for businesses with a fixed budget.

IT Management Red Bluff

Scalable Managed IT

Change your managed IT support based on your user count and technology infrastructure. We’ll scale with you as your business grows.

IT Support Red Bluff

Fully or Co-Managed

Leave all of your IT management to us, or we can work alongside your IT team. You choose what works best for your technology needs.

Managed IT Network Design & Build Redding

Managed IT Network Design & Build

At Obsidian IT, we’ve earned a reputation for building local and wide area network (LAN/WAN) solutions for organizations of all sizes. We will come to you and set up all technology fit for your unique business.

Services Include:

  • Network Infrastructure Installation & Support

  • Server Setup & Maintenance

  • Hardware & Software Installation

  • Ethernet Cabling

  • Wireless Solutions

  • Physical & Virtual Server Installation

Managed IT Virtual CIO Services

With our Virtual Chief Information Officer services you will gain an experienced professional without the cost of an internal CIO. We will assign a personal, experienced IT professional, responsible for strategic technology decisions that align with your business strategy. Take your business to the next level with a virtual CIO, available for any question or consideration 24/7.

Services Include:

  • Strategic IT Action Planning and Roadmap

  • Security, Disaster Recovery and Continuity Planning

  • IT Budget Planning & Risk Management

  • IT Project Planning and Management

  • Business Technology Strategist

  • Business Workflow Analysis

Managed IT Virtual CIO Services Red Bluff
Managed IT Cyber Security Services Red Bluff

Managed IT Cyber Security Services

Don’t allow cyberthreats affect your businesses hard earned reputation and profits. Our comprehensive cybersecurity solutions protect your entire IT infrastructure day and night. Our proven IT security solutions are designed to prevent against any cyber attack. A single breach is all it takes, gain peace of mind that your business is secure with security analysis and proactive solutions.

Services Include:

  • IT & Network Security

  • Compliance Management

  • Threat Detection and Response

  • Managed Firewalls

  • Anti-Malware Programs

  • Endpoint Protection

  • Security Risk Assessment and Management

Managed IT Backups

Storing your information on a separate medium is critical when protecting against corruption, or unplanned data loss. Consistent backups minimize the amount of potential loss of data and allow copies to be restored from a previous moment in time. Ensure data is stored securely so that information is never truly lost.

Services Include:

  • Data Backup

  • Receive Backup Notifications

  • Protect Valuable Data

  • Quick Information Restoration

  • Increase Business Safety

  • Easy Tax Reporting and Audits

Managed IT Backups Redding
Managed IT Cloud Services Red Bluff

Managed IT Cloud Services

We’re helping customers move to the cloud. In addition to being on-site, we’re also on-cloud. As your business moves some of its key systems to cloud-based providers, we’re able to manage those for you, with the same amount of ease. Our technical consultants will provide you, and your business, expert advice and practical know-how no matter where your technology sits.

Services Include:

  • Cloud Strategy

  • Virtual Desktops

  • Secure File Storage & Backup

  • Project Management Tools

  • Web-Based Email

  • Cloud Computing

  • Cloud Solutions

Managed IT Virtualization Services

Organizations turn to server and desktop virtualization to reduce IT costs, free up resources, better manage risks, and decrease downtime. With virtualized cloud-based systems, users can now operate multiple systems on a single piece of hardware. Obsidians virtualization services are powered by VMware.

Services Include:

  • Remote Access Solutions

  • VPN Services

  • VMware Server

  • VMotion

  • Distributed Resource Scheduler

Managed IT Virtualization Services Redding
Managed IT Staff Augmentation Red Bluff

Managed IT Staff Augmentation

Obsidian IT can help you strengthen your organization’s internal IT force and increase your competitive advantage FAST. We maintain a deep pool of certified IT professionals with the most highly-requested and highly-desired skill sets. All of our IT staff members have been carefully vetted for their technical proficiency, creative problem solving, and customer service aptitude. Organizations can obtain IT resources when required and leverage skills that may not exist internally, all while maintaining control and direction.

Staff Augmentation Benefits:

  • Access to a team of certified professionals

  • Focus on specialized application skills

  • Maintenance, management, and support of your specific applications

How Does Obsidian IT Stack Up

Basics

  • Windows 10 Update Check
  • Windows Security Updates Check
  • Windows System Diagnostic Check
  • Windows Defragmenter
  • Windows Disk Cleanup Temporary Files
  • Windows Update Device Drivers
  • Daily Virus Scan
  • Hard Drive Diagnostic
  • Full Virus Scan
  • Verify Antivirus is Running via RMS
  • Monthly Create System Image or System Recovery – As Identified
  • Windows Weekly Restart via RMS
  • Check Auto-Start Programs
  • Annually dust the internal components

Environment Health

  • Alerts: Get notifications about device availability, performance, security, and backup statuses.
  • Performance checks: Easily health-check hardware and software on workstations, servers, and network devices across multiple work locations.
  • Security monitoring: Monitor antivirus scanning statuses, errors in event logs, and much more.

Monitor 24/7

  • Windows, Mac, and Linux compatibility: Remote Monitoring & Management enables you to keep track of workstations and servers across platforms and operating systems including Windows, OS X, and multiple versions of Linux.
  • Network performance monitoring: Discover, import, and monitor critical network devices using SNMP, such as firewalls, routers, printers, and switches.
  • Mobile device monitoring: Keep track of tablets with mobile device checks and monitoring.
  • Virtual machine monitoring: Run checks on all virtual sessions and virtual machines under your control.

Proactive Maintenance

  • Background maintenance: Fix issues without disrupting end users or causing downtime by using remote command lines and custom scripts, and by managing system processes and services.
  • Maintenance windows: Set scheduled maintenance to run during off hours so you don’t disrupt employees’ productivity or raise false downtime alarms.
  • Granular roles and permissions: Set strong rules around who can and cannot access data and systems based on their position within the organization.
  • Automation and bulk actions: Standardize your checks, rules, and tasks across sites, servers, and workstations. And take full advantage of our automation and scripting tools to help you perform bulk actions automatically across networks and work sites.

Detect Threats

  • Behavioral artificial intelligence engines: Harness eight AI engines that analyze multiple data points to identify threats and determine if a response is necessary.
  • Near real-time alerts: Discover threat activity quickly with alerts whenever a threat is detected or neutralized.
  • Executive insight and key findings: See aggregated data on threats—current number of active threats, number of threats found in a specified time period—and review threats and fixes over time.
  • Forensics: See an overview and the storyline of an attack, so you can quickly understand the threat.
  • Threat summaries: Review information on specific threats, such as dates they were identified, dates they were reported, and their file names. Summaries also include links to the Google threat database and Virus Total websites for more information.

Remote Monitoring

  • Remote Monitoring for a wide range of network devices: Including switches, routers, firewalls, printers, firewalls, routers, switches, uninterruptible power supplies (UPS), and more.
  • Easy discovery: Monitor devices on your user networks and search for devices under any subnet.
  • Asset information: Import devices connected to each managed subnet with details such as MAC Address, IP, operating system, firmware version, and hostname.
  • SNMP checks: Run checks for in-depth monitoring of hardware health, performance, and utilization.
  • Executive Reporting
  • CPU
  • Temperature
  • Fan status
  • Memory
  • Power supply
  • Drive status
  • RAID status
  • Disk status
  • VPN status
  • Battery levels

Network Performance & Infrastructure

Understand your network's performance and infrastructure past your firewall, from source to destination and everything in between.

  • 24/7 Monitoring and History: Track every hop and view latency historically or in real-time. Automate can be set up with 10-minute intervals for monitoring, plus it saves all historical data on path performance—saving you time troubleshooting by having an incremental timeline of path history for the last 30 days.
  • Performance and QoS Monitoring: Know about outages before your users. The Automate feature collects performance metrics and details of the network connectivity between the source and destination nodes; thus enabling you to see into the end-to-end performance that a user is experiencing and be notified once thresholds are crossed for packet loss and latency.
  • Network Visibility: Understand your provider’s network better than they do with visibility into the entire network path. Automate delivers information on the one or multiple paths a network packet may take to reach its destination; enabling an MSP to look into the cloud and identify a problem quickly, even if it's outside your own network.
  • Node/Hop Information: Identify a problem and the organization to contact to solve it. Automate collects information, including company and contact information of external nodes in a network path; enabling support person to quickly identify where, when, and why a node may be impacted.

Centralized Control

  • Convenient approvals: Manually approve patches in batch across sites, networks, servers, and workstations.
  • Automation: Auto-approve patches for specific programs based on severity levels.
  • Scheduling: Set patching windows so you can update software without disrupting employees during critical productive times.

Support More Software

  • Wide software support: Support operating system updates as well as updates for multiple third-party software application families, including Adobe product, Java, and browsers.
  • Exchange and Office 365 support: Stay current with all updates for Microsoft Windows and other Microsoft products—including Exchange and Office 365.

Respond Effectively through Automation

  • Custom policies: Use policy-driven protection tailored to your customer, which allows/blocks USB, allows/blocks endpoint traffic, and specifies the best automated response.
  • Multiple recovery options: Choose your preferred recovery option after attacks—from partial recoveries to fully-automated responses.
  • Enhanced quarantine: Select the “Disconnect from Network” option to prevent machines from further infecting the network.
  • Automatic rollback: Attacks are automatically contained and neutralized, and compromised files are automatically replaced by the last known healthy version (Windows OS only).

Save Up to 60% on Your Internet & Phone Bills with Our Telco Services!