How can we help you?

Desktop Management and workstation management.

Needs assessment, purchase of machines, updating, maintenance and assistance: we offer companies a desktop management service structured and global. We organize the workstations and we take care of them efficiency and safety over time.

Desktop management means managing a company’s workstations.
Sys-Tek offers company of all sizes a desktop management services, structured according to the company’s size and timing.

The goal is to free the company from additional costs, purchases, maintenance, updating and management of internal security for their employees’ workstations.

Our offer has already been successfully tested on companies of various sizes and with different needs. It involves complete management, from evaluation and purchase of the equipment to their disposal, through constant updates and security checks.

As of 2019, Sys-Tek is officially part of the Acer Synergy project. As a Gold Partner, we have now become a reseller and can carry out repairs as well as replacements.
This allows us to provide more effective evaluations and improve our technical maintenance services.

We usually recommend a 4 year base during which we can provide assistance on site or remotely, in order to promptly check and fix potential problems.

At the end of the 4 years the equipment can be returned or renewed.
Depending on each company’s needs we can provide certified hard disk wipe and data erasure.

Our desktop management service is highly customizable based on each company’s needs: call us for a custom quote.

Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance.

We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration


All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance.

We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

 

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance. We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with:

Commercial support for the choice of products
Commercial offer based on customer needs
Startup & Roll out
Technical, managerial and organizational assistance after rollout
Machine fleet maintenance, implementation of new machines / PCs
Product warranty management and assistance.
We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used.

Specifically, the choice:

of the brand and the models available on the market
hardware configuration
In the offer, it is possible to enter various categories of products with different configurations.
At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible.

After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels.

After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package.

In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Technologies.

We explore the territories of innovation with a design vision solid and flexible. Open to the latest developments and relevant in the sector, concrete in the choice of options IT and structural that fit your goals. We transform technologies and expertise in useful solutions.

Many things have changed since the times when Sys-Tek based its work on the AS 400.
What the fast development of information technology has taught us is that it is never beneficial to base one’s entire work on a model or system.

Our efforts, since 2007 until today, have been oriented on creating a solid yet flexible work method that allows us to pick each time the most suitable ICT and structural solution for our goal. The technologies we rely on in our projects are therefore constantly evolving, just like our competences and our training.

Digitization analysis.

A good digitization it always starts with the analysis of the starting conditions and the clarity of the objectives that you want to achieve. This way we can accompany you on a path really useful development.

“Digitizing the company” is a phrase we hear everywhere nowadays, although often without any clarification on what digitization means or what a company needs when it comes to digitization.

At Sys-tek we want to help companies by concretely taking action, aiming to provide answers -and maybe raising funds – through a preliminary evaluation we call “digitization analysis”.

Thanks to our collaboration with CNA we know to evaluate each situation case by case before making any generic statement -even when generic statements could potentially be useful.-

We also take into consideration that the Italian resolution Piano Calenda Impresa 4.0 we find several oncrete initiatives to help companies willing to invest in digitization. This is why we created a service that starts from analyzing the level of digitization of each company.
Only after this analysis will we be able to recognize the company’s potential and how to develop it, understanding what is really useful to them at that stage of development.

If you want to find out what your digitization level is, what you can do to grow and which funds you can access, call us and together we will find the right path for you.

Network infrastructure design.

We design the entire infrastructure network hardware and software. We can do this in new spaces creation or in needing offices of a system integration. Our approach is organic. Each choice is designed in function of the production environment, too of its prospects for future growth.

Designing a network infrastructure today is a mandatory step in creating a new workspace. In fact it is necessary to guarantee a productive and functional environment and the safe management of internal data, in line with the new European privacy laws.

Sys-tek’s service to create a server infrastructure in offices is targeted to new spaces as well as pre existing ones in need of a system integration.

This is a “key in hand” service: we start by studying the client’s needs and work method, we design a structure that can adapt to their current situation and potential future changes. Finally, upon request, we install it.

Designing a network infrastructure is extremely delicate and it requires taking various factors into considerations. Decisions are made based on how many people will access the network, field specific needs, external access (and its requirements), type of data etc., on top of assessments on potential company development.

It is thanks to this precise analysis that we are capable of designing the whole infrastructure (hardware and software). Among other things we also keep in mind the workstations layout.

When it comes to system integration, meaning designs for pre-existing or expanding structures, the procedure is the same and it aims to safeguard pre-existing work habits whenever they do not obstacle a balanced (and most importantly safe) development of the new network design.

A well designed and well structured network is simple to protect, it is an essential procedure to adapt the company to the European privacy requirements (GDPR).

Thanks to a well organized infrastructure the action of firewalls and personal security devices can better protect data from potential intrusions and data breaches.

Secure certified hd data erase.

Digital data security is a central theme of our age. It is not just a legal requirement. It is an ethics. A form of respect for the company and its stakeholders. We guarantee the definitive and certified deletion of all data stored on hard drives, computers and electronic devices.

Secure and certified data erasure from hard drives and electronic devices is a procedure that complies with the new European regulation for the protection of personal data (GDPR – General Data Protection Regulation) effective since may 25th 2018. Abiding by existing privacy laws, Sys-tek s.r.l. offers a service of secure, permanent and certified data erasure on a hard drive, computer or electronic device.

Data security has been an increasingly relevant topic over the years, in correlation with the increase of personal and corporate data connected to various devices. The way data is handled and stored cannot be just dictated by the law, it needs to be a way of respecting one’s own business as well as all the partners and entities around it.
Therefore, the handled data needs to be protected not only while the device storing them is in use, but also after its disposal (regardless of whether the device is being refurbished or permanently disposed of.)

In order to guarantee that important corporate data (internal and external) will not be leaked, it is necessary to ensure their complete erasure from computer or electronic devices that are no longer being used.
The secure and certified data erasure from hard drives offered by Sys-Tek utilizes techniques that permanently erase computer memory as well as the memory of other devices, using an overwrite software as well (a program that writes random sequences of binary code over previously existing data).

The same program offers, at the end of the operation, a certification of the effective cancellation as recommended by current law.

Web design.

We have been designing websites to meet the needs of our customers for years.The process of creating a website requires sector analysis, research on design and graphic trends and the choice of the best customized structural setting based on the contents and the type of activity that you want to represent on the web.

You'd love to contact us?

At the base of each of our projects the need and the will to identify with the reality for which we work, in order to create a product that is truly suited to the needs. Depending on the objective, sell customizable products or provide in-house consultancy.