How can we help you?

Desktop Management and workstation management.

Assessment of needs, operating lease of computers (notebooks and desktops), updating, maintenance and assistance: we offer companies a structured and global desktop management service. We organize and manage the workstations (pdl) and take care of their efficiency and safety over time.

Since 2020 we have been HP’s silver partner, we are official and certified resellers and repairers. This role allows us to provide an even more effective needs assessment and technical intervention service.

We offer a 3/4 year fee during which we can also provide assistance remotely, in order to verify and resolve any needs promptly.

At the end of the period the machines can be redeemed or renewed.
Depending on the needs, we can also provide for the certified formatting of the hard disk according to the one pass zeros technology (KILL DISK).

Desktop Management is divided and deals with:

  • Commercial support for the choice of products
    Commercial offer according to customer needs
  • Startups & Rollouts
  • Post-rollout technical, managerial and organizational assistance
  • Fleet maintenance, implementation of new machines/PCs
  • Product warranty and service management.

We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used.

Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations.

At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance.

We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

 

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance. We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Desktop Management is divided and deals with:

Commercial support for the choice of products
Commercial offer based on customer needs
Startup & Roll out
Technical, managerial and organizational assistance after rollout
Machine fleet maintenance, implementation of new machines / PCs
Product warranty management and assistance.
We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used.

Specifically, the choice:

of the brand and the models available on the market
hardware configuration
In the offer, it is possible to enter various categories of products with different configurations.
At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible.

After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:

  • Backup and restore of user data
  • Reinstall any freeware and paid / licensed software
  • Network disk / shared folder mappings
  • Personal e-mail configuration and shared accounts
  • Browser data (favorites, plugins etc …)
  • ODBC configurations, and FTP clients
  • Local or network shared printer configurations
  • Client VPN configuration

All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels.

After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package.

In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.

Technologies.

We explore the territories of innovation with a solid and flexible design vision, open to the most current and relevant evolutions in the sector, concrete in the choice of IT options that adapt to your objectives. We transform technologies and skills into useful solutions.

A lot of things have changed since Sys-Tek based its work on the AS/400. What the rapid development of information technology has taught us is that it is never profitable to base one’s work on a single model or system.

The technologies we choose for our projects are constantly evolving, as are our skills and training.

Digitization analysis.

A good digitization always starts from the analysis of the starting conditions and the clarity of the objectives to be achieved. In this way we can accompany you on a truly useful development path.

At Sys-Tek we aim to guide companies with concrete interventions
and to give answers through a preliminary assessment that we have called “analysis of the state of digitization”.

If you want to find out what your level of digitization is,
what you can do to grow and what investments you can
take advantage, call us and together we will understand the right path to take.

Network infrastructure design.

We design the entire network hardware and software infrastructure. We can do this in newly created spaces or in offices that need system integration. Our approach is organic. Each choice is designed according to the production environment, including its future growth prospects.

The design of a network infrastructure is today an essential step in the creation of a new workspace. Indeed, it is necessary to ensure a functional production environment and secure internal data management in line with the new European regulations in terms of privacy.

The service is obviously “turnkey”: we start with the study of your needs and working methods, we design a structure that fits perfectly and that is able to adapt to any future increases.

The design phase of a network infrastructure is extremely delicate and takes into consideration different factors: number of people and devices with access to the network, sector needs, external accesses (and with what type of need), type of data processed.

In the case of system integration, therefore of planning to be carried out not for new spaces but for already existing or expanding structures, the procedure is the same and tries to safeguard the pre-existing habits if these do not conflict with a harmonious (and above all safe) development ) of the new network to be designed.

Secure certified hd data erase.

Digital data security is a central issue. It's not just a legal obligation, it's ethics. We guarantee the definitive and certified cancellation of all data stored on hard drives, computers and electronic devices.

The certified and secure deletion of data on hard drives and electronic devices is a procedure that complies with the provisions of the European regulation on the protection of personal data (GDPR – General Data Protection Regulation) in force since 25 May 2018.

In full compliance with the privacy legislation Sys-Tek offers a secure, definitive and certified cancellation service of the data present with the one pass zeros (KILL DISK) methodology.

Data security has been an increasingly relevant topic over the years, in correlation with the increase of personal and corporate data connected to various devices. The way data is handled and stored cannot be just dictated by the law, it needs to be a way of respecting one’s own business as well as all the partners and entities around it.
Therefore, the handled data needs to be protected not only while the device storing them is in use, but also after its disposal (regardless of whether the device is being refurbished or permanently disposed of.)

In order to guarantee that important corporate data (internal and external) will not be leaked, it is necessary to ensure their complete erasure from computer or electronic devices that are no longer being used.

Web design.

We have been designing websites to meet the needs of our customers for years.The process of creating a website requires sector analysis, research on design and graphic trends and the choice of the best customized structural setting based on the contents and the type of activity that you want to represent on the web.

You'd love to contact us?

At the basis of each of our projects there is the need and the desire to identify with the reality for which we work, in order to create a product that is truly suited to the needs.