Since 2020 we have been HP’s silver partner, we are official and certified resellers and repairers. This role allows us to provide an even more effective needs assessment and technical intervention service.
We offer a 3/4 year fee during which we can also provide assistance remotely, in order to verify and resolve any needs promptly.
At the end of the period the machines can be redeemed or renewed.
Depending on the needs, we can also provide for the certified formatting of the hard disk according to the one pass zeros technology (KILL DISK).
Desktop Management is divided and deals with:
We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used.
Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations.
At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:
All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.
Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance.
We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:
All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.
Desktop Management is divided and deals with: Commercial support for the choice of products Commercial offer based on customer needs Startup & Roll out Technical, managerial and organizational assistance after rollout Machine fleet maintenance, implementation of new machines / PCs Product warranty management and assistance. We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used. Specifically, the choice: of the brand and the models available on the market hardware configuration In the offer, it is possible to enter various categories of products with different configurations. At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible. After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:
All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels. After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package. In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.
Desktop Management is divided and deals with:
Commercial support for the choice of products
Commercial offer based on customer needs
Startup & Roll out
Technical, managerial and organizational assistance after rollout
Machine fleet maintenance, implementation of new machines / PCs
Product warranty management and assistance.
We provide commercial advice for the choice of products, creating economic offers in order to direct and support customers towards products more in line with their operation and the software used.
Specifically, the choice:
of the brand and the models available on the market
hardware configuration
In the offer, it is possible to enter various categories of products with different configurations.
At the start of the project, specific information is requested from the customer, in order to best configure the notebooks and make them operational as soon as possible.
After an analysis of the customer’s existing products, we move on to the configuration of the new notebooks, which consists of:
All PCs are configured with specific security applications reported by the customer, to always remain in line with company policies and comply with cyber security compliance levels.
After the roll out, the machine park is managed and supported by technicians, for technical assistance on hardware, office automation, configurations and installations, as well as maintenance, patching on the operating system and office package.
In the event of hardware anomalies or failures, the products are managed within the times and in the SLAs provided for in the contract.
A lot of things have changed since Sys-Tek based its work on the AS/400. What the rapid development of information technology has taught us is that it is never profitable to base one’s work on a single model or system.
The technologies we choose for our projects are constantly evolving, as are our skills and training.
At Sys-Tek we aim to guide companies with concrete interventions
and to give answers through a preliminary assessment that we have called “analysis of the state of digitization”.
If you want to find out what your level of digitization is,
what you can do to grow and what investments you can
take advantage, call us and together we will understand the right path to take.
The design of a network infrastructure is today an essential step in the creation of a new workspace. Indeed, it is necessary to ensure a functional production environment and secure internal data management in line with the new European regulations in terms of privacy.
The service is obviously “turnkey”: we start with the study of your needs and working methods, we design a structure that fits perfectly and that is able to adapt to any future increases.
The design phase of a network infrastructure is extremely delicate and takes into consideration different factors: number of people and devices with access to the network, sector needs, external accesses (and with what type of need), type of data processed.
In the case of system integration, therefore of planning to be carried out not for new spaces but for already existing or expanding structures, the procedure is the same and tries to safeguard the pre-existing habits if these do not conflict with a harmonious (and above all safe) development ) of the new network to be designed.
The certified and secure deletion of data on hard drives and electronic devices is a procedure that complies with the provisions of the European regulation on the protection of personal data (GDPR – General Data Protection Regulation) in force since 25 May 2018.
In full compliance with the privacy legislation Sys-Tek offers a secure, definitive and certified cancellation service of the data present with the one pass zeros (KILL DISK) methodology.
Data security has been an increasingly relevant topic over the years, in correlation with the increase of personal and corporate data connected to various devices. The way data is handled and stored cannot be just dictated by the law, it needs to be a way of respecting one’s own business as well as all the partners and entities around it.
Therefore, the handled data needs to be protected not only while the device storing them is in use, but also after its disposal (regardless of whether the device is being refurbished or permanently disposed of.)
In order to guarantee that important corporate data (internal and external) will not be leaked, it is necessary to ensure their complete erasure from computer or electronic devices that are no longer being used.