• Managed Services | Consulting | Data Analytics

    Supporting IT at the Speed of Your Business

  • About Us

    Located in Canton, Ohio, EAI Technology is dedicated to customer service. We are intimately familiar with the business needs of our clients, and with the application of technology to meet those needs. We have the technical expertise to provide rapid, efficient, cost-effective solutions to our clients.

     

    EAI specializes in the design, installation, and support of desktops, servers, and network infrastructure.

  • Managed Services

    EAI Technology offers managed services to monitor and manage your IT infrastructure, so that you can focus on what matters most – your business.

    Online Backup that will keep you safe

    Cloud or On-Premise​

    • Continuous Recovery – We can restore your business’s systems at any time from a standby virtual server
    • Data Archiving  and Versioning- Archive data and records for as long as you need them. You choose the minimum number of file versions to retain.
    • Security-Focused Storage – All data is encrypted and housed in either ISO-certified or SSAE-compliant data centers.
    • Bare Metal Recovery – Recover full systems from bare metal using a bootable USB drive.
    • Faster Backup and Restore – Optimize your backups and restores and reduce backup windows with True Delta technology.

    Email Security

    Anti-Spam and Antivirus​

    • Dependable Email Delivery – If your email server ever goes offline due to an internet outage, we will store incoming mail for up to seven days or reroute your mail to another location.
    • Built-in Blacklists and Whitelists – Our integrated whitelists and blacklists are updated constantly.
    • Web-based Quarantine – All blocked emails are stored in the cloud and can be managed from anywhere.
    • Detailed Reporting – Quarantine statistics are available at all times. Users can opt to receive daily spam queue summaries and virus interception notices via email.
    • Superior virus and outbreak detection – We are constantly incorporating the latest research into our managed solution.

    Anti-Virus

    Endpoint protection for your desktops and servers​

    Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

    • Identity and Privacy Shield
    • Web Threat Shield
    • Intelligent Outbound Firewall
    • Virtualization, Terminal Server & Citrix Support
    • Mobile Smartphone and Tablet Support

    Helpdesk and Remote Support

    Proactive Support​

    • Remote access support with an Online helpdesk and ticketing so nothing falls through the cracks
    • Proactive monitoring of hardware issues on your desktops and servers
    • Defragments and deletes clogging temp files from hard drive
    • Patch scanning & deployment of Microsoft security patches
    • CPU utilization, memory and disk space reporting
    • Windows system, security, and software event log monitoring

    Real Time Monitoring and Alerts

    Real Time Monitoring and Alerts of Servers, Desktops, and Networks including:

    • System resources
    • Logged in users
    • Network & IP Monitoring
    • SNMP Monitoring
    • Windows updates
    • SQL Server
    • Exchange
    • Active Directory
    • VMware
    • Hyper-V & SNMP enabled devices

    IT Automation

    We provide pre-configured administrative and maintenance tasks which can be applied to servers and desktops.

     

    These include:

    • Creating a System Restore Point
    • Deleting Temp Files
    • Deleting Internet History
    • Reboots and Shutdowns
    • Defragmenting (All disks)
    • Running Checkdisk (All disks)
    • Running a Full System Scan
    • Checking for New Updates
  • Consulting

    Expert advice for your IT needs

    Our consultants provide a full range of industry-leading services, including digital, enterprise resource planning, information management, and systems integration. We offer a powerful blend of big picture technology vision and business acumen resulting in the consistent development of powerful business strategies supported by cost-effective, high-performance IT infrastructures and applications.


    Our team has broad expertise in:

    • IT, cloud services, network, and telecommunications architecture/infrastructure design, installation, and support.
    • Full IT project and software development life cycle management including AGILE and Waterfall.
    • Client/vendor relationship management.

    Get in touch today!

  • EAI news

    Thoughts, musings, and ruminations.

    It seems like almost every week, email and other personal account information get stolen and exposed. If you're wondering whether or not your online account was compromised in a data breach, there's an easy way to find out. Visit haveibeenpwned.com, enter your email address or username, and...
    January 8, 2017 · Security
    According to the Identity Theft Resource Center (ITRC), in 2016 there were 980 reported data breaches that exposed over 35 million records. The ITRC defines a breach as an event in which an individual’s name plus Social Security Number (SSN), driver’s license number, medical record, or a...
  • Drop Us A Note

    Don't be afraid to reach out. You + us = awesome.

    PO Box 8853
    Canton, Ohio 44711
    Mon-Fri 5pm-11pm, Sat 8am-5pm
    (330) 451-6777
All Posts
×
×
EAI Technology Privacy Policy

This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally Identifiable Information’ (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, phone number or other details to help you with your experience.
When do we collect information?
We collect information from you when you subscribe to a newsletter, respond to a survey, fill out a form, Open a Support Ticket or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
 To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
To improve our website in order to better serve you.
To allow us to better service you in responding to your customer service requests.
To administer a contest, promotion, survey or other site feature.
To ask for ratings and reviews of services or products
To follow up with them after correspondence (live chat, email or phone inquiries)
How do we protect your information?
We do not use vulnerability scanning and/or scanning to PCI standards.
We only provide articles and information. We never ask for credit card numbers.
We do not use Malware Scanning.
We do not use an SSL certificate
We only provide articles and information. We never ask for personal or private information like names, email addresses, or credit card numbers.
Do we use ‘cookies’?

We do not use cookies for tracking purposes
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, some features will be disabled. that make your site experience more efficient and may not function properly.
However, you will still be able to place orders .
Third-party disclosure

We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
Third-party links
We do not include or offer third-party products or services on our website.
Google

Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Google AdSense Advertising on our website.
Google, as a third-party vendor, uses cookies to serve ads on our site. Google’s use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.
We have implemented the following:

Demographics and Interests Reporting
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Opting out:
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.

California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law’s reach stretches well beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting Personally Identifiable Information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals or companies with whom it is being shared. – See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf
According to CalOPPA, we agree to the following:

Users can visit our site anonymously.
Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website.
Our Privacy Policy link includes the word ‘Privacy’ and can easily be found on the page specified above.
You will be notified of any Privacy Policy changes:

On our Privacy Policy Page
Can change your personal information:
By emailing us
By calling us
How does our site handle Do Not Track signals?

We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?

It’s also important to note that we do not allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:

We will notify you via email
Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:

Send information, respond to inquiries, and/or other requests or questions
Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.
To be in accordance with CANSPAM, we agree to the following:

Not use false or misleading subjects or email addresses.
Identify the message as an advertisement in some reasonable way.
Include the physical address of our business or site headquarters.
Monitor third-party email marketing services for compliance, if one is used.
Honor opt-out/unsubscribe requests quickly.
Allow users to unsubscribe by using the link at the bottom of each email.

If at any time you would like to unsubscribe from receiving future emails, you can email us at

Follow the instructions at the bottom of each email.
and we will promptly remove you from ALL correspondence.

Contacting Us
If there are any questions regarding this privacy policy, you may contact us using the information below.
EAI Technology
PO Box 8853
Canton, Ohio 44709
support@eaitechnology.com
Last Edited on 2016-12-07