• HIDING IN YOUR NETWORK

    On average, attackers are in a victim's environment for over two weeks before being detected.

  • background image
    background image
  • About Us

    Located in Stark County, Ohio, EAI Technology is dedicated to customer service. We are intimately familiar with the business needs of our clients, and with the application of technology to meet those needs. We have the technical expertise to provide rapid, efficient, cost-effective solutions to our clients.

     

    EAI is security focused and specializes in the design, installation, and support of desktops, servers, and network infrastructure.

  • Managed Services

    EAI Technology offers managed services to monitor and manage your IT infrastructure, so that you can focus on what matters most – your business.

    broken image

    Online Backup that will keep you safe

    Cloud or On-Premise​

    • Continuous Recovery – We can restore your business’s systems at any time from a standby virtual server
    • Data Archiving  and Versioning- Archive data and records for as long as you need them. You choose the minimum number of file versions to retain.
    • Security-Focused Storage – All data is encrypted and housed in either ISO-certified or SSAE-compliant data centers.
    • Bare Metal Recovery – Recover full systems from bare metal using a bootable USB drive.
    • Faster Backup and Restore – Optimize your backups and restores and reduce backup windows with True Delta technology.
    broken image

    Email Security

    Anti-Spam and Antivirus​

    • Dependable Email Delivery – If your email server ever goes offline due to an internet outage, we will store incoming mail for up to seven days or reroute your mail to another location.
    • Built-in Blacklists and Whitelists – Our integrated whitelists and blacklists are updated constantly.
    • Web-based Quarantine – All blocked emails are stored in the cloud and can be managed from anywhere.
    • Detailed Reporting – Quarantine statistics are available at all times. Users can opt to receive daily spam queue summaries and virus interception notices via email.
    • Superior virus and outbreak detection – We are constantly incorporating the latest research into our managed solution.
    broken image

    Anti-Virus

    Endpoint protection for your desktops and servers​

    Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

    • Identity and Privacy Shield
    • Web Threat Shield
    • Intelligent Outbound Firewall
    • Virtualization, Terminal Server & Citrix Support
    • Mobile Smartphone and Tablet Support
    broken image

    Helpdesk and Remote Support

    Proactive Support​

    • Remote access support with an Online helpdesk and ticketing so nothing falls through the cracks
    • Proactive monitoring of hardware issues on your desktops and servers
    • Defragments and deletes clogging temp files from hard drive
    • Patch scanning & deployment of Microsoft security patches
    • CPU utilization, memory and disk space reporting
    • Windows system, security, and software event log monitoring
    broken image

    Real Time Monitoring and Alerts

    Real Time Monitoring and Alerts of Servers, Desktops, and Networks including:

    • System resources
    • Logged in users
    • Network & IP Monitoring
    • SNMP Monitoring
    • Windows updates
    • SQL Server
    • Exchange
    • Active Directory
    • VMware
    • Hyper-V & SNMP enabled devices
    broken image

    IT Automation

    We provide pre-configured administrative and maintenance tasks which can be applied to servers and desktops.

     

    These include:

    • Creating a System Restore Point
    • Deleting Temp Files
    • Deleting Internet History
    • Reboots and Shutdowns
    • Defragmenting (All disks)
    • Running Checkdisk (All disks)
    • Running a Full System Scan
    • Checking for New Updates
  • EAI news

    Thoughts, musings, and ruminations.

    Last year, Tesla issued an update that made its vehicles easier to start after being unlocked with their NFC key cards. Now, a researcher has shown how the feature can be exploited to steal cars. Martin Herfurt, a security researcher in Austria, quickly noticed something odd about the new...
    Security,Vulnerability
    There is a newly discovered vulnerability in MS Word (and likely other MS Office apps) that could install malware so you should be especially vigilant about opening any attachments. This exploit can be triggered with a hover-preview of a downloaded file that does not require any clicks (post...
    Four Quick Security Tips to Keep Your Crypto Safe! Multifactor Authentication (MFA) 1. Turn on MFA everywhere. All exchanges. Your email. Wherever MFA is available, enable it. Use Google Authenticator or Authy. Don’t use SMS unless there are no other options. Something is better than nothing....
  • Free Assessments

    Wondering where to start?
    Let us help you with a free assessment of your current technology.
    Fill out the form below to get started.