29 Fort Brown Dr., Ste. 204 Plattsburgh, NY 12901
I am referring specifically to these four pillars of the technology ecosystem that are interdependent upon each other to operate most efficiently and are required of every business.
25 YEARS OF EXPERIENCE

The Technology Ecosystem

In the course of my 25-year career in sales and consulting, I met with and interviewed hundreds of businesses and organizations to discuss advanced technology solutions. These ranged from small and mid-size entities to the very large-scale corporate accounts such as hospitals, colleges, and manufacturing facilities
I found that executive professionals at many small to mid-size businesses and organizations did not have an extensive understanding of the products and services that comprise their technical systems. The large-scale businesses would have an IT team and an executive dedicated to the vision and direction of the organization, but the smaller companies did not have the resources to strategically address the broad spectrum of technology solutions.

The Four Pillars of Technology

  • Telecommunications
  • Cybersecurity
  • Managed IT Services
  • Network Infrastructure
Telecommunications and Unified Messaging
This pillar is the backbone by which your organization communicates internally and to the outside world. It is far beyond the traditional business phone system to now include:
  • unified communications - voice/email/text/chat - premise or cloud
  • Conferencing and Collaboration - multimedia, audio/video, hosted applications
  • Mobility management - cell phones, laptops, wireless, multi-site office
  • Presence management - multiple devices - single number reach
  • remote and home office - VPN and secure systems access
  • advanced applications - contact center, mass notification, recording/archiving
Cybersecurity
This pillar provides the required defenses of your private information and systems. It is a constant and evolving process that needs to be managed and adjusted at the pace set by threat actors and industry trends. It primarily consists of:
  • Unified threat management - suite of systems and tools continuously monitored and updated to address emerging threats
  • Next-generation Firewall - perimeter defense between your business and external or foreign networks including the public internet
  • Risk mitigation strategies and vulnerability testing procedures
  • Cyber insurance and compliance standards
  • Disaster recovery and business continuity plans - established and tested
  • Data protection and storage - multi-site, premise and cloud
Managed IT Services
This pillar is the daily management and updates required to keep your data systems current and protected from external threats and limitations due to obsolescence. It primarily consists of:
  • Endpoint protection - continuous monitoring and automated response tools
  • Patch management - multiple operating systems and software updates
    • Virus and Malware detection and prevention
    • Help desk and remote systems support
    • Asset lifecycle management
    • Email hosting and encryption methodologies
Network Infrastructure
This pillar includes the hardware and software systems that provide the required interoperability of all devices and applications connected to the network. It primarily consists of a blend of premise, hosted and cloud applications, software, carrier and subscription-based services
  • Servers and network frames
  • Copper and fiber cabling standards
  • Virtual Private Network (VPN) and Wide area-networking (SD-WAN)
  • Internet and phone service providers
  • System redundancy and failover planning
    • Priority backbone switching and routing of data
  • Virtualization and the shared services model

A complete understanding of these systems and rapidly evolving industry trends are typically provided by a Chief Information Officer or Chief Technology Officer. The development of a strategic vision and a technology roadmap unique to your business is a core responsibility of this executive-level professional. However, most small and mid-size businesses do not have the resources or the budget necessary to sustain this position. With my experience as a Technical Solutions Consultant and Trusted Advisor, I will provide the strategic direction, planning, and guidance required for this role to be your outsourced virtual Chief Information Officer (vCIO).

Why is this important?