Services
X

Tek Secure

Tek Secure, provides a comprehensive portfolio of security services. Security is fundamental to the well-being of any business. For years businesses have understood the need to protect their physical assets, but until recently the need for cyber or logical protection has been overlooked. Today, it is imperative to protect all assets. A cyber attack or breach often has far more devastating results to a business than a physical breach. Today, the integration of cyber and physical security is a must. The security industry calls the integration of cyber and physical security, "convergence." Convergence security creates a single path for a company's overall security strategy. Combining physical and cyber security creates a stronger defense, less overhead, reduced costs, and stronger management control..

Cyber Security

 

The Tek has formed a unique group of products to help protect your network, your computers and your data. The first step in protecting your systems and customer data is identifying what needs protecting. We do this by running a security scan on your entire network. Click here for a sample Report. This finds computers and servers missing critical patches from multiple vendors. It also finds any unprotected data that if your system was breached could result in fines from government organizations like the SEC. This data could be anything from Social Security Numbers to Credit Card information.

After the initial discovery scan we then recommend a course of action to not only fix these issues but continue to monitor your network and your customer data and make sure it remains protected.

SEC and HIPAA requirements are complex and costly if you don't understand them and we have the experience to make sure you stay in compliance.

24x7 Security Operations Center (SOC)

All SOC staff are employees, not contractors. Average 5+ years experience; BS & MS holders in IS and CyberSecurity. Certifications include Certified Ethical Hacker (CEH) or CompTIA Security+. EC Council Certified Security Analyst (ECSA). Certified Information Systems Security professional (CISSP)

Threat Analysis/Removal

Returning your systems to a "clean state" by removing, quarantining, encryption, or backup of sensitive exposed data

Advanced Technology Protection

The utilization of the latest Zero Day Artificial Intelligence based anti-virus software to stop attacks at the endpoint.

Continuous Monitoring

24/7 monitoring of all devices to proactively prevent breach activity and attacks.

Penetration/Vulnerability Testing

Controlled simulated attacks to discover system vulnerabilities

Security Compliance Services

Security solutions to keep your company in compliance avoiding fines and penalties.

Policies and Procedures

A complete customized company handbook setting security policies and procedures for all employees

Security Training

An in-depth on-line module based employee training program

Mobile Security

Advanced protection services for mobile devices

Insurance Policies

Cyber breach policies to protect you in the event of an attack

Remediation Services

Comprehensive services to help you restore and recover after a breach

Risk Assessments

Vulnerability scan of systems to discover exposed data

Tek Solutions

Partnering with the best in class providers, Tek Solutions offers services such as voice over IP, Cloud hosting, wired and wireless, network security, server operating systems, disaster recovery, and help desk consulting. The fact is that numerous companies are struggling to operate effectively as down time and failure of their systems reduces their efficiently. Still more companies are not aware of the constantly changing technologies that can materially enhance their profitability. Tek Solutions is ready to help!.

IT Support

 

Day to Day support.

This is a service where The Tek truly shines. We have a help desk waiting to provide support Monday through Friday. Don't pay for expensive on site support when a majority of your support can be done remotely.

We have developed a custom monitoring tool that gives us instant information on the health of your computers and services and sends you nightly updates on your current infrastructure and what needs to be resolved. With our monitoring tool most likely we will know about an issue before you do.

Call us so we can come in and evaluate your infrastructure today. - 919.386.3575

Custom Monitoring Tool

We have developed a custom monitoring tool that gives us instant information on the health of your computers and services and sends you nightly updates on your current infrastructure and what needs to be resolved. With our monitoring tool most likely we will know about an issue before you do. Call us so we can come in and evaluate your infrastructure today. - 919.386.3575

Backups / Recovery

Have you tested your backup solution? We have helped multiple companies try to recover data which wasn't properly backed up and the end was a costly mistake. All they needed was a reliable backup solution and they could of saved thousands simply restoring from a backup. At The Tek we don't believe in a single backup solution. Two is always better than one and this is amplified for backups. Make sure you have one onsite backup and one offsite backup and if you don't have both call us today!

Server Installations

Computer and server installations can be difficult and time consuming. The Tek has years of computer and server installation experience. Our engineers will help you find the right systems to meet your needs. Our services include consulting, purchasing, configuration, installation, and maintenance. You can count on The Tek to make sure you get the solution you need to keep your business on track and running smoothly.

Phone / VOIP Solutions

The days of expensive phone solutions are over. You certainly shouldn't have to pay more for the same reliable phone services you can get for less. We have tailored a custom VOIP Solution that can be hosted onsite or offsite and is feature rich to compete with the most expensive phone systems. See our blog to check out our view on the dying expensive PBX Phone system. - The Tek VOIP Blog Give us a call today to see how we can help you ditch that old gear - 919.386.3575

Work Remotely

Through the use of Virtual Desktops and advanced encrypted VPNs we can set you up to work remotely and put you on the same network as the main office just like you were sitting right there. Working remotely has become common place for a majority of companies and we have the knowledge and expertise to do it right.

Virus Protection

We have evaluated every virus protection platform on the market and Sophos is leading the market in protection using their advanced Artificial Intelligence protection platform.  They were named leaders in the last Gartner Magic Quadrant.  We wouldn't trust anyone else to protect our customers.  Don't reply on Non-AI based AVs or only Microsoft Defender to protect your computers.  Get the best, get Sophos.

Help Desk Consulting

The Tek has provided consulting services to help build help desk solutions of all sizes. We can help you with a cloud hosted help desk solution or an onsite solution. We have several certifications for software solutions such as Cherwell and FrontRange's H.E.A.T solution.

Cloud Hosted Solutions

We provide cloud hosted solutions using Amazon, Azure, Digital Ocean and many more.

Other Security Services

Tek Secure, provides a comprehensive portfolio of security services. Security is fundamental to the well-being of any business. For years businesses have understood the need to protect their physical assets, but until recently the need for cyber or logical protection has been overlooked. Today, it is imperative to protect all assets. A cyber attack or breach often has far more devastating results to a business than a physical breach. Today, the integration of cyber and physical security is a must. 

Our physical security services are designed to integrate into our cyber security services. The security industry calls the integration of cyber and physical security, "convergence." Convergence security creates a single path for a company's overall security strategy. Combining physical and cyber security creates a stronger defense, less overhead, reduced costs, and stronger management control.

Other Security Offerings

 

 

Physical Security

Our physical security services are designed to integrate into our cyber security services. The security industry calls the integration of cyber and physical security, "convergence." Convergence security creates a single path for a company's overall security strategy. Combining physical and cyber security creates a stronger defense, less overhead, reduced costs, and stronger management control.

Personal Protection

The Tek offers personal and corporate protection services. Our services are designed to keep you and your business safe from injury and liability should conflict or confrontation occur on your premise or event.

K9 Protection and Detection

The Tek offers discreet and confidential residential, school and commercial  K-9 services. Our highly trained dogs offer you the same tools as law enforcement. 

Drug Detection
Firearms Detection
Explosives Detection

Spy Sweep Services

The Tek provides confidential residential, business and government spy sweeps. Our Spy Sweep Services encompass working with private individuals as well as various professionals and organizations including: Spouses, Celebrities, Medical and Legal Professionals, Private Investigators, Business Executives, Security Advisers, Law Enforcement Agencies, and all levels of Government Agencies.

Our top of the line TSCM Spy Surveillance Equipment hones in and detects eavesdropping bugs that could be transmitting your sensitive data. Our TSCM equipment captures signals exceeding government level eavesdropping and our sweeps are conducted with use of the latest government/military version instrumentation and testing procedures.  Our RSA Spectrum Analyzer with DPX Technology is one of the best pieces of equipment available in the world and we are one of only a select few in the United States to own this equipment and have the capability of conducting a comprehensive sweep.

Agency Counterespionage Investigations

A full Counterespionage Investigation is very involved with the combination of highly-certified government-level test equipment, educational knowledge for the potential of bugging and diagnosis, past experience combined with knowledge and continual education and actively being a full-time professional with life-long experience.

We are the insiders of this rare professional field because of our greater knowledge of ‘how a spy thinks and reacts.’ As a result of working closely with the counter espionage and the spy realm, the hunter and the hunted become keenly aware of each other.

With over 30 Years of TSCM experience, we have been told time and time again that we are good at what we do.  Spy~vs~Spy in reality is the hunter vs the hunted.  Let us be your dedicated hunter of spies and take back your privacy.

Private Investigation

Serving Raleigh, Cary, Chapel Hill, Apex, Durham, Greensboro, and Fayettville, NC we offer custom investigations to suit the needs of clients who have a wide range of concerns, to include complex cases local police may not have time nor resources to dedicate for many reasons. Our team members are professional, long standing, highly regarded and distinctly honored law enforcement investigators based in Raleigh, North Carolina. Our professional team members’ experience includes skill sets which combine much needed advanced expert analysis capabilities and experience, tenacity, professionalism, on the job decision making and proven, usable evidence gathering skills. In additional, our professionals individually maintain a high moral caliber, display ethical behavior and maintain total confidentiality and discretion. The evidence obtained by our team members is highly favorable compared to testimonies presented by friends or family in most court cases. We are available to testify in court hearings to present proof of the facts without bias.