ReppertFactor helps companies and individuals get the most out of their computers and networks.
It doesn't matter if you're a small business owner, employee or executive of a large company, or a parent looking to make your home computer safe. ReppertFactor can help you succeed.
Over the past 10 years we have advised companies in technology purchases, created corporate networks, implemented email systems and cleaned viruses and spyware off of countless computers.
ReppertFactor's team of highly qualified IT professionals has years of experience managing offices and home computers nationwide. Our unique combination of skilled programmers, network technicians, and desktop support specialists keep your electronic life in perfect working order. We are friendly, professional, and most importantly, dedicated to keeping you moving.
The right IT solution can save you time, cut your costs, increase revenue, and improve your professional image. We bring the expertise and the experience. Don't get left behind!
Keep your home humming. Let one of our experts configure your computer so you won't catch a virus or spyware infestation. Already have a bug? Give us a call.
The employees can be given access to our custom built help ticketing request system which they can use for any IT issue, whether for personal or professional use. We can offer solutions or help with malware, connectivity issues, printing, and disaster recovery, or offer recommendations on IT related purchases.
Office admins have a more robust access to the system that allows them to view any tickets entered by their office into the system to track issues entered by their employees. They are also able to add new employees into the system from this interface giving them instant access to the network resources and common use PCs. Office admins are also able to remove users themselves instantly 24/7, blocking them from accessing the network or even the internet. The office admin interface will also show the state of the offices network, so that they can track things like backups and server storage.
We use our own custom-designed firewalls to protect our client's networks. Custom built hardware using off the shelf parts means we do not have to rely on a single manufacturer and can repair common failures quickly and easily.
Our firewalls run hardened and battle tested software, proven to handle multiple gigabits of sustained bandwidth and block the most ruthless attacks.
We have years of experience helping businesses meet regulation and certification requirements such as PCI, HIPAA, and various ISO standards.
Having a server in place allows network resources to be shared and access granted on a per user level. This includes printers and folder shares as well as access to any common use PCs secured with a username and password.
We configure multiple complimenting backup methods to ensure that your data is safe. This usually includes dedicated onsite storage locations as well as offsite remote locations.
Insisting on battery backups minimizes interruptions and protects your equipment from power surges and brown-outs. All of our servers also include redundancy in multiple areas including storage, connectivity, and power.
Our print tracking software interacts with the user authentication system and all print jobs are associated with the user automatically. Simplified reports can be generated showing gross tallies of everything printed (and copied!) per user, or detailed views of precisely what was printed, at what time, or on which printer. At a quick glance, you can find any given user ID and see how many print jobs and copies were executed, and track costs for each user.
We support the latest wireless technologies such as 802.11AC and up to 1300Mbps. Our access points work in a mesh to seamlessly allow office roaming as well as offering load balancing.
We implement a private wireless network that is secure for trusted devices and also offer a second public wireless that you can give access to guests as a hotspot. The networks are fully separated so there is no risk to the office security. Additionally, we can monitor the wireless connections remotely, as well as reboot the wireless access points, and resolve many issues without ever needing to come onsite to troubleshoot.
Workstations designated for public use are great for office productivity. However, they can often become infected with spyware and viruses due to the sheer volume of different people that use the computers on a daily basis. We utilize a process where we set up each public computer with a base level of software so that each user that logs in has access to the same tools. We then lock down each computer, so that any user can use the computer as they see fit, but upon a reboot, the computer is wiped clean and refreshes to the last time the computer was locked. This creates an easy solution for viruses or lost connectivity issues; simply reboot the computer and any newly noticed issues will be wiped clean. This also prevents against users overcrowding the desktop with their own shortcuts or files. No more popups about random programs some user installed and not knowing what it’s about.
|Sales:||215-945-8869 ext 1|
|Billing:||215-945-8869 ext 2|
|Support:||215-945-8869 ext 3|