Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

Our Services


NETWORK
Fast, scalable, reliable architecture;
Layer-2/3 switch and firewall configuration;
Secure wireless network infrastructure;
Site-to-site VPN and branch office integration;
Long-range point-to-point wireless bridges;
Professional-grade CAT5e / CAT6 cabling;

APPLICATION-LEVEL
Corporate email and calendaring solutions;
Comprehensive server administration;
Centralized antispam and antivirus solutions;
Third-party database and application support;
Standardized document sharing systems;

MANAGEMENT
Data redundancy and archival solutions;
Automated maintenance policy integration;
Group Policy and Security Policy enforcement;
Leverage existing infrastructure for best use;
Telecommunications cost assessment;
Hardware and software procurement;
Specialized procurement for 501(c)3's;
Assistance with technical grants & proposals;
Long-term technical planning and forecasting;

CLIENT / SERVER
Microsoft Windows Server management;
Novell Server management;
Citrix Server management;
Secure web-enabled access systems;
Workstation integration and support;


CURRENT OFFERINGS
Free network assessment and site audit;
Contact us today for more information!

 

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

Posted on 4 December 2017 | 7:00 am

Tech Talk: Uber hack, Google tracks, AWS packs (in China) ... and Firefox is back

Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla is up to with its new Firefox Quantum.

Posted on 29 November 2017 | 1:00 pm

IDG Contributor Network: The case for securing the SD-WAN

With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity.

Among other things, this rapidly evolving threat environment can be attributed to new and expanding threat vectors that have opened the door for external threats to reach critical business assets via non-corporate entities, whether through a consumer device, poorly secured partner network or branch office. The Internet of Things (IoT) and guest tenant services, for example, force a unique method of segmenting the traffic service/workloads and introduce a level of operational complexity.

To read this article in full, please click here

Posted on 28 November 2017 | 5:00 am