Posts in Phone

CRN MSP 500 2018

Think Named to 2018 CRN MSP 500 List

February 20th, 2018 Posted by Awards, Best Practices, Cloud, Managed Service Provider, Phone 0 thoughts on “Think Named to 2018 CRN MSP 500 List”

Think Network Technologies Named to 2018 CRN MSP 500 List

Durango, Colo., February 20, 2018 – CRN, a brand of The Channel Company, announced today that Think Network Technologies is named to its 2018 Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category, recognizing companies with business models weighted toward managed services and largely focused on the SMB market. CRN’s annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services.

In today’s fast-paced business environments, MSPs play an important role in helping companies leverage new technologies without straining their budgets or losing focus on their core business. CRN’s MSP 500 list shines a light on the most forward-thinking and innovative of these key organizations.

“Managed service providers have become integral to the success of businesses everywhere, both large and small,” said Bob Skelley, CEO of The Channel Company. “Capable MSPs enable companies to take their cloud computing to the next level, streamline spending, effectively allocate limited resources and navigate the vast field of available technologies. The companies on CRN’s 2018 MSP 500 list stand out for their innovative services, excellence in adapting to customers’ changing needs and demonstrated ability to help businesses get the most out of their IT investments.”

“Think Network Technologies is proud to be on CRN’s MSP 500 list for the second year in a row. It is an honor to be recognized amongst the top companies in the industry,” commented Melissa Glick, CEO at Think Network Technologies.

Think Network Technologies is a full-service IT company headquartered in Durango, Colo. providing outsourced IT services including managed services, premise and cloud solutions, infrastructure support and integrated communications for businesses in Colorado, New Mexico, Arizona, and Utah. The MSP 500: Pioneer 250 list can be viewed online here.

For more information about this topic, please email us.

compliance security

Security and Compliance Solutions

January 24th, 2018 Posted by Best Practices, Cloud, Phone 0 thoughts on “Security and Compliance Solutions”

Solutions for Law Firms and Legal Service Providers

Think’s cloud services (T-Cloud) deliver essential IT services that maximize cost-efficiency and productivity for your team while offering the highest levels of privacy and security to protect your firm’s clients.

law firm IT services Audited security controls including SOC 2 Type II Mobile device management to protect data Admin tools to streamline IT management and security Reliability and support with a 99.999% uptime guarantee

Legal services firms are under intense pressure to offer services that are innovative and agile in the face of tough competition. Clients expect superlative responsiveness, efficiency, and cost-effectiveness. Our Compliance and Security plan includes high security email, file sharing, and web application security tools that increase productivity, project a high degree of technical competence, and conform to the security or regulatory requirements of clients.

Start with our Compliance and Security Plan

Our Compliance and Security plan services include security and privacy controls to protect attorney-client confidentiality and help to support client industry regulations, including finance and healthcare.

hosted exchangeHosted Exchange
Get business-grade, fully mobile email, calendar, and contacts for your attorneys and staff.

hosted emailEmail Protection
Tools that help you eliminate spam and viruses before they reach your users’ inboxes. Includes advanced spam and virus protection, company-wide white and black lists, and 24/7 threat monitoring.

ConnectID® single sign-on and identity management
Provide secure, easy-to-manage access to your web–based calendaring and docketing, conflict checking, document management, and legal research applications. Secure your cloud apps with 2FA, the strongest industry-standard authentication protocol.

pc backup servicePC Backup
Make sure your staff can recover quickly from hard drive failures and lost or stolen laptops.

email encryptionEmail Encryption
Protect against data leaks by automatically encrypting email containing privileged client information. Enforce compliance based on policies and rules that you define.

email archiving serviceEmail Archiving
Archive your email correspondence automatically and securely with encryption. Get tamper-proof, searchable records for auditing, compliance, and internal governance purposes.

share sync cloud serviceShareSync® file sync and share
Access and collaborate securely on discovery, client, and project files from anywhere, on any device, with at-rest and in-transit encryption. Manage research and discovery files and folders for staff and clients with strict access controls, even in a virtual office environment.

Add These Services to Enhance Your Solution

business phone serviceHosted PBX
Experience enterprise-grade phone service with conference calling and automatic call forwarding. Use the softphone mobile app to dial from a mobile device as if you were sitting at your desk.

business cloud serviceShareSync® 10GB Capacity
With upgraded storage, you will not need to worry about running out of room, whether you’re gathering large documents for discovery, or maintaining a library of research or case files.

Skype® for Business Enterprise
Instantly convert a chat into a conversation or video for richer, more productive project discussions. Share screens to collaborate quickly on proposals.

Security and Reliability that go Above and Beyond the Competition

IT security servicePrivacy and security to support confidential attorney-client communications.
• Annual SOC 2 Type II audits.
• A dedicated, full-time technical staff certified in information security.
• Full coverage of all aspects of security, including log and event monitoring, incident response, managing intrusion protection systems (both host and network), perimeter defense, service and architecture testing, and source code reviews.

uptime guaranteeReliability and support you can count on.
• With the T-Cloud 99.999% uptime guarantee, you can access your cloud services when needed, staying connected and productive.
• Receive 24/7 phone and chat support any time you need expert help.

IT admin toolsAdmin tools to streamline IT management and security.
• Centralized control over users and services, with granular configurability.
• Administrators can quickly provision,
de-provision and configure security controls, and delegate
setup and management to non-specialized staff.
• Single sign-on technology that comes with all Think’s applications safeguards sensitive financial and customer data and web-based applications.

business mobile device managementMobile device management and security.
• Purposefully built to protect data wherever it is accessed.
• Our email system includes mobile security controls and policy enforcement for the administrator, including remote wipe for employees with mobile devices.

Get started protecting your firm and your clients with strong compliance and security solutions. Contact Think to begin the conversation.

Business IT Solutions: T-Cloud

December 19th, 2017 Posted by Cloud, Phone, Services 0 thoughts on “Business IT Solutions: T-Cloud”

The world of business IT solutions can be complicated. Not only are there many services to think about, but there are dozens of options for each service. Of course, it’s great to have so many things to choose from, but it can be overwhelming. That’s where T-Cloud can make a big difference for your business.

T-Cloud Includes 20+ IT Services

Every business needs phones, email, computers, data storage, and information security. Think’s T-Cloud suite of services has those covered, and we do it in an easily managed package. Here are some of our most popular business IT solutions.

Managed Services

Your business needs technology solutions, but you may not need or want a full IT department. Think can manage your IT needs for you, from software updates to server backups. We can take care of your technology, so you can focus on the core of your business.

Hosted Exchange

Microsoft® Exchange is the world’s leading platform for unifying a business’s email, calendar and contacts. More than 470 million mailboxes worldwide leverage Exchange to communicate, collaborate and compete at a Fortune 500 level. With Hosted Exchange, your Exchange server is installed and managed in the cloud, as a service, with no fees upfront. You get all the functionality of Exchange with none of the overhead.

With Hosted Exchange you’ll enjoy:

  • Free migration performed by our experts
  • 24/7 support with typical hold times of <60 seconds
  • 99.999% uptime guarantee

Hosted PBX

Hosted PBX is a complete business communications system and service. With over 40 calling features, Hosted PBX delivers Fortune 500 style capabilities to small and mid-sized businesses. This powerful cloud-based phones system uses a company’s existing data connection and wiring. Best of all, onsite PBX hardware is not required!

With Hosted PBX you’ll enjoy:

  • Savings up to 50% on your phone bill
  • Rich, enterprise-grade calling features
  • A powerful web-based control panel
  • 24/7 support and a 99.999% uptime guarantee

ShareSync®

ShareSync is a 2-in-1 solution that makes backup and file sharing easy to use and secure. With ShareSync, users can back up their files to a powerful enterprise-class data center with a 99.999% uptime guarantee and file redundancy while having the added benefits of file sharing and collaboration.

With ShareSync®, you’ll enjoy:

  • Real-time backup & sync for PCs and Mac®
  • Simple and secure file sharing with colleagues and customers
  • Access to files from any device
  • Leading data encryption and protection to ensure security

Encrypted Email

Encrypted Email automatically filters and scans your emails to help protect your company against data loss. It also helps you comply with HIPAA, SOX, GLBA, California’s Security Breach Notification Act, the Massachusetts Encryption Law and more.

With our email encryption, you get:

  • Content filtering and scanning of outbound email
  • Centralized control over policies
  • Reduced risk of confidential data loss
  • Improved facilitation of compliance with regulations

Data Backup and Recovery

What would happen if you lost all of your digital information? Even if you are backing up all of your data onto a server, there is still a chance that the data can be lost. To truly back up your data, you must move it offsite. We provide physical and cloud storage solutions that make it safer and easier to restore information in case of a disaster. This data is also made available via applications or direct secure URL for realtime remote data access.

Compliance Consulting

Our expert network engineers and systems administrators have the training and experience to serve as your virtual Chief Technology Officer. If your business deals with regulatory requirements, such as HIPAA, Sarbanes-Oxley, or PCI, Think can help make sure your business IT solutions meet the requirements of those laws.

Call for a consultation (888-98-THINK) or contact us when you need recommendations, audit or budget planning.

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

T-Cloud Hosted VoIP

March 17th, 2017 Posted by Cloud, Hosted Services, Newsletters, Phone, VoIP 0 thoughts on “T-Cloud Hosted VoIP”

Reduce IT Costs with T-Cloud VoIP Hosted Phones

The business environment in today’s world is always changing. New technologies, developing consumer behaviors, and a wavering economy accentuate this fact. Continual change introduces real and constant challenges for businesses of all sizes, so flexibility is crucial. But flexibility is more than a management mindset. Your infrastructure needs to be flexible too and that includes your phone system. A flexible VoIP phone system should cover and form to fit your current and future needs.

Project a Big-Company Image

With enterprise features like auto attendant, music on-hold, hunt groups and much more!

Cut Your Monthly Phone Bill In Half

Reap enormous savings while improving call quality, reliability and employee productivity.

Benefit Your Business

No software costs. Unlimited local and long-distance calling. 99.9% up-time. Fixed & predictable monthly bill. Starting at $25 per month, per user.

On the Go (ADV Feature)

Using Cisco Jabber, connect iOS and Android Devices to your phone system for the ultimate mobile experience.

Unify Your Employees

Join everyone together wherever they are – at the office, at home or on the road!

Cloud Infrastructure

Managed on our secured Data Center.

Email Integration

Your system will send voicemails to email for easy sharing.

Increase Your Productivity

  • Call Management & Routing
  • Automated Attendant
  • Hunt Groups
  • Visual Voicemail
  • Instant Messaging & Presence
  • Video Conferencing
  • Music on Hold
  • Voicemail to Email

Let’s Get Started!

Call us at 1-888-98-THINK or email us at sales@thinknettech.com. We will answer your questions and prepare a personalized quote for your business.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

CONNECT

FacebookTwitterInstagramLinkedIn

Copyright 2017 Think Network Technologies, LLC. All rights reserved.