Powerful dedicated cloud workspaces for your remote workers & workloads. We configure your server, correlate & migrate your data into assisting staff in connecting to their remote workspaces.
Cloud Workspaces are Fully Managed Environments where user / group management, policies, permissions, application access rights, firewall entries, software installations & operating system updates are all catered for in the service. We handle all the backup requirements with Fully Managed Backups which are customisable according to data selection, desired retention policies & location.
Microsoft Windows Server license for 2019 or 2016.
The appropriate number of Remote Desktop Protocol (RDP) Licenses for all remote users / devices.
Full suite of enterprise applications for all users.
File security, IDS, web & email scanning ensure a safe environment.
Versioning & syncing of files to an encrypted remote storage facility.
Customisable local & remote backup strategies.
Always available to assist in support queries, with fast response times.
Data is packaged into encrypted containers & transported to their destination via secure tunnels.
User devices & environments are secured & the necessary information is correlated.
Shares are configured as required for your user & server configuration.
Word, Excel, PowerPoint, Outlook, Microsoft Teams & OneDrive
You can choose between Johannesburg or Cape Town as a deployment locations.
Your order enters the provisioning phase & we open up communications in gather the required user information, establish the contacts for data access in preparation for the migration / configuration phase.
Primary storage will be housed at deployment location. Local backups are all stored or replicated between the two primary locations within South Africa. Cloud Storage is stored & replicated in Cape Town. Remote backups are stored in the Netherlands under GDPR polices in the EU.
Absolutely, all data is subject to at minimum one layer of encryption or up to 3 layers depending on the associated service or feature. Additionally all transportation of data is done through secure connections.