Frequently Asked Questions

FAQ

Manage it service

What is a managed IT service provider?

A managed IT service provider is a professional IT organization that contracts with you to maintain the operational health of your business’s computer network infrastructure by following a planned approach to managing the needs of your IT systems.

What does a managed IT service provider do?

A managed IT service provider is an external company that is responsible for providing IT services to your business by proactively working to maintain the technology in your business. Some of the offered services include remote IT support, creating IT disaster recovery plans, and developing business continuity solutions.

Why choose managed IT services for your business?

Managed IT services can be a productive way to run your business and can provide a proactive path to keeping your computer network and infrastructure running smoothly with minimal interruptions.

What are the benefits of managed IT services?

One of the primary benefits of working with a managed IT services provider is the IT cost reduction in your business. Working with an MSP improves your business operations by letting your staff focus on their work instead of dealing with unnecessary IT issues. Managed IT service providers anticipate problems before they happen for a low, predictable, ongoing fee.

What kind of companies are good candidates for managed IT services?

Businesses of all sizes and in all industries use managed IT services for a variety of reasons. Some small to medium-sized companies use managed IT to provide full IT services so they can focus on their core business and maintain operational cost control.

Larger businesses may use managed IT services to augment the in-house IT staff, having the managed IT service provider handle the more day to day tasks and freeing up resources to complete more strategic projects.

Break/Fix Vs. Managed IT: What’s the difference?

Break/Fix solutions are when IT problems are figured out after a problem has occurred, therefore it is a reactive way of managing IT needs.

Managed IT is a proactive approach to business IT that makes it possible to find issues before they become problems. Managed IT figures out what areas are vulnerable and fixes them before a larger problem occurs.

What is the difference between managed IT services and outsourcing?

Outsourcing means sourcing services or products from a third party without them managing the supplied solutions on your behalf, which sometimes means you may need to hire and maintain a team of in-house professionals to look after everything.

Managed IT services, the third party supplies and operates the service with no need for an in-house team.

What industries do you work with?

We’re proud to have customers in many industries, including small businesses, retail, legal firms, healthcare, dental practices, professional services, wholesale, manufacturing, financial, hospitality, and many more!

Why do I need a disaster recovery plan?

There is one question you should ask yourself when determining whether your business needs a disaster recovery plan, “Can my business continue to function without my critical data, applications, and operations?”

Managed IT solutions are more cost effective and available than you might think, from simple offsite backups to application failover, Ighty Support can advise your business on a solution to match your needs.

What is infrastructure as a service?

Infrastructure as a service is a way of obtaining cloud infrastructure (servers, storage, and networking) in an on-demand, elastic way and in a pay-as-you-go model. Customers can execute their workloads in a flexible, scalable environment without the need to obtain and operate physical infrastructure.

Why choose Ighty Support as your managed IT service provider?

Reputable. Our IT support specialists are certified and experienced in bringing the best business IT support to Dallas since 2011. Our proudest accomplishment is the large number of long-term clients who trust our IT services year after year. See What Our Clients Are Saying!

Experienced. We hire seasoned, professional technicians with at least 5-10 years’ experience and usually many more. We provide our certified techs with continuing education opportunities on a regular basis to allow them to stay current with the latest technology.

Immediate Response. Whenever possible, our IT specialist can log into your PC or server remotely and resolve many issues immediately without having a technician travel to your location.

One-Stop-Shop. We handle ALL aspects of your IT infrastructure including hardware and software management. We focus on your IT so you can focus on your business.

Comprehensive Project Management. Our extensive experience managing all types of complex projects means we will handle every detail so you can rest assured that your project will be completed on time and on budget.

100% Satisfaction. We want you to be completely satisfied with our services and will do whatever it takes to make you happy.

How can I get more information on Managed IT services offered by Ighty Support?

Visit us at Www.Ightysupport.Com or give us a call toll-free at 1-855-MY DFWTECH for a free initial consultation.

STRUCTURED CABLING

What does structured cabling refer to?

A network cabling system that is designed and installed according to the pre-set standards of EIA/TIA 568

Why use structured cabling?

Many businesses have at some point felt the pain of IT failure. Preventative disaster control can be achieved with a correctly labeled and wired wiring rack. With an accurately installed IT system, current and future requirements can accept new hardware that will be required for your business’s growing needs.

How can structured cabling help?

Makes future upgrades easier, increases flexibility in adding and removing devices, less downtime, built to code, and looks organized.

Is structured cabling required?

Structured cabling connects individual devices together within a centralized IT infrastructure. A division of data and equipment into individual sockets makes it easy to streamline your network IT infrastructure.

At what stage should I consider structured cabling?

A network cabling installation brings benefits at any stage. Ideally, however, the benefits are maximized when the installation is in the planning phase.

Why should I consider structured cabling at all?

A properly installed and well-thought out network cabling system is essential in the underlying structure of all communication requirements. It will allow your business to support a range of applications and allow for change and growth with ease and at a lower cost.

Structured cabling is designed to alleviate workflow disruption and network downtime associated with office restructuring.

Cat5 vs Cat5e cable, which is better?

The bandwidth of a Cat5 cable is 100MHZ while the bandwidth of a Cat5e is 350MHZ, which allows Gigabit Ethernet (1000BASE-T) to be carried through the Cat5e cable.

What is the difference between a Cat5e and a Cat6 Cable?

Cat5e is 100baseT and Cat6 is for a GIG network

What is the primary color code for Cat5e wiring?

White, blue, white orange, white green, and white brown

What does LAN stand for on a network?

Local area network

What is a LAN connection?

A LAN connection is a data communication network infrastructure that connects PCs and other devices within a single building or office area.

What does WAN stand for on a network?

Wide area network

What does VPN stand for on a network?

  • Virtual private network

What are network devices?

Electronic devices that can broadcast network data, route data to its destination, or boost signal strength.

What are the advantages of cabled networks (LAN)?

Cabled networks have a more secure infrastructure and are faster and easier to configure than wireless networks.

How much does structured cabling cost?

Ighty Support has the best pricing for cabling material including wires, jacks, and other day to day products which allows us to give you the best price on installation services.

Do you provide ongoing maintenance?

Yes, we provide ongoing maintenance and support services once the project is completed.

How can I get more information on Structured Cabling services offered by Ighty Support?

Visit us at Www.Ightysupport.Com or give us a call toll-free at 1-855-MY DFWTECH for a free initial consultation.

security

How do security cameras work?

Security cameras come in two types: Analog or IP. Analog systems are generally less expensive than IP cameras because, with an IP camera, the DVR function is included in the camera itself, whereas with an analog camera, an external DVR must be connected.

Is a security camera system affordable for a small business?

We believe small businesses are some of our best clients because small business owners appreciate the value of the additional management control and loss prevention that our security camera systems provide.

What is CCTV?

CCTV (Closed Circuit Television) is a visual surveillance system designed to monitor a variety of environments and activities.

What parts do I need?

Camera body, lens, mounting bracket, and an AC adapter are the basic parts to produce the video. You can add a high res monitor, DVR, and other accessories. You can also choose to go the wireless way and avoid cabling.

What is a Digital Video Recorder (DVR) and how does it work?

A DVR displays live video footage from multiple camera sources simultaneously and records them on a hard disk. You can search and review any recorded video based on date, time, camera, events, etc.

How many videos can a DVR store?

Since the DVR uses the hard disk as the recording medium, the length of recording depends on many factors, including hard disk size, recording frame rates, recording picture size, number of cameras, picture quality, and compression algorithms used. The DVR is usually set to “overwrite” mode and will write over old video when the hard disk is full.

Which types of cameras are compatible with a DVR system?

DVR systems can be configured to work with various cameras but compatibility should still be checked first. Some DVR systems are compatible with wired cameras while others are compatible with wireless ones.

What is an NVR system?

An NVR, or Network video recorder, records images on a network based system.

What kind of internet connection do I need to enable monitoring over the internet?

Generally, any type of broadband or high-speed internet connection will work fine.

How much do I need to invest in a typical security surveillance system

The investment required depends on your business’s needs and requirements, as well as the types of cameras used, DVR, and installation on site. We offer systems ranging from entry-level to high end.

What is an analog security camera?

Analog security systems use a wired transmitter or wired configuration to send images to a receiver. Having an analog system requires running a wire between the camera and the monitor, along with a coaxial cable to send the data. Even though analog systems are cheaper than digital, they are much less convenient because they are distance limited.

What is an IP camera?

IP stands for Internet Protocol. An IP camera is a digital video system that can transmit data over a network. These systems work with mobile devices so that you can view your security feed from anywhere with an internet connection.

Do you offer wireless security cameras?

Yes, although we do recommend only getting wireless cameras when you cannot use wired ones in your facility.

What is the range of a wireless camera?

About 600-700 feet via 2.4 GHz and 5.8 GHz ranges. Transmitters send the data out over wireless signals which are then picked up by receivers.

Will outdoor cameras get damaged by climate and weather?

No, exterior cameras are constructed with durable materials that are resistant to heat, snow, rain, and ice.

What are the advantages of having surveillance cameras at your business?

CCTV cameras can protect employees from criminals as well as discouraging criminal activity. Surveillance cameras can also increase employee productivity by discouraging unnecessary downtime

Which surveillance solution is suitable for my business?

We offer many types of surveillance solutions, such as analog and IP cameras. Based on your business’s needs, requirements, and budget, Ighty Support will recommend the most appropriate security solution for your facility.

How can I get more information on Security Camera services offered by Ighty Support?

Visit us at Www.Ightysupport.Com or give us a call toll-free at 1-855-MY DFWTECH for a free initial consultation.

Access Control

What is Access Control?

Access control refers to a system that is used to permit access to authorized people and deny unauthorized entry. It is typically used by employers to secure their facilities. Some of the access control systems we offer are maglocks, electric strikes, cloud-based controlled entry, and biometric readers.

Why should my business use access control?

Access control systems provide a range of solutions to businesses that need to control who accesses their systems by providing added security, such as electronic keys. An advantage of having an access control system includes controlling the days and times each user is able to access the facility.

How are access control systems installed?

Access control systems begin with a consultation with us at Ighty Support. Hardware will be needed for physical access systems, such as card or fob readers, door switches, and control panels. The control panel is integral to the system and controls all the different access points of the building.

Access control systems can grow with your business by simply integrating new control panels with your facility’s growth.

Do access control systems work when the power is out?

Yes. Our systems have battery backup plans for emergencies that keep your access control system functioning for the length of the battery backup.

What is the most secure access control system for doors?

Access control systems cover a range of door control readers, some of which use a pin or a card to gain entry. The more advanced and secure level systems use biometrics, which use facial recognition or fingerprints to enter facilities.

What is physical access control?

Physical access control is the enforcement on how an individual gains access to and from a facility. This is done by assigning credentials (cards, fobs, fingerprint, mobile, etc), which identifies the user, and in turn, authorizes whether they have permission to enter.

What is a biometric access control system?

Biometric access control uses technology such as facial recognition, fingerprint readers, or other biometrics that identify a person. These readers are more secure than a card or pin reader because a person’s physical biometric attributes are all unique.

What is cloud based access control?

Cloud based access control allows you to remotely manage building security and removes the need for onsite servers and dedicated IT resources. Information is stored and managed by a third-party provider using a much larger network, such as the internet.

Should you use on-premise or cloud-based access control software?

This will depend on your business’s needs and requirements. If you would like to be able to manage your door access from anywhere, including a mobile app, then the cloud-based solution is a good choice. The on-premise door access solution is better if you’re concerned about sending your personal information off-site.

What happens if an access card is lost or stolen?

Once a card is lost or stolen, it can be rendered useless by having access revoked in the central database. The access control system can also tell when and where the card had been used to attempt access.

What are the options for locks?

Locks are a vital part of keeping your business secure as your access control is only as good as your lock system. There are different locks we offer depending on your business’s needs, such as maglocks, electric strikes, and cloud-based controlled entry.

How do I decide what I need from an access control solution?

When deciding how to choose your access control system, think of the following:

  • Review past security incidents and identify weaknesses that led to the incident.
  • Identify causes for concern to determine functions you would like to better manage.
  • Figure out what operational inefficiencies you need to solve.
  • Outline your desired outcomes.
  • Prioritize what you need.
  • Scope the project and number of doors you need to secure.

How can I get more information on Access Control services offered by Ighty Support?

Visit us at Www.Ightysupport.Com or give us a call toll-free at 1-855-MY DFWTECH for a free initial consultation.

Supporting Our Community

Giving back for August- Empowering Women: Ighty Support Supports I Can Still Shine

For the month of August, Ighty Support is proud to...
Read More

Ighty Support’s July Giving Back Initiative: Celebrating Back To School

This July, we are proud to announce our "Giving Back"...
Read More

Giving back for June – Helping institutionalized children find families

This June, Ighty Support is proud to announce our partnership...
Read More

Ighty Support’s Monthly Contributions to UNICEF

To improve humanitarian efforts, Ighty Support aims to make generous...
Read More

Ighty Support’s May Efforts for Hope Supply Co

In the month of May, Ighty Support contributed to crucial...
Read More

Ighty Support’s Commitment to Protecting Vulnerable Children

For the month of April, Ighty Support is proud to...
Read More

Ighty Support’s March Initiative with Texas Women’s Foundation

In the vibrant month of March, Ighty Support proudly continues...
Read More

Giving Back with Heart: Ighty Support’s February Focus on the Autism Treatment Center

In the spirit of compassion and community support, Ighty Support...
Read More

Ighty Support’s Pledge to Children’s Health and Education

Ighty Support is embarking on a mission to bring joy...
Read More

Spreading Holiday Cheer: Ighty Support’s Contribution to the Salvation Army Angel Tree Program

For December, Ighty Support is proud to embrace the spirit...
Read More

Warmth and Kindness: Ighty Support’s November Initiative for Kyle’s Place

As the leaves turn and the air grows crisper, our...
Read More

Ighty Support: Lighting Up Lives This October

This October, Ighty Support proudly announces two significant collaborations that...
Read More

September Give Back: Supporting UNICEF in Aiding Earthquake Victims in Morocco and Flood Victims in Syria

In the spirit of compassion and community, this September, we...
Read More

Giving Back for the Month of August

For the month of August, Ighty Support proudly took a...
Read More

Giving Back for the Month of July 

For the month of July, Ighty Support is assisting students...
Read More

Giving Back for the Month of June – Summer Giveaways

As the summer season comes into full swing, our team...
Read More

Giving Back for the Month of May – Fallen Patriots

For the Month of May, Ighty Support remembers the troops...
Read More

Giving back for the Month of April – Newman High School

For April’s Giving Back, Ighty Support is providing caps and...
Read More

Giving back March Cumberland Youth and Family Service

Cumberland Youth and Family Service have embraced the notion of...
Read More

February Give Back: Earthquake Relief

For our February Give Back, we are motivated to help...
Read More

Contact Us

We would be happy to discuss your IT needs. Fill the form below and we will get back with you at the earliest

Texas Department of Public Safety License Number: #B19875

Get in Touch