OUR RECOMMENDED TECHNOLOGY PLATFORM

RECOMMENDED TECHNOLOGY PLATFORM

There's a myriad of diverse technologies in the world, making it virtually impossible for anyone to stay abreast of them all.

To ensure that we consistently deliver top-tier, rapid, and exceptional service, we are unwavering in our commitment to helping our clients make the most of the technologies we are most passionate about.

We affectionately call this our "Recommended Technology Platform" or "RTP" for short.

Our goal is to have all our clients embrace as much of our RTP as possible.

We maintain an in-depth understanding and provide ongoing training on every aspect of our RTP to ensure that your IT infrastructure remains seamlessly integrated, swiftly supported, and truly world-class.

Furthermore, we practice what we preach by fully integrating every facet of the RTP into our own business operations!

DESKTOPS


Windows Devices

HP, Dell


Vendor Supported Warranty

Windows 10/11 Professional

Tech Guard Antivirus

Tech Guard End Point Backup

Tech Guard Monitor Service

Minimum Specifications:

Intel i5, 16GB RAM, 500GB Drive

Recommended Specifications:

Intel i7, 16GB RAM, 512 SSD

Apple Devices

Vendor Supported Warranty

MacOS High Sierra

Tech Guard Antivirus

Tech Guard End Point Backup

Tech Guard Monitor Service

Minimum Specifications:

Intel i5, 16GB RAM, 500GB Drive

Recommended Specifications:

Intel i7, 16GB RAM, 512 SSD

LAPTOPS

Windows Devices

HP, Asus, Toshiba, Lenovo – not limited too but most brands we will support

Vendor Supported Warranty

Windows 10/11 Professional

Tech Guard Antivirus

Tech Guard End Point Backup

Tech Guard Monitor Service

Minimum Specifications:

Intel i5, 8GB RAM, 500GB Drive

Recommended Specifications:

Intel i7, 16GB RAM, 512 SSD

Apple Devices

Vendor Supported Warranty

MacOS High Sierra

Tech Guard Antivirus

Tech Guard End Point Backup

Tech Guard Monitor Service

Minimum Specifications:

Intel i5, 16GB RAM, 500GB Drive

Recommended Specifications:

Intel i7, 16GB RAM, 512 SSD

SERVERS

Windows Devices

HP, Dell

Vendor Supported Warranty

Windows Server 2012,2016,2019

Tech Guard Antivirus

Tech Guard Server Backup

Tech Guard Monitor Service

Minimum Specifications:

Intel i7, 16GB RAM, 2 X 2TB Drive

Recommended Specifications:

Intel i7, 32GB RAM, 512 SSD, 2X 2TB Drive

NETWORK INFRASTRUCTURE


Routers, Switches and Access Points

Fortinet, Sophos, Ubiquiti

Vendor Supported Warranty

Cabling

Cat 5E or better

CLOUD SERVICES


Email and Collaboration

Office 365 Business Premium

Enterprise E3,

Exchange Online

Sharepoint/Teams

Files in One Drive

Chrome Web Browser

Cloud Hosting

AWS and VMCentral

Melbourne/Sydney Location

Vendor Supported SLA

Web Hosting

Tech Guard Hosting Platform

Managed WordPress

Vendor Supported SLA

INTERNET SERVICES

1-4 Staff on Site

NBN 100MB

Unlimited Data

Less than 200:1 Contention Ratio

5-10 Staff on Site

NBN 100MB - 250MB

Unlimited Data

1:1 Contention Ratio

Vendor Supported SLA

10+ Staff on Site

Fibre or High-Speed Wireless Link

Unlimited Data

1:1 Contention Ratio

Vendor Supported SLA


OUR RECOMMENDED CYBER SECURITY

"BARE MINIMUM REQUIREMENTS"


In today's digital landscape, cybersecurity is not merely an option—it's an absolute necessity.

Protecting your organisation against the ever-evolving threat landscape requires a proactive approach and a set of minimum requirements.

Backups: Regular and comprehensive data backups are your safety net in the event of data loss due to cyberattacks, system failures, or natural disasters. They ensure that critical data can be restored, minimizing downtime and financial loss.

End Point Protection: Securing all devices and endpoints, from computers to mobile devices, is crucial. Endpoint protection solutions safeguard against malware, ransomware, and other threats that can infiltrate your network through various entry points.

Cyber Awareness Training: Your team can be your strongest defense or your weakest link. Cyber awareness training educates your employees about the latest threats, phishing tactics, and safe online practices, reducing the risk of human error leading to security breaches.

Email Protection: Email remains a common vector for cyberattacks. Robust email protection solutions detect and mitigate threats, such as phishing attempts and malware, before they reach your inbox, reducing the risk of falling victim to email-based threats.

These are our bare minimum requirements form the foundation of a strong cybersecurity strategy, helping your organisation to proactively defend against threats and minimise the impact of potential cyber incidents.

Cybersecurity is no longer a choice—it's a vital element of business continuity and client trust in the digital age.

So any clients we take on need to ensure these 5 pillars of Cyber Security are the bare mimimum they invest into their business. There are many more layers which we will go through in our Discovery Session and Cyber Risk Assessments for your business.


THIRD PARTY VENDORS

We are proud of our troubleshooting and communications skills and ability to solve diverse technical problems.

For a technology that is out of scope within our RTP, it may take us extra time to familiarise ourselves with managing and supporting them.

Usually, these issues can and are often supported by a 3rd party vendor, and we may help you liaise with the vendor directly on your behalf to get the problem solved effectively and quickly.

With purchasing out of scope 3rd Party Vendor products, we may be able to buy items subject to availability. If any unforeseen problems are encountered during setup or ongoing maintenance, we will need to invoice you for this time.

Tech Guard

SUPPORT

Get Support
Support FAQ
IT Helpdesk
IT Knowledgebase
IT Procurement