Simple & Effective IT Support
No matter your business size, we have a plan that's perfect for you and your team!
Everything you need to make sure your IT equipment keeps working and stays secure!
Are You Protected From a Data Breach?

Think cybercriminals only target big companies?

More than 75% of data breaches target small and medium sized businesses, and that can result in both financial and reputation costs to your company.

  • Protect your network with VPNs, firewalls, vulnerability scans, penetration tests and more.
  • Secure your devices by identifying, tracking and encrypting the devices used by your employees, including laptops, tablets, smartphones and USB drives.
  • Track and log visitors and limit access.
  • Create clear policies.
  • Locate, understand and limit where your sensitive data is stored.

Let us help you protect your business and data.

Can Your Employees Protect Your Data?

Do your employees know:

  • How to identify phishing emails and websites?
  • Not to send private information in emails?
  • How to protect portable media?
  • The importance of using strong passwords?
  • Not to share their passwords?
  • The dangers of posting personal information on social media?
  • The risks of using personal devices with company data?

Commons sense, right?

You'll be surprised how many employees don't know or practice these simple, basic cybersecurity procedures.

Patented Keystroke Encryption Software

Smarter Cybersecurity

Keystroke encryption outsmarts cybercriminals by encrypting your keystroke data from the point of origin — your keyboard — and delivering it safely and securely to your browser or desktop. When you type, keyloggers see only the meaningless sequence of numbers.

  • Works on PC and Mac
  • Won't slow down your computer
  • Patented, built and supported in the US
  • Protects against kernel- and desktop-based keyloggers
A new path to foiling cyberthieves

Keystroke encryption stops malicious keylogging programs by encrypting keystroke data and routing it directly to your internet browser or desktop through a secure pathway that’s invisible to keyloggers.

Traditional keystroke data flows through a series of steps before it appears on your monitor. Hidden in these steps is an area of vulnerability where cyber criminals try to take advantage using keylogging spyware. Keystroke encryption bypasses the places keyloggers can reside, helping to eliminate your vulnerability to attack. As a second level of security, keystroke encryption protects the pathway it creates with a military-grade 256-bit encryption code.

Keystroke encryption also sends out a sequence of meaningless numbers in place of your keystrokes, making any data collected by hackers completely useless.

Keystroke encryption eliminates your vulnerability to data theft due to keylogging attacks, a leading cause of cyber crime. Unlike anti-virus and anti-malware software, we protect your data from both known and unknown keylogger threats.

Patented anti-keylogging technology secures your sensitive personal and financial information by proactively encrypting every keystroke as you type. We also provide advanced anti-clickjacking and anti-screen capture technology, for multiple layers of protection from cyber attacks.

Keystroke encryption
controls your keyboard at the lowest layer in the kernel to guard against existing and new, “zero day” keyloggers.

Anti-clickjacking
detects and highlights hidden clickjacking attacks, warning you away from clicking on malicious invisible objects embedded in legitimate web pages.

Anti-screen capture
prevents screen scraping malware from taking screenshots of your information surreptitiously.

CryptoLens 
visual verification shows you that we are protecting your input by highlighting what you type in a color you select. (Currently available for Internet Explorer.)

Malicious driver monitoring 
works as a constant anti-subversive service, detecting untrusted drivers, such as keyloggers, and displaying a warning containing the name of any suspect driver.

Full protection 
includes USB, wireless, PS2 and Bluetooth keyboards; can encrypt all international keyboards.

What’ve you got to lose… without keystroke encryption?

Online Banking

Each time you log into online banking,
hackers can steal your usernames,
passwords and account details.

Credit Card Info

As you shop online, even a secure
browser can’t protect your credit card
information from keystroke loggers.

Personal Security

Whenever you type your Social Security number or other personally identifying information (PII), you’re exposed to identity theft.

Personal Health Info

Your personal health information is extremely valuable to hackers, who can sell it to the highest bidder.

Email & Word Processing

Cyber criminals with keylogging software can steal everything you type in emails and documents.

Encrypted Data Backup and Secure File Sync
How It Works and What's Included

Multi-Device Support / Convenient File Sharing / Highly Secure

What Do Most Businesses and Their Teams NEED?
  • File Sync & Backup That's 3.5x MORE SECURE than your typical BANK. Exceeds HIPAA.
  • Unlimited & Automatic Version Control and Revisions to Files
  • Activity Tracking - Know Who Accessed Your Files and/or Folders.
  • Productivity boosting features available in today’s consumer grade solutions (i.e. Dropbox, Google Drive, Microsoft OneDrive)
The Business
Owner's
Dilemma

What They Need

  • Boost employee productivity
  • Improved moral
  • Files on the go
  • Work from anywhere
  • Data access from all devices

Their Constraints

  • Data Loss
  • Data Theft
  • Lawsuits
  • Security/HIPAA/Compliance violations

Power up your business with the most secure, compliant cloud storage solution available

  • Individual License for each user in your team
  • Up to 1TB of space. Simply Change Quantity for more storage in increments of 1TB.
  • Unlimited file recovery and versioning
  • Managed file sharing for internal/external parties
  • Multiple folder backup (Documents, Desktop, Pictures, etc.)
  • Granular user-access and security controls - Set strict usage and access policies at company and user levels.
  • Infinite Revision Capture - Restore deleted or changed files from as far back as you need.
  • Data storage to any data store type (NAS, on-site server, remote server etc.)
  • Universal file access; sync across stationary and mobile devices
  • Active Directory integration
  • Revised file backupWindows, OSX, and Linux agents
  • Rapid deployment (10-minute server setup, 5-minute onboarding)
  • Continuous, real-time backup
  • Custom deleted file retention periods

Ownership and visibility through an intuitive central dashboard

  • Centrally administered, multi-tenant dashboard
  • Comprehensive usage reportsUnlimited user scale
  • Agent, web, and mobile applications (iOS, Android) - Freedom to access files from anywhere.
  • Smart alerting system for data usage 

Exceed industry standards with professional-grade security

  • 448-bit Blowfish encryption, on device and in-transit
  • Encryption key management
  • Remote wipes of desktops and devices
Patented Multi-Layered Website Filtering
Security Beyond the Firewall

WEB FILTERING
Umbrella lets you manage the Internet experience on and off your network with acceptable use or compliance policies, putting you in control.

Manage flexible, location-aware policies with Umbrella’s 60 content categories and an unlimited number of custom block or allow lists. Laptops can be assigned policies with different Internet access restrictions and logging settings based on whether they’re on or off your network. Umbrella informs end-users of the policy with branded, customizable block pages, and offers a feature that enables approved, delegated users to bypass these pages.

Compliance

Umbrella enables you to customize our category-based filtering to meet each network’s specific needs, particularly to help you meet compliance requirements. Quickly create exceptions to allow or block specific domains, regardless of whether it is in a category that is allowed or blocked. Our 60+ content categories empower you to enforce acceptable Web use to comply with internal policies or external regulations such as CIPA. We are also a member of the Internet Watch Foundation (IWF), enabling you to block their list of child sexual abuse.

Block Page Bypass
Block Page Bypass lets you grant special permission to circumvent filtering settings without the use of any software or appliance. This feature enables you to assign individual users, such as your marketing managers, the ability to access specific filtering categories, such as social networking, or individual domains that are normally blocked on your network. Bypass privileges can be granted persistently on a per-user basis or through use of a bypass code, which grants access for timeframes ranging from one hour to 10 years.

Category-Based Filtering

Umbrella’s 60+ content categories cover millions of domains (and billions of Web pages) to give you control over which sites can be accessed by users on your network. The easy-to-use, cloud-delivered administration console enables you to quickly set up, manage, and test different acceptable use policies per network, group, user, device or IP address, giving you greater control of your organization’s Internet usage.

Whitelists and Blacklists
Whitelisting domains ensures that you can always access particular site, even if it is in a category that is being blocked. Blacklists operate in the opposite fashion by ensuring that a site on the blacklist is never accessible to your users. Umbrella customers can have unlimited entries in their whitelist and blacklist to accommodate their specific business needs.

Whitelist-Only
Umbrella’s Whitelist-Only feature is best used for networks where Internet access should be restricted to specific domains. This allows for a “locked-down” and controlled Internet environment.

Don't Hire an IT Guy or IT Department!

In most cases, it is not cost-effective for companies with under 250 employees to hire a full-time IT person, because you can outsource this function of your business far cheaper and with a lot less work; but you DO want to hire a professional to perform basic maintenance just as you would hire an attorney to handle your legal matters or an accountant to prepare your taxes.

Save yourself the trouble of paying salary, payroll taxes, insurance and any other hiring expense and simply outsource your IT to us!  We have the experience and expertise to take care of you.  

Expert, high integrity

 I have seen Craig grow his business from when he first started with us as our IT Consultant. He is great person all around. Easy to work with, very conscientious on his work, and always willing to help. He has worked extremely hard and I’m glad to see the rewards of his hard work with his company expanding and thriving. His Top qualities are: Great Results, Expert, High Integrity.

Carl Anderson Fred Anderson Toyota Raleigh, NC

Pleasure to work with

Craig is an absolute professional and a great pleasure to work with. I would highly recommend Petronella Computer Consultants and constantly receive positive feed back on Craig and his company.

Joseph Roglieri SMB Sales Associate Software House International

Generous, technically rich

Very few of my clients have turned out to be such generous, technically rich and helpful. “Craig is one of my early clients when I started freelancing. Very few of my clients have turned out to be such generous, technically rich and helpful. He can get the work done from a person without unnecessarily putting pressure. Always enjoy working with Craig.

Imranul Hoque Team Leader EVOKNOW, Inc

IT at its best

IT at it’s best! Craig is an expert in the area of computers, web, and google analytics. He has a passion to help people realize their market- ing potential throught the web, and has the experience and knowledge to make it happen.

Michael Sink Business Coach AdviCoach®

Great results, personable

Great Results, Personable, High Integrity Craig worked with me on designing a computer system for the company I am in the process of creating. He truly understands the products he represents. I would highly recommend his company.

Steve Baade Raleigh, NC

Innovative style

Craig’s vision and innovative style lead to a robust and stable platform for enterprise customers. In developing BulletProof PC, Craig’s vision and innovative style lead to a robust and stable platform for enterprise customers. The development consisted of providing the highest value that could be obtained while retaining security, up-to-date-technology, and future oriented product offerings.

Mahesh Kommareddi Contract Developer Independent

Quick response

We appreciated the quick response time and excellent follow-up. We recommend them very highly. We are extremely pleased with Petronella Computer Consultants. Our experiences working with Craig have always been excellent. You and your firm are able to diagnose and correct the problems very quickly and professionally. We appreciated the quick response time and xcellent follow-up. We recommend them very highly.

Marshall’s Locksmith Service Raleigh, NC

Great service and value

Craig is a wonderful partner who follows through with great service and good value. Craig is a wonderful partner who follows through with great service and good value. His knowledge of systems sets him apart from anybody else.

Nicholas Smith Southeastern Managing Director Winmark Capital

Courteous and helpful

Craig and his staff are courteous and helpful no matter what the situation may be in our office. They always respond quickly and with a patient and positive mind frame in order to use their IT Support knowledge to best meet our computer needs.

S.R. Thomas, Inc.

Solid technical knowledge

Solid technical knowledge and professionalism. I have come to know Craig in the business community and he is very knowledgeable and professional. He is also very responsive to questions. I can see that he has a strong desire to provide the best possible IT services. I would highly recommend his company.

Chris Duffus Raleigh, NC

Best Computer Support

Best Computer Support I was looking for computer support, computer maintenance, computer assistance and computer repair several years ago and Petronella Computer Consultants was recommended. I have not looked further for a computer consultant or computer support firm. Petronella Computer Consultants has answered my every computer support need around the clock. Competent smart recommendations has been Petronella Computer Consultants hallmark. I would recommend this company to and business or individual looking for excellent computer support services. No job seems to big or too small for Petronella Computer Consultants.

James Crouse Crouse Law Offices Raleigh, NC
Comparing Apples To Apples

Before you can accurately compare the fees, services and deliverables of one IT services company to another, you need to understand the 3 predominant service models most of these companies fit within. Some companies offer a blend of all 3, while others are strict about offering only one service plan. The 3 predominant service models are:

  • Time and Materials. In the industry, we call this “break-fix” services. Essentially you pay an agreed-upon hourly rate for a technician to “fix” your problem when something “breaks.” Under this model, you might be able to negotiate a discount based on buying a block of hours. The scope of work may be simply to resolve a specific problem (like removing a virus), or it may encompass a large project like a computer network upgrade or move that has a specific result and end date clarified. Some companies will offer staff augmentation and placement under this model as well.
  • Managed IT Services. This is a model where the IT services company takes the role of your “IT department” and not only installs and supports all the devices and PCs that connect to your server(s), but also offers phone and on-site support, antivirus, security, backup and a host of other services to monitor and maintain the health, speed, performance and security of your computer network.
  • Software Vendor-Supplied IT Services. Many software companies will offer IT support for their customers in the form of a help desk or remote support for an additional fee. However, these are typically scaled-back services, limited to troubleshooting their specific application and NOT your entire computer network and all the applications and devices connected to it. If your problem resides outside of their specific software or the server it’s hosted on, they can’t help you and will often refer you to “your IT department.” While it’s often a good idea to buy some basic-level support package with a critical software application you use to run your business, this is not enough to provide the full IT services and support most businesses need to stay up and running.

When looking to outsource your IT support, the two service models you are most likely to end up having to choose between are the “managed IT services” and “break-fix” models. Therefore, let’s dive into the pros and cons of these two options, and then the typical fee structure for both.

Why Regular Monitoring And Maintenance Is Critical For Today’s Computer Networks

The fact of the matter is, computer networks absolutely, positively need ongoing maintenance and monitoring to stay secure. The ever-increasing dependency we have on IT systems and the data they hold — not to mention the type of data we’re now saving digitally — has given rise to very smart and sophisticated cybercrime organizations and who work around the clock to do one thing: compromise your networks for illegal activities.

In most cases their intent is to access financial information and passwords to rob you (or your clients), create fake identities for credit card fraud, etc. In other cases they may want to use your computer network to send illegal spam, host pirated software, spread viruses, etc. And some do it just for the “fun” of being able to make computer systems inoperable. These criminals work around the clock in teams, constantly finding and inventing new ways to get around your antivirus software and firewalls; that’s why you have to remain ever vigilant against their attacks. 

Of course, this doesn’t even take into consideration other common “disasters” such as rogue employees, lost devices, hardware failures (which are the #1 reason for data loss), fire and natural disasters and a host of other issues that can interrupt or outright destroy your IT infrastructure and the data it holds. Then there’s regulatory compliance for any business hosting or touching credit card or financial information, medical records and even client contact information such as e-mail addresses.

Preventing these problems and keeping your systems up and running (which is what managed IT services is all about) is a LOT less expensive and damaging to your organization than waiting until one of these things happens and then paying for emergency IT services to restore your systems to working order (break-fix).

Managed IT Services Vs. Break-Fix: Which Is The Better, More Cost-Effective Option?

You’ve probably heard the famous Benjamin Franklin quote, “An ounce of prevention is worth a pound of cure.” I couldn’t agree more — and that’s why it’s my sincere belief that the managed IT approach is, by far, the most cost-effective, smartest option for any small business. The only time I would recommend a “time and materials” approach is when you already have a competent IT person or team proactively managing your computer network and simply have a specific IT project to complete that your current in- house IT team doesn’t have the time or expertise to implement (such as a network upgrade, installing a backup solution, etc.). Outside of that specific scenario, I do not think the break-fix approach is a good idea for general IT support for one very important, fundamental reason: you’ll ultimately end up paying for a pound of “cure” for problems that could have easily been avoided with an “ounce” of prevention.

STANDARD
  • Hardware and Server Audits
  • LogMeIn Pro License
  • Ticket-based Workflow
  • Ticket escalation with steps to resolution
  • Security Patches
  • Managed Antivirus
  • Remote restart of services by NOC
  • Hardware and Software Audits
  • Performance & Preventative Maintenance Reports
  • Webroot Antivirus License
  • Malwarebytes Anti-Malware Pro License
  • Web-based management portal
  • Desktop performance monitoring
  • Administrative scripting
  • Policy Management
  • Client Communicator with Self-Help Knowledgebase

Responsive, Professional

Petronella Computer Consultants is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. Preston Development Company has been working with Craig and his team for more than 7 years for all of our company’s computer, network and IT Sup- port needs in-house as well as for off-site offices. Everyone at Petronella Computer Consultants is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. Our confidence level has allowed us to recommend Petronella Computer Consultants to long time business partners and associates.

Preston Development Company
ELITE

With our Elite package, you get everything from the Standard package PLUS:

  • Scheduled Security Patch Deployment
  • NOC resolution of Security Patch Failures
  • Full remote problem resolution by NOC
  • Discounted Project Services
  • Proactive or on-demand server restart
  • Active Directory Group Policy Troubleshooting
  • System performance analysis & troubleshooting
  • Microsoft Exchange health check & defragmentation
  • Microsoft Service Pack installation
  • US-based End-Client Help Desk
  • Personalized Answering
  • Windows, Mac & Mobile Support
  • Administrative Tasks
  • Virus & Malware Removal
  • Software Installations

Professional and Knowledgeable

I would recommend him to any client who is looking for any IT help for their organization. I have worked with Craig with implementation of EMR (Electronic Medical Records) in the Durham area. He is extremely professional and very knowledgable with the current technologies. He ensured that we never had any issues with the IT infrastructure at the practice and that was one of the primary reasons that the implementation went smoothly. He scored high points with his client and us with his professionalism and knowledge and I would recommend him to any client who is looking for any IT help for their organization.

Jaimin Anandjiwala Director of Enterprise Business Division eClinicalWorks
Copyright 2017 Petronella Technology Group, Inc.
All Rights Reserved.
Privacy Policy