Are you wondering whether your business could benefit from moving to the cloud? We have years of experience in successful migration practices, and can help you make an informed decision.
Need help managing your on-site I.T.? Let inTech be your Managed I.T. Services Partner. We provide on-site I.T. and help desk services for small to medium-sized business throughout the Seattle and Portland metropolitan areas.
Web Site Design & Application Development
We work with companies to develop custom websites, applications and reporting solutions to make internal processes efficient and cost-effective. Contact us today to see how we can help your company become more efficient.
It is mind-boggling to see business operators make crucial decisions without the appropriate data. We take the mystery out of decision making with our dashboards and custom reporting.
We have worked with many companies to migrate their critical data and applications to newer hardware, a virtualized environment or even to the cloud. Contact us for a consultation.
Disaster Recovery & Business Continuity
We understand you are busy. Allow us to create, implement and monitor your DR and business continuity strategies, allowing you to focus on your business.
Is your plate full? Let us manage your projects and help to ensure they are completed effectively and efficiently. Contact us for more details.
We integrate ourselves into your business
We don't see ourselves as a vendor, we become part of our clients' organization.
We are constantly evoloving
We are always researching and developing better products and experiences for our clients.
We are focused on moving beyond break-fix issues
We are focused on using technology to solve your business needs.
Meet our Leadership team
Recent Blog posts
We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms[…]
MIT Rivals Tor What is Tor? Tor is free software for enabling anonymous communication over the internet. It stands for “The Onion Router,” based on the original software project name, which is further based off the type of routing it uses; onion routing. We will get in to that later. It is a web[…]
The Current Landscape Right now, everything you do over any type of network is based on three types of cryptography, made popular in the 70s. You have RSA, Diffie-Hellman key exchange, and Elliptic Curve technology. These are all based on mathematical problems that are easy to solve, but hard to reverse. For example, a[…]
With the current direction the industry is heading, more and more IT environments are moving to cloud solutions. This means you need to use additional tools to keep your cloud and on-premise environments in sync to create a true Single Sign-On solution. In this article, we will be reviewing sync features of one specific tool[…]
The Basics of Security In any environment, the security system is only as strong as its weakest link. Why would you have a state of the art firewall if you just left the root admin password as default? Why would you lock down your network shares, only to share out account passwords? Why would[…]
So you pay your employees to collect, input, process, correlate, audit and otherwise wrangle the data that drives your business. You’ve paid a small fortune for a line-of-business application to structure and hold all this data and guide your business processes. You’ve invested a great deal of time and energy in implementing all of this[…]
Business process automation (BPA) is a way to manage information, processes, and data with technology in order to reduce costs for a business. Because of its success in many enterprises, BPA is a growing market. There are many ways to make money or reduce spending using BPA, including through the following five business process automation[…]
Secure your hardware Securing your hardware is an often overlooked and simple step you can take to secure your network. The best firewalls and anti-virus systems are rendered useless if burglars steal your equipment, servers, laptops, and mobile phones. Lock your servers and related equipment behind a locked door and secure them with server racks.[…]
We are always on the lookout for new talent, and as manager of our services team I interview a lot of candidates. Some are just starting their career, some are working on a second or third career, and some, like me, have spent years in corporate IT and are looking for a change or a[…]
Remember that Sunday morning we set our clocks FORWARD by one hour! Daylight savings has to do with energy savings. Remember, this Sunday on March the 13th, “Spring Forward” into the new year and set your clocks forward an hour. Technically, it’s 2am on Sunday, so if you have an early morning– be sure to account[…]