Our Services
Network Solutions
We offer professional network solutions which suit your company needs. Our engineers are Microsoft and Cisco certified (MCSE Server 2012, CCNA R&S and Network security CCNAS). We therefore pride ourselves in installing and supporting the following.
- Initial network design, budgeting and implementation
- Data cabling in Ethernet, fiber optics and wireless solutions.
- Routing and switching.
- Domain configuration and management.
- Network monitoring & management systems.
- Fiber optic layouts, splicing and terminations.
- Bandwidth management.
- Server virtualization.
- Virtual Private Networking (VPN’s).
- WIFI and Guest networks.
- PTP and PTMP long range wireless links.
- Firewalls and security.
Network Security
Network security entails protecting network from external attacks and internal attacks. Access Techy has the best skills to determine the best methodologies applicable to secure your organization against information security threats. We understand how information security threat can interfere with your operations, and we are here to help.
We have two solutions: Firewall and Endpoint antivirus.
(1). Firewall
We provide both commercial firewall and open source firewall.
Commercial Firewalls
The commercial firewall comes with technical and user support so that your users are always covered, no matter where or when they are working. It can be deployed in three forms, appliance based, software based and cloud based. we have partnered with top security vendors to supply our clients with right products.
Open source Firewall
Open source is a free network firewall distribution based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. This firewall has features equivalent to commercial firewall, it is much cheaper and affordable to small medium businesses who have little budget for network security. Access Techy has deployed this solution to many educational organizations and they have been happy about how the open source firewall is performing. https://www.pfsense.org/getting-started/
(2). End Point Antivirus
End point Antivirus go beyond antivirus, includes next generation protection features like advanced persistent threat detection, device management, data leak prevention and others. We offer an all in one anti virus protection for your small office, school or business work stations, mobile, file and mail servers.
CCTV Surveillance & Security Systems
We offer a complete set of solutions: from CCTV surveillance to real time access control.
Access Control Systems
- Time & Attendance.
- Identification & Registration.
- Visitor Management.
- Locks & Accessories.
CCTV Camera Systems
We at Access Techy Limited are helping our clients move away from traditional CCTV solution whereby the CCTV camera records the incident and takes the intervention of CCTV operator to go through records to identify an incident way after theft or danger to human has occurred, this is tedious task when you have dozens of cameras. We have a solution whereby a CCTV camera gives a real time alarm https://www.youtube.com/watch?v=_oiWSL5xSGAwhenever there is an intruder to your premise and sends an alert to your phone thus deterring any theft. We offer solution that can effectively replace security guards in your premise. We can integrate CCTV cameras with intruder alarms. We use intelligent CCTV cameras immune to false alarms and filter only human and vehicle.
Managed Wireless
Do you have a property that needs managed wireless? conference centers, public gathering spots, hostels, staff houses- all of these areas need strong reliable wireless in order to satisfy your clients. We have solution for you.
Traffic Shaping
Bandwidth management technique that ensure network performance for higher priority applications. For example you might want to throttle peer to peer file sharing which consume a lot of bandwidth. Limited network resource make bandwidth prioritization a necessity.
Control your Network
You must be aware of what is happening in your network, we have tools to help you have insight of how your organization utilize a scarce internet resource and dictate how you want your internet to be used.
Pictorial Comparisons
Before: Unorganized Cabinet
After: Managed cabinet