SlideShare a Scribd company logo
Free yourself.



                 The safest and most secure
                 method to manage your IT

                 The simplest and most
                 user-friendly solution of its kind

                 The most complete Core IT
                 Infrastructure Outsourcing service
                 available on the market.
iGOvirtual™ is a service, hosted in a fully secured data center, that provides secure access via an Internet portal to
    your company’s work environment. In tech-talk it’s: a turnkey managed service for outsourcing a firm’s core IT
    infrastructure (applications, data, support, etc). Once you’re connected, you have access to everything required
    to carry out your work, from anywhere in the world, with but a click.




    Advantages
    Security:
    With multiple layers of security your data is always safe.

                   Login Security:                                                                          Logical Security:
                   First Layer                                                                                          Third Layer
                   This is the entry point to your iGOvirtual™network.       This is your Anti-Everything protection. Your faithful
                   This is the key to your house. The login is password      shield against the digital fiends of the Internet. With
                   protected and protocols for proper iGOvirtual™            iGOvirtual™ you are protected against everything:
                   password management come into play.                       viruses, worms, Trojans, spyware, malware,
                                                                             crimeware, spam, phishing, and all the other nasty
                                                                             critters out there.



                   Authentication Security:                                                               Physical Security:
                   Second Layer                                                                                       Fourth Layer

                   This tells the iGOvirtual™ network who someone is         Our internal physical security measures are as tight
                   and what they’re allowed to do. This is what protects     as the cyber-protection we offer you. Magnetic card
                   you from the inside. Permissions are set as per your      readers, a reinforced building structure, no-fail power
                   requests: who can change what parameters, who can         management, server specific thermal management,
                   access what files, who can use what applications and      security protocols and encoded permission definition,
                   websites, it’s all under your control.                    are but a sample of what physically guards your data
                                                                             24/7/365 at iGOvirtual™.




                   Continuity Security:
                   Fifth Layer
                   Server redundancy and data back-up. Your data is backed-up at two different physical locations: on two different islands
                   (literally). Both locations are mirrors of one another and can take over each other’s tasks at any point necessary. This
                   redundancy guarantees that no matter what happens, your data is safe and can be recuperated, at any time, no matter what.




    Simplicity:                                                               Accessibility:
    Using iGOvirtual™ is as simple as accessing your bank account             Increase your productivity by having access to your work
    through the Internet. Since the software we use is the same               environment from absolutely anywhere at anytime. You can work
    software you use, all you have to do is login and go!                     from home, from a client’s office, from a supplier’s location, and
                                                                              even from an Internet café with the same access and security as
                                                                              you enjoy on your work premises.
    Cost savings:
    Imagine not having to buy new servers every three years, not
    having to buy new PC’s each two years, not having to install,
                                                                              Expandability:
    update, or configure software ever again! Imagine the time and            iGOvirtual™ makes IT expansion issues a thing of the past. It’s an
    money you could save!                                                     Enterprise grade service (which means that iGOvirtual™ gives
                                                                              you the same power and options as those enjoyed by major
                                                                              worldwide corporations). If your business is growing, simply
                                                                              add user accounts. Tell us what your expansion needs are and
                                                                              iGOvirtual™ takes care of the rest.

2
Service Description
The visible:                                      The invisible:
› Secure access to a dedicated and                › Real-time redundancy for all environments
  customized web portal                           › Complete, daily backup of environments
› Access authenticated from any kind of           › Monitoring 24-7-365 of accessibility,
  Internet browser                                  environment performance and
› Private computer workspace with all of            applications
  your software and data                          › Maintenance of servers, network
› Unlimited access to technical support             equipment and security
› On-demand restoration of file(s) or folder(s)   › Upgrades of services, software programs
› Private folders for each user, and public         and databases
  folders for the company as a whole              › High-end firewall
› Generous disk space, with the possibility of    › Anti-everything services (anti-intrusion,
  combining space for the company                   anti-virus, anti-Trojan, anti-worm, anti-
› Email message box                                 spyware, anti-junk mail, etc.)

› Access to all active applications and           › Leading-edge hosting infrastructure (UPS,
  services whether you own or lease, menu-          generator, fiber redundancy)
  selectable and on demand
› Support of local printers
› Tools and services: Zip, Acrobat, et cetera…




                                                                                                Menu-selectable Options,
                                                                                                On Demand
                                                                                                › Microsoft Office Standard or Professional suites
                                                                                                  (Word, Excel, PowerPoint, Outlook)
                                                                                                › SUN OpenOffice suite
                                                                                                › All Microsoft software (Visio, MS Project, etc.)
                                                                                                › Accounting software (Accpac, Great Plains,
                                                                                                  Acomba, Simply Accounting, Avantage)
                                                                                                › Collaborative tools
                                                                                                › Specialized software
                                                                                                › Additional disk space
                                                                                                › Hosting of in-house or custom software
                                                                                                › Training (business software, Act, Maximizer, etc.)
                                                                                                › Fax services
                                                                                                › Hosting of internet sites
                                                                                                › And almost anything else you can imagine!


                                                                                                What’s included
                                                                                                with all our services:
                                                                                                › 24/7/365 support service
                                                                                                › Data storage
                                                                                                › E-mail management
                                                                                                › New user profile creation
                                                                                                › Software consultants
                                                                                                › Network and infrastructure consultants


                                                                                                                                                       3
User Support                                                                 Training on Request
All users of the iGOvirtual™ service have unlimited access to                Our support services cover all software-related problems
support by email and telephone from our support department,                  involving access, performance, document printing or emailing,
which is available up to 24 hours a day, 7 days a week, 365 days a           and software update and maintenance. To broaden your
year. Our experts can help you, step by step, with any computer              knowledge and aptitudes in the use of many software programs,
problem, or IT issue, that affects your use of iGOvirtual™ or your           including all their special features, you can also make use of our
computer-based productivity in general.                                      on-demand training services for a very reasonable price.


                                                                             All this from a single access button! One Internet,
Infrastructure Support                                                       One browser, One Computer: One world. Free yourself.

All requests to activate, deactivate or modify a user profile, restore
a backup, verify performance or update a specific program are
sent to the infrastructure support team who, like the user support
team, are required to register and manage all requests in the
customer relationship management system.




About us:
In 1998, Oriso Solutions inc. was born. A company that took upon itself to
improve and simplify the way everyone deals with IT. Seeing and understanding
the struggles and the workload that IT staff everywhere had to manage on a                                  Contact us for further details
daily basis, Oriso decided to offer businesses something better: IT that is simple,                             Toll Free: 1-877-36-ORISO
user friendly, mobile, stable and secure, and very cost effective.
                                                                                                                      www.igovirtual.com

More Related Content

What's hot

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
Vadimazz
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
Intergen
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
Len Bass
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
Natalia
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
Mobile Monday Brussels
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
Ramon Ray
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
Consumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart KeynoteConsumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart Keynote
David Tesar
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
IBMGovernmentCA
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
bpaternoster
 
Why the ImageRunner should run your office?
Why the ImageRunner should run your office?Why the ImageRunner should run your office?
Why the ImageRunner should run your office?
CanonOIS
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tour
Ramon Ray
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
BIOVIA
 
Panda security corporate_presentation_2012_en
Panda security corporate_presentation_2012_enPanda security corporate_presentation_2012_en
Panda security corporate_presentation_2012_en
Panda_Security
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 

What's hot (20)

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Consumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart KeynoteConsumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart Keynote
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
Why the ImageRunner should run your office?
Why the ImageRunner should run your office?Why the ImageRunner should run your office?
Why the ImageRunner should run your office?
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tour
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Panda security corporate_presentation_2012_en
Panda security corporate_presentation_2012_enPanda security corporate_presentation_2012_en
Panda security corporate_presentation_2012_en
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 

Similar to I GOvirtual En Brochure

We don’t panic.
We don’t panic.We don’t panic.
We don’t panic.
WJN
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
Strategic Business & IT Services
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
IS Decisions
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterprise
frameworksem
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
richardebowers
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
LeenVerleyen
 
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptxvDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.Works
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
nado-web
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
guestf018d88
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
Data Securities
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
Ben Boyd
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
Primend
 
IT Maintenance and Solution
IT Maintenance and SolutionIT Maintenance and Solution
IT Maintenance and Solution
inovuustech
 
Fastest antivirus software
Fastest antivirus softwareFastest antivirus software
Fastest antivirus software
inovuustech
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Heidi Hoff
 

Similar to I GOvirtual En Brochure (20)

We don’t panic.
We don’t panic.We don’t panic.
We don’t panic.
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterprise
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
 
vDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptxvDesk.works Secure Cloud Desktop Solution.pptx
vDesk.works Secure Cloud Desktop Solution.pptx
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
IT Maintenance and Solution
IT Maintenance and SolutionIT Maintenance and Solution
IT Maintenance and Solution
 
Fastest antivirus software
Fastest antivirus softwareFastest antivirus software
Fastest antivirus software
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
 

I GOvirtual En Brochure

  • 1. Free yourself. The safest and most secure method to manage your IT The simplest and most user-friendly solution of its kind The most complete Core IT Infrastructure Outsourcing service available on the market.
  • 2. iGOvirtual™ is a service, hosted in a fully secured data center, that provides secure access via an Internet portal to your company’s work environment. In tech-talk it’s: a turnkey managed service for outsourcing a firm’s core IT infrastructure (applications, data, support, etc). Once you’re connected, you have access to everything required to carry out your work, from anywhere in the world, with but a click. Advantages Security: With multiple layers of security your data is always safe. Login Security: Logical Security: First Layer Third Layer This is the entry point to your iGOvirtual™network. This is your Anti-Everything protection. Your faithful This is the key to your house. The login is password shield against the digital fiends of the Internet. With protected and protocols for proper iGOvirtual™ iGOvirtual™ you are protected against everything: password management come into play. viruses, worms, Trojans, spyware, malware, crimeware, spam, phishing, and all the other nasty critters out there. Authentication Security: Physical Security: Second Layer Fourth Layer This tells the iGOvirtual™ network who someone is Our internal physical security measures are as tight and what they’re allowed to do. This is what protects as the cyber-protection we offer you. Magnetic card you from the inside. Permissions are set as per your readers, a reinforced building structure, no-fail power requests: who can change what parameters, who can management, server specific thermal management, access what files, who can use what applications and security protocols and encoded permission definition, websites, it’s all under your control. are but a sample of what physically guards your data 24/7/365 at iGOvirtual™. Continuity Security: Fifth Layer Server redundancy and data back-up. Your data is backed-up at two different physical locations: on two different islands (literally). Both locations are mirrors of one another and can take over each other’s tasks at any point necessary. This redundancy guarantees that no matter what happens, your data is safe and can be recuperated, at any time, no matter what. Simplicity: Accessibility: Using iGOvirtual™ is as simple as accessing your bank account Increase your productivity by having access to your work through the Internet. Since the software we use is the same environment from absolutely anywhere at anytime. You can work software you use, all you have to do is login and go! from home, from a client’s office, from a supplier’s location, and even from an Internet café with the same access and security as you enjoy on your work premises. Cost savings: Imagine not having to buy new servers every three years, not having to buy new PC’s each two years, not having to install, Expandability: update, or configure software ever again! Imagine the time and iGOvirtual™ makes IT expansion issues a thing of the past. It’s an money you could save! Enterprise grade service (which means that iGOvirtual™ gives you the same power and options as those enjoyed by major worldwide corporations). If your business is growing, simply add user accounts. Tell us what your expansion needs are and iGOvirtual™ takes care of the rest. 2
  • 3. Service Description The visible: The invisible: › Secure access to a dedicated and › Real-time redundancy for all environments customized web portal › Complete, daily backup of environments › Access authenticated from any kind of › Monitoring 24-7-365 of accessibility, Internet browser environment performance and › Private computer workspace with all of applications your software and data › Maintenance of servers, network › Unlimited access to technical support equipment and security › On-demand restoration of file(s) or folder(s) › Upgrades of services, software programs › Private folders for each user, and public and databases folders for the company as a whole › High-end firewall › Generous disk space, with the possibility of › Anti-everything services (anti-intrusion, combining space for the company anti-virus, anti-Trojan, anti-worm, anti- › Email message box spyware, anti-junk mail, etc.) › Access to all active applications and › Leading-edge hosting infrastructure (UPS, services whether you own or lease, menu- generator, fiber redundancy) selectable and on demand › Support of local printers › Tools and services: Zip, Acrobat, et cetera… Menu-selectable Options, On Demand › Microsoft Office Standard or Professional suites (Word, Excel, PowerPoint, Outlook) › SUN OpenOffice suite › All Microsoft software (Visio, MS Project, etc.) › Accounting software (Accpac, Great Plains, Acomba, Simply Accounting, Avantage) › Collaborative tools › Specialized software › Additional disk space › Hosting of in-house or custom software › Training (business software, Act, Maximizer, etc.) › Fax services › Hosting of internet sites › And almost anything else you can imagine! What’s included with all our services: › 24/7/365 support service › Data storage › E-mail management › New user profile creation › Software consultants › Network and infrastructure consultants 3
  • 4. User Support Training on Request All users of the iGOvirtual™ service have unlimited access to Our support services cover all software-related problems support by email and telephone from our support department, involving access, performance, document printing or emailing, which is available up to 24 hours a day, 7 days a week, 365 days a and software update and maintenance. To broaden your year. Our experts can help you, step by step, with any computer knowledge and aptitudes in the use of many software programs, problem, or IT issue, that affects your use of iGOvirtual™ or your including all their special features, you can also make use of our computer-based productivity in general. on-demand training services for a very reasonable price. All this from a single access button! One Internet, Infrastructure Support One browser, One Computer: One world. Free yourself. All requests to activate, deactivate or modify a user profile, restore a backup, verify performance or update a specific program are sent to the infrastructure support team who, like the user support team, are required to register and manage all requests in the customer relationship management system. About us: In 1998, Oriso Solutions inc. was born. A company that took upon itself to improve and simplify the way everyone deals with IT. Seeing and understanding the struggles and the workload that IT staff everywhere had to manage on a Contact us for further details daily basis, Oriso decided to offer businesses something better: IT that is simple, Toll Free: 1-877-36-ORISO user friendly, mobile, stable and secure, and very cost effective. www.igovirtual.com