Managed Server Security

Server Monitoring and Maintenance

This service keeps the desktops fully maintained such as applying critical Windows security updates, checking event logs for problems, checking the disk space, monitoring the health of the desktops, making sure that the managed anti-virus solution in place is working properly and up to date for the latest virus definition files

  • Monitoring and Alerting
  • Security assurance
  • Preventive maintenance
  • Complete e-threat protection
  • Anti-Virus
  • Anti-Malware
  • Ransomware protection
  • Network threat prevention
  • Patch management
  • Regular updates
  • Asset management
  • Remote support


Asset Management

Know the status of assets, set individual and bulk preferences for assets, track customer facing documentation, and set/manage customer passwords.

Inventory Management

Manage your device and parts supplies with ease. Automatically order out-of-stock inventory, assign inventory to customers for work orders, and utilize an integrated system to ensure your clients have what they need, when they need it.


One-Click Remote Session

Instantly launch remote sessions directly from within the Assets module so you can quickly take control and diagnose issues in the moment.


As your business evolves, so does the way you work. We’ve added Custom Ticket Flows to Syncro so you can customize your ticket processes to ensure you’re getting the information you want. You can Show, Hide or Require ticket info like Email, Phone #, Referred by, and much more.


Managed Antivirus Solutions


Managed Antivirus powered by Bitdefender

Sophos Server

Managed Antivirus powered by SOPHOS Evolve protection


Comprehensive protection and remediation for threats with silent installation and basic alerts on scan results and protection events.

Managed Backup Solutions

Acronis Cloud Backup

Acronis provides effortless protection of all your data and devices for home, business and resell

Veeam Backup

Veeam provides a complete Backup and Data protection platform for  Cloud, Virtual and Physical 

Datto business continuity

Smart BCDR solutions that back up content to Datto’s secure Cloud let you easily recover a lost file or an entire business infrastructure in minutes.



The application – including your data – rests securely behind firewalls. Firewalls are utilized to restrict access to systems from external networks and between systems internally. By default all access is denied and only explicitly allowed ports and protocols are allowed based on business need. Each system is assigned to a firewall security group based on the system’s function. Security groups restrict access to only the ports and protocols required for a system’s specific function to mitigate risk.Cisco-powered firewalls.

Host-based firewalls restrict customer applications from establishing localhost connections over the loopback network interface to further isolate customer applications. Host-based firewalls also provide the ability to further limit inbound and outbound connections as needed.

Network Security

We are hosted on Heroku; Heroku’s physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:

  • ISO 27001
  • SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II)
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)

Physical security

Heroku utilizes ISO 27001 and FISMA certified data centers managed by Amazon. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon only provides data center access and information to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.


Redundant servers and datacenters

Our infrastructure uses redundant storage and servers to keep the application and your data available in the case of hardware failure – and another set of servers and storage in a geographically separate datacenter in case our primary datacenter is made unavailable by a disaster or other disruption.

You can see our uptime stats here.

Fire Detection and Suppression

Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.


The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide backup power for the entire facility.

Climate and Temperature Control

Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Monitoring systems and data center personnel ensure temperature and humidity are at the appropriate levels.


Data center staff monitor electrical, mechanical and life support systems and equipment so issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment.

For additional information see:

Managed hosting

SyncroMSP has chosen Heroku for our hosting needs. Heroku runs some of the largest sites on the internet and has some of the best minds of our time working there.  We are using Ruby, and the Rails framework to run our application, and Heroku employs the creator of Ruby and many of the best in the space.  Rest assured we won’t be down because of a simple infrastructure mistake of ours.


The data in your account is replicated across multiple database servers in two geographic locations to prevent a single failure from causing data loss. Additionally, that data is backed up nightly to Amazon S3 and stored in a secure offsite location to ensure that, even in the event of a catastrophe like a tornado or flood, your information will be safe and your records can be quickly restored.

Continuous Protection keeps data safe on Heroku Postgres. Every change to your data is written to write-ahead logs, which are shipped to multi-datacenter, high-durability storage. In the unlikely event of unrecoverable hardware failure, these logs can be automatically ‘replayed’ to recover the database to within seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.

You are entitled to your data! We made it simple to dump CSV exports at any time, and we can even automate downloads of your data so you never have to worry about data loss.