Helping Customers Adapt to a Remote Workforce Environment

Working Remote


Applied Technologies is available and ready to help your organization support business continuity during these challenging and unprecedented times.


As many companies move to a remote workforce environment, in response to social distancing guidelines and requirements, it is important for employers to keep remote workers secure, connected and productive.


While Coronavirus (COVID-19) remains a threat, our top priorities remain the satisfaction and support of our customers, as well as the health and wellbeing of the people who work for, and partner with, Applied Technologies. We have taken several precautions for our employees to stay healthy, productive and available to support you and your organization by delivering technologies that address both your current and future business challenges. In fact, most of our employees are equipped with the same technologies we provide our customers – which allows our team members to work remotely and provide you with continuous service and support.

Applied Technologies experts are available to help you navigate these increased demands in networking, collaboration, storage (cloud and hybrid-cloud) and security.

We are prepared to support you and ensure we keep business strong for our communities and country. We remain confident in our ability to respond to these new technology challenges.

Please contact us at 314.736.0500 or with any questions or to discuss any immediate technology needs.

Make Your Smart Manufacturing Initiatives Even Smarter











Selecting the right partner for your Network Services is a crucial choice.


Without one, your manufacturing network can become the sticking point for the rest of your business, leaving the IT and OT sides of your network poorly connected and your network open to threats. It’s not just a matter of finding an IT company, especially now that so much of the shop floor now have cloud-based technology.  It’s about finding a partner that can help you operate more efficiently and impact the bottom line.


A partner should be able to integrate your enterprise and plant floor networks seamlessly, provide the remote access users need, and protect your company against security breaches.  At Applied Technologies, we have a team of industry-certified professionals to find the best and most cost-effective solution for you.


Finding the Right Solution

Applied Technologies’ Network Services start with facility and security assessments. We offer several assessment options to identify areas that may expose your business or have an impact on your processes. These options include security, access (network), and structured cabling assessments.  After we review both IT and OT infrastructure, we provide our analysis with a high-level summary so you can effectively prioritize the most important first steps.


Security assessments are particularly important. As the possibility of cybercrime continues to increase, security attacks are inevitable. However, with the right security services, a network breach doesn’t have to be. We partner with you to ensure we understand your policies, practices, and processes as we design solutions to keep your business secure. Our security options include:

  • Compliance: Includes Payment card industry (PCI), International Standards Organization (ISO), and more
  • Assessments: Includes IT risk assessment, penetration testing, social engineering, and threat analysis
  • Information Technology: Includes next-generation firewall (NGFW), advanced malware protection, and email
  • Incident Response: Includes detection, testing and training, digital forensics, and more

Visit the Applied Technologies website for a complete list of our security options.

Remote Access

Every network is different, as is the level of remote or mobile access your users may need. What remains consistent is the importance of keeping that remote access safe and reliable. We have extensive experience in both designing and implementing core and edge devices, as well as the cable plant design needed to support them.

Structured Cabling

Assessing the physical set up of your network is just as important as assessing how the network could be compromised and attacked. The Applied Technologies team works with manufacturers to plan, implement, and manage structured cabling solutions, including assisting with developing requests for RFPs. Whether it’s third-party testing, finding the right contractor resources, wireless network design, or power protect, Applied Technologies will be with you every step of the way.

Are you ready to get started with network services to make your manufacturing network safer and more efficient? Contact us today to get started and find the best solutions for your company.

Network Security and Your Medical Cannabis Facility

Medical Cannabis


If you’re starting a medical cannabis business, you may be swamped with various considerations. “Where should it be located?”, “What staff will I need?” or “How will I set up the facility” are all important questions best answered by those with experience.


When considering network and physical security and your ability to meet and/or exceed compliance requirements, Applied Technologies offers a complete solution for your operation. We have the technology integration solutions and team of certified professionals to ensure you are secure, competitive, and can make informed business decisions.


Medical cannabis facilities can be various sizes and configurations depending on the company. They include a greenhouse for growing the seeds, and a manufacturing facility for processing the product. Each will want to protect not only their operations, but their proprietary intellectual property that provides a competitive advantage in the marketplace. Companies also of course will include a dispensary or retail storefront, where patients can buy medical cannabis. While the stigma around cannabis is being addressed on the side of the patients, it’s also important to address it on the manufacturing side, and how best to produce medical cannabis.

Manufacturers will need a doctor’s letter of recommendation to apply for a state medical card, but keep in mind that regulations and HIIPA requirements may change as medical cannabis becomes more mainstream. Sellers will need to collect some identifiable patient information, and state and local governments are still settling on what the best regulations for security will be moving forward.

These will connect back to the state, so that is an open portal that must be considered from a cyber security perspective. Depending on the compliance rules decided on, that security may be audited on a yearly basis. Not only will you need a strong firewall on Security Information Management (SIM) monitoring and IT staff, you’ll need to routinely check in with employees and educate them to ensure the human-run side of your business data is protected from threats like phishing.

Medical cannabis facilities are not necessarily more susceptible to network breaches, but it’s important to remember that hackers are not interested in if you’re compliant or not. In addition, simply being compliant may not be a high enough level of security to protect your facility.

Technology Compliance


How does Applied Technologies help?

You may be new to the medical cannabis industry; many are. Even small computer issues could be enough to shut down your facility, so it’s important to ensure you have someone on your side with experience and proven solutions. At Applied Technologies, we have staff that are experienced not just in physical and network security, but also in cannabis growing and compliance regulations.

New rules are being released regularly, so it’s important to have a partner who can read them and interpret what they will mean for updating security measures.

Applied Technology Setup and Management

Applied Technology helps you map out a complete digital security and network solution, including both physical and cyber security. Our design experience will ensure your environment is secure and that you can run your business uninterrupted. Applied Technologies will:

  • Assess the floor plan
  • Review facility goals
  • Identify the plant capacity for the facility
  • Identify security camera placement
  • Set apart network storage areas
  • Ensure IT and infrastructure are included in the budget
  • Check compliance regulations

When becoming licensed, remember there are a limited number available, and you’ll need to accept your license within 48 hours of receiving your email. State compliance officers will be working with facilities across the state to enforce the rules, approximately four times the number of officers as those covering all bars and liquor establishments. While it’s still a business like most others, ensuring compliance regulations are met is essential, and being proactive is the best way to stay compliant. It’s also important to remember that even with a well-secured network, it can be breached due to human error managing it, so employee education is critical as well.

During initial planning for your facility, keep in mind that you’ll either need staffing or consulting for physical and database SQL concerns, which is a six-figure salary. One of the most common mistakes we see new cannabis businesses make is not budgeting enough for the set-up and management of their network infrastructure and security. Many simply don’t know the depth and complexity of what’s required, and the level of expertise needed to manage it all.

High speed internet is also necessary for one of these facilities, so keep that in mind when considering a location. It’s tempting to pick a rural location for the space and lower priced real estate, but it’s not always an ideal choice when it comes to internet connectivity. Be sure to check on whether this type of infrastructure is available in the location you’re considering, or budget appropriately so that you have an alternate plan in place.

A partnership with Applied Technologies will help manage your facility and build a team to make your facility succeed. Learn more about how we can support you at or contact Krista Salvatore, Director of Sales at or 314.736.0500 for more information or to discuss a technology assessment.

Going Beyond Video Security with Bosch



The importance of video security cannot be understated in the current technology landscape. That’s why Applied Technologies has partnered with Bosch to not only help companies meet their security requirements, but to go beyond video security to increase ROI and improve efficiencies.


Why physical security is important

When it comes to network security, are you also considering your physical security? Video systems, intrusion alarms, and access control systems are all key pieces of a network security plan. Having the right products and systems in place ensure your business remains safe from physical threats as well as network threats. Bosch provides award-winning technology that goes above and beyond the highest security demands of today to ensure you are prepared for whatever comes next. Bosch systems support a high-level of encryption, cloud-based services for monitoring and configuring devices, and secure networks and protocols.

However, security cameras equipped with built-in Video Analytics can be used for more than surveillance and liability reasons. Minimizing crime is a benefit of security cameras, but now they can also be used to maximize efficiency.

Beyond security

The average video security system simply records, and only 10% of that video data is ever used. The vast majority of what’s recorded loses its value the moment it is generated. Bosch offers cameras that are more than devices for capturing video images.

Bosch’s intelligent technologies for video security allow you to make use of data for better efficiencies and opportunities. The cameras feature built-in Video Analytics to enable them to analyze scenes for reasons that go far beyond security and deliver smart data to help businesses improve safety, increase efficiencies, and reduce costs.

Examples of the advanced analytics capabilities include:

  • Intelligent Tracking of objects in motion
  • People counting
  • Detection of health and safety risks, like blocked emergency exits
  • Video-based fire detection
  • Geolocation
  • Tamper detection
  • Queue detection
  • And more!






Let’s take a real-world example of a grocery store before a snowstorm. If there’s only one person at a register, they won’t be able to keep up with the long lines. However, the POS system will only show there was a steady stream of customers, not that customers had to wait in long lines to checkout. Bosch cameras can detect the number of people standing in line to alert store managers that another cash register needs to open. They can also count the number of people entering and exiting the store to help you determine peak days and times when you’ll need more staff to improve service and generate even more revenue.

Cameras offer so much more than security now. The goal is to reach 100% utilization of the cameras for security and beyond.

Bosch engages in day-to-day business with you to ensure that you can get the most out of your system. Their camera systems also integrate with their mass notification systems, which make it ideal for an emergency like a fire.

We’re proud to partner with Bosch because of the value they contribute to businesses and society as a whole. If you’d like to learn more about what might be the right product for you, reach out to us today!

Virtualization Benefits in Manufacturing














Virtualization Benefits in Manufacturing


Virtualization is the next step forward in plant environments to minimize server downtime and increase ROI. Traditional servers have numerous single points of failure.  Having servers without virtualization can be costly and inefficient PCs and HMIs are prone to failure and can take considerable time to recover with can further reduce OEE.  While virtualization has been more common in the office space, plant floor technologies are now being virtualized to further improve operational efficiencies.


What is virtualization?

Virtualization creates a virtual version of a device or resource, such as a server, storage device, network or even an operating system. It began gaining popularity a little over a decade ago but was primarily used in the IT space. However, manufacturers see how virtualization can be applicable in plant floor space as well.

Prior to virtualization, the best practice was to have 1 workload per physical server – because a lot of cross chatter and different patterns with workflow and read/write perspective could interfere with apps. This means on average only 5-10% of the server is fully utilized at one time. Virtualization can serve as a traffic control cop making sure resources are allocated and supported between fewer servers as needed. In a virtualized environment, CPU and memory are resourced more efficiently. This shrinks your physical footprint tremendously, saving power consumption and helps reduce labor and infrastructure needs.

Physical resources are still needed for virtual servers; however, they are much quicker and easier to backup and restore which reduces downtime. The resources are also monitored so storage, memory, and CPU can be directed where they need to be when they need to be. It’s also not just limited to servers and can be applied to desktops with Virtual Desktop Infrastructure (VDI).

Why switch to virtualization?

Using virtualization can for example reduce 30 servers with multiple risk points each to 3 servers, with few risk points. By running plant floor applications virtually, recovery time is seconds, not days! This results in fewer refresh cycles, a significant return on investment, and a smaller technology footprint. Virtualization can be scaled as the business needs change and allows the business to allocate storage and memory as needed.

The switch to virtualization in manufacturing is important to stay competitive and adapt as a new generation of tech savvy workers are entering the industry. Virtualization also increases ROI and makes it quick and easy to calculate the benefits. The redundancy built into virtualization also ensures no downtime by allowing the system to continue to work even if something breaks.

What does the process look like?

Before you begin starting the switch, Applied Technologies will first evaluate your current system workload. We have tools to capture all activity ideally for a 30-day minimum to correctly size the plant floor environment. Next, we analyze the physical servers and run diagnostics to determine what specific applications, files, software and tools are being used.  We evaluate your current hardware requirements and recommend how we can scale back hardware to run the same plant floor processes in a virtualized environment.  We also review your future technology requirements and how you can best use virtualization to scale up as business needs change.  Once approved, we set-up the hardware and virtualized environment, test all processes and schedule the migration with your IT/OT team.  We have a wide range of pre-sale and post-sale services to help ensure a smooth transition and offer ongoing monitoring of your virtualized environment.

Many companies are virtualized in the “carpeted space” but may not think they can do it on the plant floor. However, virtualization is not new technology, and is simple to implement across both IT and OT spaces.

Why choose Applied Technologies?

At Applied Technologies, we have knowledgeable data and networking engineers who have been helping businesses make the switch to virtualization since the technology originally launched   in 2000. We have the know-how to properly transition to and maintain virtual servers, including remote monitoring. Applied Technologies understands the OT space, and how they work in a virtual environment.

Virtualization can bring incredible advances in efficiency and ROI to the plant floor. It can often cost more to recover from downtime than it does to switch to virtualization, meaning the transition quickly pays for itself. If you are interested in virtualization, contact us today so we can discuss the best route forward for you.

Network Technology Summit Review

Network Technology Summit Review – Laying the Groundwork for Efficient Networks


Did you attend our recent Network Technology Summit? If you didn’t have the opportunity to join us, or if you did and could use a refresher, we’re creating a two-part blog series to recap what we and our manufacturing partners covered!  This comprehensive, day-long session reviewed best practices for business systems improvements, equipment upgrades, cost reduction and increased profitability for manufacturing facilities. Having a robust, secure plant floor network is becoming more and more vital for manufacturing, and our summit focused on the best services and products to improve yours.

Network Technology Summit








Clean Consistent Power | APC by Schneider Electric

Downtime in manufacturing can be quite costly, but when that downtime is caused by power interruptions, it’s also quite preventable. APC by Schneider Electric addressed this issue during their presentation on how to provide clean, consistent power with Uninterrupted Power Systems (UPS). UPS units are essential to keeping uptime and preventing damages in manufacturing and electrical equipment.

Switching to a Smart UPS can result in 47% savings in eight years. UPS systems typically work at a room level, row level or rack level, and APC offers several options to fit your needs:

  • DIN Rail UPS – Ideal backup power source for cabinet applications requiring Mission Critical Load Support. Applications include water/wastewater, mining/metals/minerals, biotech, food and beverage, AG, oil and gas.
  • SecureUPS Solutions – Ideal for outdoor field cabinet (NEMA 4) applications such as transportation, oil and gas pipelines, water/wastewater pump stations, utility substations
  • Galaxy VS – Compact design with 97% electrical efficiency, simplifies multiple UPS offers into one platform
  • Smart-UPSTM with APC SmartConnect – Cloud based monitoring feature that provides automatic notifications, firmware updates, and advanced support services

Network Best Practices | Applied Technologies

The typical plant network has multiple processors, a single subnet and limited redundancy. Applied Technologies dug into why plant network segmentation is a best practice, and how the plant process defines the network. This starts with defining the plant process areas, the sub-process areas within the line by identifying the PLC(s) within the process area, the drives, IO, HMI connected to the PLC, and the risks/timing of the process.

To implement network best practices, Applied Technologies, coupled with French Gerleman, offers the following network services:

  • Network assessment
  • Network security posture survey
  • Machine level/plant level design
  • Network configuration mock-up
  • Server setup, virtualization and configuration
  • Network troubleshooting
  • Managed services
  • Simplified design, quicker deployment, reduced risk

Virtualization | Applied Technologies

Virtualization is the next step forward in plant infrastructure. Applied Technologies highlighted how virtualization creates a virtual version of a device or resource, such as a server, storage device, network or even an operating system. This is important because each server has numerous single points of failure, such as APPS, OS, CPU, RAM, DISK and PWR. Having servers without virtualization can be costly and inefficient, and PCs and HMIs are prone to failure and can take significant time to recover.

Using virtualization can reduce the number of servers with multiple risk points each to three, with zero risk points. By running APPS and HMIs virtually and servers in data centers, recovery time is seconds, not days! This results in fewer refresh cycles, a significant return on investment and a smaller technology footprint. Virtualization can be scaled as your business needs change and allows you to allocate storage and memory as needed and mitigate or eliminate downtime.

Test & Inspection Troubleshooting Process | AFL

What if you could get accurate results for every single fiber optic test and inspection you have?  The fiber optic test and inspection equipment market has seen a lot of innovation for over 25 years, and now AFL has launched a revolutionary approach to the Test & Inspection Product Overview procedure. Typically, this procedure has four main steps, for which AFL offers a full range of products, that can increase your accuracy and improve your process.

Step 1: Traffic ID & Continuity

Use an Optical Fiber Identifier should be used before disconnecting any fiber, and visual and Wave ID coding to determine Polarity and continuity from ‘End to End.’

  • OFI-BI and OFI-BIPM Optical Fiber Identifiers
  • Visual Fault Identifiers (VFI/VFL)
  • MFIS Multi-fiber Identification System
  • Loss Test Sets -OLTS

Step 2: Inspect & Cleaning

All optical surfaces that are intended to be mated will need to be inspected. Cleaning prior to inspection has led to debris smearing, therefore inspection is a pre-requisite. AFL provides cleaning kits which are field portable, convenient, and available with inspection and loss testing products.

Step 3: Acceptance Testing

Acceptance of fiber network testing prior to commissioning is completed based on Insertion Loss, Optical Return Loss, & Length for the system to perform based on specifications. AFL supplies Loss Test Sets to identify fiber links that can support growth of bandwidth and speeds at the time of commissioning.

Step 4: Trouble & Maintenance

Maintaining a trouble-free network starts from Planning, Testing, Engineering and Maintenance divisions engaged with current network data through a real-time cloud-based database management system. AFL has various products and services to ensure the best results:

  • FS200 FlexScan
  • FLEXSCAN®Quad OTDR Overview
  • TRM® Test Results Manager

If you’d like to learn more about the Network Technology Summit or any of the products recommended in it, please reach out to your Applied Technologies Account Manager or contact us today.

End of Support for Windows 7 and Several Windows Server Versions


Microsoft End of Support











Everything has a lifespan, and technology is no different.


Software companies constantly develop new and improved versions of their products to address the ever-changing needs of users and to combat security threats, building in features and functionality for ease-of use, collaboration and mobility. As new programs are released, older versions are set for sunsetting, which means that support and security patches are no longer available. When this happens, users have the option to do nothing – which means they’re operating without support and with security vulnerabilities – or upgrade to the new version of the software.


Such is the situation that users of Windows 7, Exchange Server 2010, Windows Server 2008, Hyper V Server 2008, and SQL Server 2008 will face starting January 14, 2020, when Microsoft support for all of these platforms will end. Applied Technologies answers questions users will need to consider as they prepare for this transition.


Question: Why do software companies sunset packages?

Answer: Software companies are always introducing something newer, better and faster, and because of these advancements, they encourage users to migrate to new versions. When they add versions to the mix of offerings, they have to make a decision and draw a line in the sand in terms of when they’ll stop supporting older versions. It’s simply not possible to support multiple companies on multiple versions dating back an unlimited number of years. Instead, they focus their attention on identifying vulnerabilities and areas for improvement in the most current package while looking forward to the next new development to best meet the needs of users.

Typically, the lifecycle for any program is a maximum of ten years, while anything less than five years old will receive mainstream support. That five to ten year mark is a bit of a gray zone in terms of the level of support and attention a program will receive. Today, Microsoft is encouraging the migration to Windows 10 and Microsoft/Office 365 which offers a great deal of enhanced security and mobility for users.


Question: What do users need to know?

Answer: The most important thing for users to know is that they will be at a greater security risk if they are still running Windows 7 and Server 2008 or SQL 2008 after January 14, 2020. I can only imagine that hackers everywhere have this date on their calendars, just waiting for the opportunity to see what vulnerabilities they can capitalize on. If a company doesn’t upgrade, they may have a hacker waltz in through a back door they’ll never know about – and one that Microsoft will never patch. Just one machine not properly upgraded can put a company’s entire system at risk. Putting people’s data at risk can also result in serious fines, a major PR crisis, and erode public trust. Companies should not put themselves in this situation and can avoid this by upgrading.

We work with many IT managers who went through what I call “the big change” that happened with the migration from Microsoft XP to Microsoft 7. There were many compatibility challenges that arose, but the great news is, the upgrade from 7 to 10 is much more seamless. Most of the challenges arose from third party software programs which simply were not compatible at the time of rollout. This is not the case with this migration, as Microsoft has worked hard to make 99% of applications compatible. In fact, Microsoft has a site which allows IT managers and users to check the compatibility of programs they’ll need to run on Windows 10.  Reference:


Question: How does a client go about upgrading?

Answer: The first step in the process is to perform an assessment. Applied Technologies will review all applications and the network environment (including all hardware) to identify if an upgrade is possible with the current setup, and to help us develop the best plan of action to execute the upgrade and roll it out to all users.

There are many options available for this particular upgrade. For example, on the server side, you can move Windows and SQL servers to Azure and Microsoft will continue to provide security updates for 3 years.  Or we can upgrade the operating system and then leave it on premise or move it into the cloud. This provides the opportunity to get the data off of hardware in internal data centers and move towards virtualization of servers and combining SQL databases to reduce risk. There are many opportunities between virtualization and business processes in the cloud, especially if we’re dealing with older hardware that is due for replacement. In many cases, we find that it’s better and more cost efficient to move to the cloud.


Question: What are the key decisions to be made, and considerations to factor in?

Answer: We’ll typically look first at where the highest risk exists. What is the most risk that we need to mitigate before end of life? This could be at the server level or on various desktop machines throughout the organization. Once we mitigate this risk, we can tackle the other things.

Assessing hardware can also be a primary decision point for many companies. All desktop machines and devices must be compatible and have enough space and memory to house the new applications. In most cases, if a computer is running Windows 7 most of the time it can run Windows 10, but we must make sure the machines have enough capacity. A rule of thumb for the lifespan on hardware is three to five years, so if we’re dealing with a client whose hardware is nearing its own end of life, we must address what upgrades must be made to manage this migration.

We’ve also found that in the smart manufacturing world, hardware tends to have a longer lifespan because manufacturing applications don’t keep up with the leading edge of operating systems. In these cases, we’ll build firewalls around the systems or take them off the local networks so there is no risk of security breach. This secures the machine so that the overall environment is not at risk, and the facility can operate as usual.


Question: How long does the upgrade take?

Answer: This depends on the environment. A large number of PCs can be upgraded quickly if they have standard software. We typically begin with the assessment, and then create a clear schedule and process for the rollout. It typically can take six to eight weeks to plan, especially with desktop migrations where we’ll touch all machines. We tackle the easiest parts of the rollout process first and allow time for the more difficult applications that require additional planning and analysis.

Applied Technologies is currently working on a number of client upgrades, and we’re encouraging everyone to take this upgrade seriously to avoid the security vulnerabilities that will exist after the end of support date. It only takes one hacker and one vulnerability to compromise a company’s network. Doing nothing equates to the decision to leave the door open should a hacker come knocking.

As with all of Applied Technologies services, we focus our efforts on making our clients feel confident, knowledgeable and secure with their company’s IT. Our support for helping clients navigate this important migration is just one example of this commitment and we welcome any questions on this topic.

Please reach out to the team at or 636.274.8000 with any questions.

A Network Security Assessment Is Your First Step to Defend Against a Cyber-Attack

Security Threat


The statistics around cyber security depict a challenging landscape for businesses of all sizes. Hundreds of millions of consumers have been impacted by data breaches over the last year, and the cost for companies to recover from an attack can skyrocket into the billions of dollars.


While the big companies such as Equifax, Target and Marriott have garnered headlines in the evening news, small and medium sized businesses can find themselves to be even more attractive targets for hackers looking to access data. The resulting downtime, loss of revenue, damage to the brand, and potential fines can be impossible to overcome. In fact, the National Cyber Security Alliance reports that 60% of small businesses close their doors within six months of a cyber attack.


Regardless of your company’s size, it’s important to acknowledge that you are a target. Applied Technologies can help you be prepared, leveraging our knowledge, resources, and best-in-class solutions on your behalf. Before any of that can take place, the first step is a Security Assessment to identify your current situation and risks, and catalog hardware and software to develop a plan of action that’s best suited for your needs.


The Two-Pronged Approach to the Network Security Assessment

The first step involved in your security assessment may involve a diagnostic assessment. This process works very similarly to what your local mechanic might do when diagnosing the health of your car.  Your car, or your system in this case, are plugged into a special diagnostic apparatus that can read what is happening, identify problems and provide guidance as to what components might need attention.

This uncovers a great deal of information for the Applied Technologies team to assess. It can point us in the direction of key vulnerabilities, and provide a reporting of network function, as well as hardware and software tied into the network.

The second piece of the security assessment is a more in-depth analysis of your network, and this process is customized. Our work may take as little as eight hours, or as much as several days:

  1. Fact finding …. Applied Technologies meets with key stakeholders to learn about your specific concerns and goals.
  2. Assess … Our engineers work with your team to assess the network for a more detailed overview of the system.
  3. Workflow … Many breaches are the result of the human factor, so we’ll work to understand security policies and practices within your organization.
  4. Report … Once our work is complete, we’ll provide you with a full report of findings and recommendations, while collaborating with your team to prioritize and create a plan of action. This plan could include security hardware, or managed security monitoring services from Applied Technologies, a topic we’ll cover in our next blog.

What You’ll Learn in Your Network Assessment Report

Each network and each customer’s goals are different, but there are many common things that may be included in your report:

  • Security Risk Report … Executive-level report which calculates a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
  • Security Policy Assessment Report … A detailed review of the security policies that are in place on both a domain wide and local machine basis.
  • Share Permission Report by Computer … Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
  • Share Permission Report by User … Organizes permissions by user, showing all shared computers and files to which, each has access.
  • Outbound Security Report … Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
  • External Vulnerabilities Full Detail Report … A comprehensive output including security holes, warnings, and items that can help make better network security decisions, This is an essential item for many standard security compliance reports.
  • Anomalous User Login Activity … A report using mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in.

There may be more (or different) reporting metrics included on your specific report to match your system setup, user behavior, and goals.


The Security Journey

The assessment is your first step along the security journey, and we at Applied Technologies make it easy and accessible for you to get started.

Having a security benchmark and identifying your network vulnerabilities it a vital first step in identifying potential risk.  After your initial assessment is completed, we can help map out a security strategy for your company.  This can include conducting follow-up assessments to determine if identified issues have been corrected (to) addressing additional security requirements uncovered by the initial assessment.  Our in-house Applied Technologies team, in coordination with our network of technology partners and leading manufacturers of security technologies can help you obtain a level of security that supports industry standards and best practices.

Don’t Be a Statistic

It’s often said that it’s not a matter of if you’ll experience a breach – it’s a matter of when you’ll experience it. The key is to be prepared to minimize the likelihood of major damage to your company, your reputation and your customers.  Contact us today to learn more.



Managed Services Help Solve IT and Business Challenges

Every day, IT professionals face a difficult balancing act. They must focus on planning and deploying technologies to optimize corporate growth and profitability, while at the same time manage the challenge of operating and optimizing highly-complex, integrated, multi- vendor, multi-platform environments.


Managed Services can be a viable tool to help you achieve the right balance between maintaining end-user support and helping senior management drive improved technology performance and increase business efficiency to facilitate revenue generation.


Selecting the right managed service tools for your business and getting them implemented can be a challenge for any company. We help make the complex simple.


Managed Services

Getting Started

When it comes to managed services, there really isn’t one cookie cutter solution that works for everyone. We’ll help you identify the right selection of programs and work with you to smoothly integrate them into your business. We offer a variety of service programs that keep you connected with information critical to maintaining uptime and profitability.

Applied Technologies offers a variety of standard and customizable managed service options through leading industry providers, that can be designed around your specific business requirements.  These include:

  • Carrier Services
  • Cloud Services
  • Collaboration Services
  • Cyber Security
  • Data Center Services
  • End-User Services
  • Network Services
  • Operations Management
  • Print Management

We help address your day-to-day IT management needs so your internal IT staff can focus on strategic initiatives. The depth of our knowledge and experience with traditional and advanced technologies as well as your specific IT infrastructure position us to successfully manage or host all key technology systems.


Managed Services Delivery Framework (MSDF)

Our delivery framework uses a robust combination of advanced IT management applications, state of the art IT Infrastructure and industry- recognized processes that gives our offering a unique, global presence with a local feel.

Our Service Desk team oversees all our services, 24 hours a day, 7 days a week, ensuring that when incidents arise, you have someone standing by to help. To ensure that all the technology and operational activities are effectively managed, regardless of the time of day, we staff our Service Desk with three tiers of expertise around the clock, allowing you to rest comfortably that experts are actively managing your critical assets.

We provide reliable, secure services using our world-class infrastructure, knowledge and processes. We also work closely with you to review key business needs, cost structures and processes. And through our ITIL/ISO 20000-based systems and processes, we closely monitor every system to ensure your IT infrastructure delivers service levels aligned with business requirements.


Managed Services – Key Benefits

Our goal is to help you monitor and manage data and communicate and report business issues in an efficient and timely manner saving you time, money and resources. With managed services, you’ll be better prepared to:

  • Control Costs
  • Focus on Core Business
  • Reduce Risks
  • Adhere to Compliance & Security
  • Quickly Implement Technology

To begin the conversation contact us at or call 636.274.8000 to discuss your business requirements with one of our Account Mangers or Practice Leaders.

In Today’s Business World, Collaboration is King

The definition of collaboration is “the action of working with someone to produce or create something.” This action is vital to businesses, who by and large, aim to bring the best minds together to innovate and push their key initiatives forward. But what happens when the team members charged with this are located in different offices regionally, nationally or even around the globe?


That’s where technology comes in. There’s a greater need today than ever before to remove the geographical divide and bring teams together in real time, no matter where they’re located.




Applied Technologies is your partner to make this happen. We have best-in-class technology resources and the strategic skills you need to develop a collaboration platform that will help propel your business forward. Today, we share our discussion with Matt Emrick, Solutions Architect, who has been working with clients for more than ten years on their collaboration initiatives. He has witnessed the industry evolve along with client needs and goals for communication, and offers his insight.


In the technology world, what is collaboration?


Matt: The world of collaboration is so vast, that it can be challenging for people to wrap their minds around the possibilities. Put quite simply, collaboration is a way for colleagues to connect, communicate and share information in the type of work environment that’s typical today. It’s a fact of business that we don’t all work in the same office. We’re spread across time zones, and have remote work forces in greater numbers than ever before. The business world needed a solution to bring these people together through technology, allowing them to co-create, complete tasks and reach goals.

In many cases, this can be achieved with the implementation of one application. This could be anything from instant messaging to video conferencing, or online meeting places like Webex. In other cases, collaboration is achieved with a longer-term and integrated strategy developed for how a company’s teams need and want to interact. This can involve multiple tools and end points for communication, such as your phone or video conference device, or meeting spaces where everything is combined from chat, project documents, and more. There are many tools and technologies available to help teams be more efficient and effective regardless of their physical locations.


Why is collaboration important in today’s business environment?


Matt: Collaboration allows businesses to develop and maintain a competitive advantage. Customers, supervisors, fellow team mates, vendors and everyone involved in a project want and need immediate answers and access to information. Collaboration allows you to connect and share information as quickly as possible. The longer it takes, the more opportunity your competitor has to respond to a customer request, and to mobilize a team to address a customer’s needs.

It’s also important because it’s no longer 100% feasible to physically be present for every meeting or work session related to your projects. The world moves too quickly. In the hours it takes to fly from place to place, your team could have completed many projects and provided service for many customers or stakeholders. All of this is done in a much more efficient and cost-effective manner. Your frequent flyer miles may not be quite so high, but your productivity and profitability will skyrocket.


How does Applied Technologies help companies with their collaboration needs?


Matt: First and foremost, Applied Technologies provides the technology needed to implement collaboration. We partner with Cisco, one of the leaders in collaboration technology who provide a vast suite of tools to enable connectivity from anywhere on any device. Cisco offers many end-point solutions in terms of video conferencing, chat, instant messaging and huddle spaces that allow for a very in-person feel to the conversation. We can help companies create a plan for what they’ll need to meet their objectives, and integrate the hardware and software to bring it all to life.

For some companies, it’s a relatively straightforward solution, and for others, we’re called upon to develop a long-term collaboration strategy incorporating all tools and end points into the overall vision. In these cases, the customer relies on our experience to help them understand what’s available, where the industry may be going, and help them create a plan for what infrastructure must be put in place to make the collaboration they want possible.


How has collaboration changed over the years?


Matt: When I started in this industry, much of the required infrastructure was located on-site. This represented a big investment for the company in terms of hardware purchase, installation and management. Today, much of the collaboration technology is in the cloud, so that investment isn’t necessarily required unless there is a specific reason that a company would need it on-site. We can help them determine the most effective and appropriate solution for their situation, specifying the infrastructure plan needed to implement collaboration. This remains a big piece of what we do.

The other change I’ve seen is company and employee acceptance and demand for collaboration tools. Ten years ago, pieces of the collaboration puzzle were either simply “nice-to-have” perks, or, companies were just dipping their toes in. Now that people have had time to grasp what collaboration means and what it can do for their business, they want more. They’re hungry for more ways to connect and make their businesses run more efficiently. We’re either adding new layers to our customers’ collaboration platforms to expand their capabilities, putting those operations in the cloud to reduce their hardware maintenance needs, or streamlining things into a single interface to simplify management if it is on site.


What is important for companies to know about collaboration?


Collaboration Media


Matt: In general, the possibilities with collaboration technologies are nearly endless. We live in a world where you don’t have to be in the same room to work together. Tools such as Webex Teams help drive communication and sharing, putting everything in one space. You can quickly find project documents, start a conversation, answer questions or update information in real time. You don’t have to pick up the phone, start a meeting, or email documents. Information is shared in one tool.

There’s also a great deal of power in your VoIP system tied to a contact center solution. VoIP allows for truly unified communications, and provides automation which allows your customers to quickly receive answers to their questions. It ties to all other forms of collaboration for a fully integrated experience.


What does the process of implementing collaboration look like?


Matt: We begin the process by assessing the customer’s infrastructure to ensure it meets the hardware needs to support their collaboration goals. We’ll identify whether they are best suited for on-premise equipment, and develop the plan for putting hardware and communication lines in place. The Applied team will look at issues surrounding the network. Is everything up to speed to ensure quality of service? Do they have the appropriate internet or WAN setup? Or, does it make sense for their particular situation to have their collaboration system be cloud-based?

Our planning process and the set of recommendations we provide enables us to make the implementation and use of the system as easy as possible for the customer. The systems we deploy are very user-friendly, and require very little training.


What are the ultimate cost savings of collaboration?


Matt: Aside from the efficiency benefits, there are many cost savings associated with collaboration. Travel expenses are greatly reduced, and video conferencing technology allows for people to feel that they’re in the same room. There is a savings on hardware costs, especially where phone systems are involved, because much of the technology relies on “soft phones.” This means you don’t have to have physical phones on desks. You can initiate calls on any device that’s connected to the system – your laptop, your cell phone, or tablet can work as a phone. Also, having these tools in the cloud reduces your hardware needs, as well as the cost associated with purchase and maintenance.

Ultimately, many companies will point to their operational efficiencies which are much harder to quantify. People are freed up to perform valuable work because they’re not spending their time traveling. Plus, they’re accessible so customers can get a hold of them more quickly. And with a contact center solution, calls can automatically be routed to the appropriate person (or another member of the team if that person is unavailable) for a seamless customer experience with enhanced satisfaction.


Perhaps the key thing we learned from Matt is that through collaboration, virtually anything is possible. The Applied Technologies team has not only the vast catalog of technology from Cisco to draw upon, but also the experience and vision to create a solution that will meet the customer’s goals. Whether it’s an on-premise install or a cloud-based system, Matt and his team will make it easy to give you and your team the collaboration you need and help you envision where you may need to go in the future.   Please reach out to the team at or 636.274.8000 with any questions you may have.