Bluechipcomputers-slide2
Bluechipcomputers-slide6
Bluechipcomputers-slide4
Bluechipcomputers-slide1
Bluechipcomputers-slide3

ABOUT US

We are a consulting, support & supply company. We have expanded from basic consulting & support services for home clientele, to larger SME entities across South Africa and abroad. Our single focus is to provide the most effective IT solutions that best align with our clients’ short and long term business requirements and objectives. Our team brings many years of knowledge and experience and we understand the IT needs of SME businesses. Our aim is to consistently provide the best. IT Support services to all of our clients.

COMPUTERS

We offer computer systems tailored to your needs. Configure your own or choose from a pre-configured one. Stay on top of the industry with our vast range of servers designed to help you solve business challenges and develop the future of your Enterprise.

SECURED MAIL

One thing that should never be an afterthought is the digital security of your organisation. Protect your reputation and your bottom line with Securedmail’s advanced business security solutions.

IT SERVICES

Full system project management and custom system development – Full life-cycle management including scoping, planning, development and project management

IT SUPPORT

Spyware Hardware Backup Solutions. Maintenance and Preventative Maintenance. All versions of Windows. All versions of Windows Server including Domain Administration with Active Directory users (MCSE Administration) Exchange Servers.

SERVICES

Need a solution? Look to the people who are passionate about providing individualised service.

No matter what you may need and when, we have a break-fix solution for you

When you need something new, need it improved, it breaks, or you just need a visit, we are there to help. We have a wide range of services to fit every need as we understand that all our client are not the same and require different solutions even for the same problems.

  • IT Consulting & Strategy
  • Device Setup & Maintenance
  • Network Installation & Maintenance
  • Connectivity
  • Hardware & Software Supply
  • Protection & Security
  • Remote Support
  • Remote Site Connections & Support

The 21st century "it" thing in business is to have a outsourced IT Department.

Our SLA’s are driven by “Prevention is better than Cure”. Being proactive rather than reactive, IT issues are stopped before they become problems to be fixed. We tailor all of our SLA’s to each individual client. As your business grows it will become more and more dependent on Technology & reliable IT support.

  • Server Monitoring
  • Network Monitoring
  • Connectivity Monitoring
  • Security Monitoring
  • Block Hours
  • Disaster Strategy & Management
  • Set Response Time
  • 3rd Party Management

Knowing what is going wrong before it does is crucial.

We are all familiar with the saying, “Don’t fix what is not broken”. In today’s age where information is becoming more valuable than the hardware it is on, we provide a way to monitor the health of your systems at all times. Why lose 10’s or 100’s of thousands when we could prevent it?

  • Server Monitoring
  • Desktop & Laptop Monitoring
  • Printer Monitoring
  • Mobile Device Monitoring
  • Network & Infrastructure Monitoring
  • Data Usage Monitoring
  • Internal Network Management
  • Protection Monitoring

Small (and Medium Enterprise) Problems

If you have ever had a problem with your land line, you will understand how frustrating it is to deal with call centres where you don’t speak their language to describe the problem correctly or get a solution in “layman’s terms”. We offer added value services that cover just these sorts of scenarios.

  • ADSL Line Management
  • Internet Service Provider Management
  • Website Hosting and Host Management
  • E-mail Hosting and Account Management
  • 365 Personal & Business Management
  • Cloud Protection Management

Simple Solutions for Complex Connections

Securely connect devices

Keep endpoints safe for those remotely accessing the network. Verify their integrity and allow only trusted devices to connect.

Investigate incidents

Rapidly scope and remediate an incident before it affects your network. Gain deep visibility into activity across all your endpoints.

Stop malware

Protect your organization. Continuously monitor your endpoints to detect advanced attacks and prevent them from happening.

Multi Layered Anti-virus

Advanced threat detection technology enables our anti-virus engines to provide clients with an unrivalled protection from viruses and other email-borne threats.

Data Loss Prevention

Allows users to control where messages are sent to and how they should be filtered depending on specified rules with full visibility and control of features.

Threat Protection Technology

Help integrate a breadth of our technology, migrate from other solutions, and optimize their existing security technologies.

IT Audit Services Performed

The services our specialists perform include:

  • IT audit outsourcing and co-sourcing, covering all IT operational and business risk
  • Internal and external network scans
  • Social Engineering
  • Risk Assessments
  • Privacy Impact Assessments (PIA)
  • PCI Readiness Assessments
  • Security Assessments, including disaster recovery and business continuity
  • Integrated IT, financial, operational and compliance audits

 

You’ve got questions, we’ve got answers.

It all starts with a simple call. We will discuss your current IT infrastructure and what problems you are facing by means of an IT Audit.

Our experience and certified IT support consultants will provide some over-the-phone advice and recommendations.

Choose your IT Support SLA and get your IT systems covered.

How We Work

Log Issue

An incident or problem is reported by our client or our End Point Management Systems. The issue is recorded in a ticket and assigned to a Technical Engineer for inspection.

Diagnosis

Our Technical Engineer inspects the reported issue with the user's assistance to recreate the issue and discover the cause.

Resolution

Once the cause of the issue has been identified, a solution is created and implemented to the client's satisfaction.

Review

The issue is reviewed and checked for potential additional issues. If addition issues are found they are diagnosed and resolved.

simple, professional, cost effective