Skills Matrix
T2 Computer Services cover many different areas of IT, if you’re looking for a solution and aren’t sure whether we’ll be the right fit, take a look at our skills matrix below.
In depth, everything we offer.
Server Software
DESIGN, DEPLOY, AND CONFIGURE | SUPPORT, MONITOR, and MAINTAIN | |
---|---|---|
Microsoft Windows Server (All Versions) | Y | Y |
Microsoft Exchange Server (All Versions) | Y | Y |
Micrsoft Windows Client Deployment (MDT) | Y | Y |
Active Directory Services | Y | Y |
Microsoft Remote Desktop Services | Y | Y |
Linux – Ubuntu / Debian Server | Y | Y |
Cloud
Design, Deploy, and Configure | Support, Monitor, and maintain | |
---|---|---|
Microsoft 365 | Y | Y |
Microsoft Azure Active Directory | Y | Y |
Microsoft Azure Virtual Machines | Y | Y |
Amazon Web Services (EC2) | Y | Y |
On-premises to Cloud Migration | Y | Y |
Cross-tenant Migration | Y | Y |
Servers & Storage
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
Fujitsu Primergy Servers | Y | Y |
Fujitsu Eternus Storage Appliances | Y | Y |
HPE ProLiant Servers | Y | Y |
Synology NAS / SAN | Y | Y |
Wired & Wireless Infrastructure
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
HPE Aruba Network Switches | Y | Y |
Ubiquiti Unifi Network Switches | Y | Y |
Ubiquiti EdgeMax Network Switches | Y | Y |
Cisco Catalyst Network Switches | Y | Y |
Cisco ISR Routers | Y | Y |
Ubiquiti EdgeRouter | Y | Y |
Ubiquiti Unifi Enterprise WiFi | Y | Y |
Ruckus Enterprise WiFi | Y | Y |
Cambium Enterprise WiFi | Y | N |
On-premises & Cloud Virtualisation
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
Microsoft Hyper-V Cluster | Y | Y |
Microsoft Hyperconverged Cluster (S2D) | Y | Y |
VMWare vSphere / vCenter | Y | N |
Xen Hypervisor | Y | N |
Information Security
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
Untangle / Arista NGFW | Y | Y |
pfSense Firewall | Y | Y |
Cisco ASA Firewall | Y | Y |
Censornet Web Security | Y | Y |
Censornet Mail Security | Y | Y |
SentinelOne EDR | Y | Y |
Webroot Endpoint AV | Y | Y |
BitDefender Endpoint AV | Y | Y |
Sophos AV | Y | Y |
Backup & Disaster Recovery
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
N-Able Cove Data Protection | Y | Y |
Synology Active Backup | Y | Y |
Acronis | Y | Y |
Veeam | Y | Y |
CCTV & Access Control
Design, Deploy, and Configure | Support, Monitor, and Maintain | |
---|---|---|
Synology Surveillance Station | Y | Y |
HikVision NVR | Y | Y |