Intro

Our primary goal is not supporting technology, it is supporting people. Using technology to make their business lives easier and more productive.

who we are

Unigold 2000 Ltd was founded in July 1996 by Matt Gaskin and Tina Ortu. As a totally independent consultancy practice, we provide our clients with cost effective information technology solutions that match their real business needs, enhance their competitiveness and provide them with an excellent return on their investment.

We have no vested interest in any particular brands of hardware or software. Our teams are committed to planning and developing many types of business networks, overseeing their installation and providing the training and ongoing support that ensures their continuing successful operation, even as their working environments inevitably change over time. To achieve this, they utilize whatever resources are most appropriate to the individual project.

We are committed to achieving a close working relationship with all our clients and with several premier vendors whose products we recommend and services we use on our clients behalf. We believe that business relationships are for the long-term and that our commitment to each and every project we undertake must reflect that.

 

Unigold has increased its client base by 100% in the last year. We have found that as the market has changed we have had to move with this change and offer more and more services to local businesses. We as a company have formed a number of business partnerships to enable us to deliver the type of service you require.

Since then the website is the main place I receive the majority of my work. Thanks again Unigold

Network 2000

iAssist

Minimise IT problems and support costs with iAssist Managed IT Services.

  • ARE YOU PAYING FOR I.T. SUPPORT EVERY TIME YOU HAVE A PROBLEM?

  • THE LONGER YOUR I.T. PROBLEMS LAST, THE MORE IT COSTS?

  • YOUR CURRENT I.T. SUPPORT TAKES TOO LONG TO FIX THE PROBLEM?

  • YOU CAN'T BUDGET ON WHAT YOUR IT SUPPORT WILL COST?

 

We’ve all been in the situation before…

"If I’d only known it was going to happen, I would have done something about it”

While we can’t read into the future, our real-time system monitoring solution ‘iAssist’ comes pretty close. By using sophisticated components that actively communicate with the hardware and software in your Servers and PC’s, iAssist is able to help predict system potential issues, often well before they become a problem.

 

How does it work?

Remote Monitoring & Management

Remote Control, Proactive Monitoring & Alerting, Patch Management, Task Scheduling and pre packaged IT Management utilities helping IT services run smoothly with minimal effective down-time.

Service Desk, Time Tracking and Billing

Ticketing workflows, support emails converted into Support Tickets, 100% of your support services with Time Tracking.

Cloud based Managed Anti Virus and Email Security

Managed Anti Virus end point includes user Web Browsing control. Email security includes virus and spam removal and Archiving and Disaster Recovery in the Cloud.

Asset and Inventory

Allows us to provide our customers Asset Management services, report upon all hardware and software in use across the business. Identify old or high risk equipment including hardware and software so they can be upgraded or replaced before it is too late.

Reporting

Reports that will add value to your clients business and your own. Review your business KPI's. Managed Services clients-prove the value you deliver. Break Fix-proactively identify risk and sell remediation.

iAudit

Manage ALL your assests in one place

with support for all your network devices. Windows, Linux, Mac, Vmware, Hyper-V, Routers, Switches, Printers and many more...

How does it work?

Software Inventory & Licensing

Track and audit all software installed across your network through flexible and easy-to-configure inventory reports. Find out which applications are installed on which computers and whether or not you are licensed for all of them. The built-in license compliance tool makes it easy to track down non-compliance issues and unused licenses.

Network Inventory & CMDB

Get a full inventory of your entire IT infrastructure. Lansweeper's CMDB options enable you to automatically scan as well as manually add assets to the inventory. Detect all hardware devices connected to computers and keep track of any changes or removals. Group your assets, place assets on a map and create relations in between assets or users and more!

SNMP Network Management

Scan network devices like printers and switches through SNMP. Several universal SNMP fields are pulled as well as data specific to certain devices like printer toner data and switch port mappings.

Automated Software Deployment

Distribute, install, update and uninstall software applications on a specific asset or entire groups through the built-in software deployment tools. Deploy on a schedule, have non-compliances solved automatically, configure for offline devices to be contacted at a later time and more. Save time and money by automating otherwise cumbersome and elaborate tasks needed to keep your IT infrastructure up and running.

Active Directory Integration

Pull Active Directory user - and computer details on your scanned machines to get a complete overview of your entire network. Create reports based on OU, integrate user pictures, clean up your Active Directory, make group and manager reports ... the possibilities are endless!

IT Asset Management & Compliance

Lansweeper's asset management features give you an instant overview of everything on your network. From hardware info and warranties to unauthorized software installs and antivirus statuses. Achieve full compliance with all company policies and keep it that way. Be alerted of nearing non-compliance before it becomes a problem.

KUDE

Business Continuity Built From the Ground Up

Do you really backup your data?

Unigold’s KUDE extended family of hybrid cloud-based backup, disaster recovery (BDR) and business continuity solutions are built for businesses of every size. The solutions are customisable, with scalable options and pricing to ease the transition as your data and storage needs grow.

The robust software platform includes instant local and off-site virtualisation, and KUDE’s proprietary Inverse Chain Technology™ and Screenshot Backup Verification.™ The devices feature hotswappable drive bays and solid state OS drives. Unigold’s KUDE II is available in both a physical and virtual format. Unigold defines innovation, once again.

 

Introducing 'KUDE Continuity'

 

In today’s world, technology is a key aspect to all parts of your business. From accounting and management to day-to-day communication, more and more parts of your business are performed solely on computers. Companies must take advantage of today’s technology to stay competitive. Email is the preferred method of communication and computers are integral for executing transactions and storing valuable data. With the importance of computers and technology, it is critical that every organization has a complete solution to deal with the threat of data loss.

In exchange for free storage, users often give up actual ownership of their data.

Check the terms and conditions,
you may be unpleasantly surprised!

 

In the past, companies have backed up their data using magnetic tapes which were then typically stored off-site. While a usable method for incrementally backing up data off-site, this process is tedious and time-consuming. For small businesses without a dedicated IT staff, maintaining an up-to-date tape library can be easily overlooked and can result in permanent data loss.

Small to medium businesses can suffer severe repercussions if their critical data is not securely backed up at an off-site location. A fire, power surge, hardware failure, or even basic operator error can wipe out years of data. According to IDC (a leading market research firm), less than 40% of all small to medium-sized businesses properly and regularly backup their data. These businesses cannot afford to lose time attempting to rebuild their lost, vital information.

Compared to traditional style backup where time to total recovery can be measured in days and weeks, KUDE can have your organisation back up and running within minutes. KUDE solutions are designed to scale to your business needs and budgets and the solution can be built up as needed to provide a total backup solution for both Servers and Workstations.

 

Interesting facts

94% of companies that suffer catastrophic data loss without backup close within two years

* Pricewaterhouse Coopers

15,000 hard drives fail every day

* Pricewaterhouse Coopers

The median cost of downtime for an SMB is £8,500 per day

* Symantec

 

How it works

Our automated cloud backup and recovery services deliver complete data protection so you don’t have to worry about data loss, network failures, costly downtime, or even worse a complete shutdown of your company.

Today’s businesses rely on technology to get it done -- collecting, retaining and transmitting limitless amounts of data on a daily basis. Without the right data protection plan in place, recovering your data may be impossible, or just too costly, time consuming and damaging.

 

Kude covers all your data types

Files and
Folders

Recover from the accidental deletion of any document, spreadsheet, or folder.

Exchange, SQL and
System State

Enable backup and recovery of Exchange, SQL data, and System State.

Complete System
Images

Recover from hard drive crashes and computer viruses.

VMware and
Hyper-V images

Restore full VM images from the cloud back to your host or our site.

 

Our KUDE Software is highly secure and reliable and scales to meet your business’ unique needs.

EASE OF USE

  • Quick Start

    Set up is fast. And if you have a lot of data to backup initially, we can provide seeding services without tying up available bandwidth.

  • Automatic Backups

    We can schedule your backups to happen whenever you want, ensuring your RTO (recovery time objective) goals are always achieved.

  • Manage Local and Offsite Backups

    Our flexible solution allows for any of your data to be stored online and/or saved to local storage – including your physical machines and your virtual machines -- eliminating the need for multiple backup solutions.

SECURITY

  • HIPAA- and FINRA- compliant encryption

    Files are secured using 256-bit AES encryption and a private encryption key. SSL technology is used in data transmission. Your data is protected both onsite and over the Internet, ensuring industry compliance.

  • Off-site Storage

    Data is stored in two, SSAE 16 Type II compliant datacenters with redundant storage and biometric security. We also have access to a Canadian data center if needed.

  • Robust, Flexible Archiving

    Data-archiving settings allow historical data to be saved as long as you need and meet applicable compliance standards.

BUSINESS GRADE

  • Multiple Revisions

    Store an unlimited number of versions of the same file so there’s no fear of accidental deletion or overwriting a file.

  • Reporting and Notifications

    We can send you notifications that your backups have completed successfully, including detailed statistics, or we can setup a customer portal so you can see the technology in action.

  • Multiple Device Support

    Our solution lets you back up a single computer or server, multiple computers, laptops or even multiple offices.

Common objections

  • In exchange for free storage, users often give up actual ownership of their data.

  • Customers assume that restorations from backups are instantaneous.

  • Have you tested your current recovery solution? Doing so will reveal that process’ weaknesses.

  • More often than not, you get what you pay for.

  • Consumer-grade cloud backup may be just fine for storing personal files or family photos, but they do not offer true data protection.

  • Corporations must adhere to legislative demands, industry regulations, and larger financial implications.

  • Consumer-grade services cannot meet the data recovery needs of a business and many times prove unreliable.

  • In today's business environment, too many risks exist for this to be a worthwhile long-term strategy.

  • Manually conducting tape backups means the process occurs irregularly, if at all.

  • It’s far too easy to lose a tape, either by accident or theft.

  • Tape restores are not always reliable and consistent, making the risk of data corruption or loss far too serious.

  • Anyone who has ever managed their personal banking online has already performed a sensitive task in the cloud.

  • In addition to saving time and reducing costs, a recent study commissioned by Microsoft Corp. found that SMBs in the U.S. who are using a cloud service are also realizing significant privacy, security and reliability advantages over companies that do not use cloud services. The study notes that 94% of the SMBs polled who are using one or more cloud services have gained security benefits they did not get from former on-premises technology.

  • Compared to some services, yes, but how much would it cost in downtime to restore a backup from a unreliable source.

  • Our solution is setup and forget. The system takes care of itself and does not rely on end user interaction to complete backup tasks.

  • Remember that there will almost always be a cheaper solution out there... but you get what you pay for.

  • Business interruptions don’t occur on schedule and by leaving yourself unprotected or under protected for a long period of time, you will compound the financial risk you could incur.

  • Downtime, for example, is a huge financial burden, with revenues lost every minute a business is not operating normally.

  • Hard costs – employee salary, property taxes, and utilities - are a major contributor to lost funds, but soft costs – the money your business could have been earning if it hadn’t lost a crucial file or data access – also add up.

  • Not if you look at it in a black or white view. However if your conventional backup solution relied on the replacement of older defunct hardware to restore, your backups could become potentially useless or you could be held at the mercy of unscrupulous hardware vendors to pay over the odds for replacement equipment. KUDE can spin up a virtual machine on any compliant hardware in minutes.

  • If your Server was destroyed in a fire or stolen, your tape backup solution would be useless until similar or identical hardware was found. Worse still if the hardware is not available, you may have to start from scratch.

  • In a single server environment, sourcing and setting up a replacement server, then restoring your companies data could take weeks.

Consultancy

From start to finish, we can guide you through all your IT requirements

Unigold can support and guide your in-house staff when there is a need to obtain external and objective guidance. We provide impartial advice in a number of technical and business areas.

 

As a totally independent consultancy practise, we provide our clients with cost effective information technology solutions that match their real business needs, enhance their competitiveness and provide them with an excellent return on their investment.

We have no vested interest in any particular brands of hardware or software. Our Teams are committed to planning and developing many types of business network, overseeing their installatation and providing the training and ongoing support that ensures their continuing successful operation, even as their working environments inevitability change over time. To achieve this, they utilise whatever resources are most appropriate to the individual project.

We are committed to achieving a close working relationship with all our clients and with several premier vendors whose products we recommend and services we use on our clients behalf.

 

We believe that business relationships are for the long-term and that our commitment to each and every project we undertake must reflect that.

Without exception, we manage our clients projects with no preconceptions about the solution that we will recommend and implement. We start the process by undertaking a thorough 'requirement study' and before we consider possible approaches we review this study in detail with the clients team.

This process ensures that our solution will fully meet their true operational needs and that we have mutual agreement on the criteria which will define success. Only then do we consider what will give an optimal result in terms of system development, hardware, configuration, software and interfaces.

Again, at the development stage, we work together to achieve mutual agreement; this time, on the form and time-scale in which the project will be completed. Then we can proceed rapidly and with shared confidence to set up the necessary implementation operations, training and lifetime support.

 

Support

From start to finish, we can guide you through all your IT requirements

Do you ever find that paying for your technology support gets expensive?

Have you ever been concerned about the unpredictable costs associated with supporting your IT when there’s something that needs to be fixed?

Are you concerned about the significant costs associated with a major system failure?

Do you need someone to respond quickly if your system goes down?

Do you want a technology company that plans ahead for your needs, one that has a vested interest in the functionality of your technology, or one that truly has your best interest in mind?

 

If you answered yes to any of these questions, then Unigold has the solution for you! To answer this need, Unigold offers its flagship product, the System Maintenance Agreement, a truly unique service in the Information Technology industry. The system maintenance agreement is tailored to our clients in the small and medium business market that are either not large enough to hire their own manager of information systems (MIS) or have an MIS that needs assistance in supporting their IT.

What if you could pay the same amount each month for all of your technology support? Unigold prices System Maintenance Agreements based upon the amount of computers in your office, and, when available, prior experience. Our goal is to cost our clients 50% of what their charges would have been had they not been covered under a System Maintenance Agreement.

 

The System Maintenance Agreement allows you to manage your technology costs in a way that is both easy to understand and easy to budget. It affords you unlimited support and parts replacement for one fixed price per month. Prices are locked in, so you know exactly what your cost for support will be. Plus, by combining all of our services into one support agreement, we are able to provide you with a comprehensive services plan that covers both reactive and proactive services for a reasonable, recurring monthly charge.

Finally, you don’t have to worry about the hourly rate hanging over your head, you can have proactive support rather than reactive you can work with a company that actually has a vested interest in making certain that your network is working properly, your staff can call for technology support whenever they need it without having to worry about the cost of a service call, and much more.

Sales

From start to finish, we can guide you through all your IT requirements

Whatever your I.T. needs, Unigold can source, supply, configure, install, support and maintain your equipment meaning we can project manage the work from start to finish. No I.T. job is too big or too small. By looking after your equipment this way we know how your equipement works and how best to implement and utilise it.

Our success has come from combining a fresh approach (like really getting to know your business inside out), with fantastic people (who won't rest until you're happy) and some really clever technology (like Unigold's iAssist - software that helps us to solve problems before they happen).

It's not just your run of the mill equipment. We have experience working with most types of hardware and software systems and applications.

Matt Gaskin - Director

Our Professional Services team provides in house technical expertise in all key areas of Information Communication Technology (ICT), from Systems and Networking through to IP Telephony and Application Integration.

We can provide the right engineering solution whatever the requirement, from the simplest project to the most complex migrations, implementations and optimisations.

The team is made up of multiple professionals at all levels, from Junior Engineer to Senior Consultant. Our wealth of knowledge and experience is backed up by our engineers technical qualifications which include MCSE, CCIE, Master ASE and VCP. It is this depth of technical resource which enables us to position the best people on each project ensuring success and timely delivery. 

Because we work in small teams you'll get the attention you need, whatever the size of your business.

Where companies have an existing IT resource that does not cover network technology, we can work within the existing structure enhancing the quality and range of the IT resource.

Our close partnerships with ‘best of breed’ technology vendors such as Microsoft, Cisco and Dell further support our delivery of superior technical solutions which are designed specifically around our individual customer’s business and budgetary needs.

We as a company have formed a number of business partnerships to enable us to deliver the type of service you require. Our main goal for the future is to remain one of the county's premier support companies.