Close this search box.

Southeastern U.S.

Map of sales territory in the south east.

Corinne Fisher

Account Executive II

Corinne Fisher is based in Virginia Beach, Virginia. She grew up in a small town in New Hope, Pennsylvania near Philadelphia making her a huge Eagles fan.

Corinne graduated Old Dominion University where she received her Bachelor of Science degree in Marketing. She was a part of the ODU Women’s Club Soccer team as well as her sorority Alpha Phi.

For fun, you’ll find Corinne playing on her co-ed soccer team, beach cruising on her bike at the beach, or boating around with friends.



Managed Security (MSSP) with 24/7/365 availability to monitor systems, to back up data, to deter major events, and to respond and to recover from incidents

Security Assessments to identify your risks and recommend best-in-class solutions

Event management to respond to incidents, contain breaches, and to recover from major security events fast and effectively

Consultations to provide you with an ongoing cybersecurity strategy commensurate with the latest threat analysis

Managed IT

Consultations to help you look ahead and build a comprehensive technology roadmap

Cloud System Management to improve efficiency and productivity of your IT infrastructure

24/7/365 Support including virtual and on-site assistance

VOIP service, from consultation to solution recommendation, to implementation and to ongoing management

Digital Transformation

Consultations or immersion engagements to assess your goals, technology, and systems so we can customize a roadmap to transformation

Custom development of software, web, and mobile applications–both internal and customer-facing

ERP selection and project management services

Cloud virtualization to simplify database migration, improve data protection, and ensure business continuity

Systems and application modernization by updating and integrating technologies, as well as establishing a plan to efficiently make future replacements and improvements

One-Time Projects

Technology integrations that are time-consuming and demand specialized knowledge

System and security posture assessments to learn how applications are performing, identify weaknesses, and outline steps for improvement

Compliance gap assessments to see where to make business systems run more efficiently, effectively, and meet compliance requirements

Penetration and wireless breach testing (pentest) exposes vulnerabilities so you can proactively address risks and qualify for your cyber insurance coverage

Security training to help keep your teams up to date on compliance, data safety, cybersecurity dangers and best practices

Cloud migrations including microsoft 365 and other time-intensive migration projects