Greg is based in Columbus, Ohio. A native of New Jersey, Greg is an avid Yankees, Devils, and Giants fan. He also spends MANY fall Saturdays cheering on his beloved Ohio State Buckeyes.
Greg is a coach, captain, and player for the Worthington Tigers of the Central Ohio Men’s Adult Baseball League.
During the summer, when Greg’s not on the baseball diamond, he fills his free time by going to concerts, exploring the Bourbon Trail in Kentucky, and taking part in the many outdoor events and activities Columbus has to offer!
Services
Cybersecurity
Managed Security (MSSP) with 24/7/365 availability to monitor systems, to back up data, to deter major events, and to respond and to recover from incidents
Security Assessments to identify your risks and recommend best-in-class solutions
Event management to respond to incidents, contain breaches, and to recover from major security events fast and effectively
Consultations to provide you with an ongoing cybersecurity strategy commensurate with the latest threat analysis
Managed IT
Consultations to help you look ahead and build a comprehensive technology roadmap
Cloud System Management to improve efficiency and productivity of your IT infrastructure
24/7/365 Support including virtual and on-site assistance
VOIP service, from consultation to solution recommendation, to implementation and to ongoing management
Digital Transformation
Consultations or immersion engagements to assess your goals, technology, and systems so we can customize a roadmap to transformation
Custom development of software, web, and mobile applications–both internal and customer-facing
ERP selection and project management services
Cloud virtualization to simplify database migration, improve data protection, and ensure business continuity
Systems and application modernization by updating and integrating technologies, as well as establishing a plan to efficiently make future replacements and improvements
One-Time Projects
Technology integrations that are time-consuming and demand specialized knowledge
System and security posture assessments to learn how applications are performing, identify weaknesses, and outline steps for improvement
Compliance gap assessments to see where to make business systems run more efficiently, effectively, and meet compliance requirements
Penetration and wireless breach testing (pentest) exposes vulnerabilities so you can proactively address risks and qualify for your cyber insurance coverage
Security training to help keep your teams up to date on compliance, data safety, cybersecurity dangers and best practices
Cloud migrations including microsoft 365 and other time-intensive migration projects