Close this search box.

Northern IN and Western MI

Corscia Technologies Mid-Atlantic map.

Tom Alter

VP of Sales

Tom Alter was born and raised in Fort Wayne, IN. He is an avid sports fan who enjoys watching Notre Dame, the Chicago Cubs, the Chicago Blackhawks, and the Indianapolis Colts. Tom enjoys spending time with his family, going on vacations, and relaxing at the backyard pool. 

Tom is passionate about working with local nonprofits to assist the community. He was on the board of directors for a local nonprofit and is active in his church.



Managed Security (MSSP) with 24/7/365 availability to monitor systems, to back up data, to deter major events, and to respond and to recover from incidents

Security Assessments to identify your risks and recommend best-in-class solutions

Event management to respond to incidents, contain breaches, and to recover from major security events fast and effectively

Consultations to provide you with an ongoing cybersecurity strategy commensurate with the latest threat analysis

Managed IT

Consultations to help you look ahead and build a comprehensive technology roadmap

Cloud System Management to improve efficiency and productivity of your IT infrastructure

24/7/365 Support including virtual and on-site assistance

VOIP service, from consultation to solution recommendation, to implementation and to ongoing management

Digital Transformation

Consultations or immersion engagements to assess your goals, technology, and systems so we can customize a roadmap to transformation

Custom development of software, web, and mobile applications–both internal and customer-facing

ERP selection and project management services

Cloud virtualization to simplify database migration, improve data protection, and ensure business continuity

Systems and application modernization by updating and integrating technologies, as well as establishing a plan to efficiently make future replacements and improvements

One-Time Projects

Technology integrations that are time-consuming and demand specialized knowledge

System and security posture assessments to learn how applications are performing, identify weaknesses, and outline steps for improvement

Compliance gap assessments to see where to make business systems run more efficiently, effectively, and meet compliance requirements

Penetration and wireless breach testing (pentest) exposes vulnerabilities so you can proactively address risks and qualify for your cyber insurance coverage

Security training to help keep your teams up to date on compliance, data safety, cybersecurity dangers and best practices

Cloud migrations including microsoft 365 and other time-intensive migration projects

Resources By This Team Member