Case Studies
Please give us a call if you have any questions about our products and services.
VisionCTS
690 Kintner Parkway
Sunbury, OH 43074
(800) 596-1992
Take the Next Step
OBJECTIVE:
Technology and communications are critical to all modern businesses and organizations.
Unfortunately, there is a predominant mindset that technology is a cost center and simply a "necessary evil". Obviously, that sentiment is no longer true.
Primary Issues to Resolve
Appropriate Business Case – Technology must be designed with current and future needs in mind.
SOLUTION - In 2016, Vision CTS was approached by a local company to be their sole technology contractor for their new location. We were able to complete all technology requirements (including, but not limited to: data cabling, WiFi, network switches, router/firewall, hosted phones, backup and disaster recovery). Today, they are still using the same solution without any complications.
Uptime – Enterprise hardware and services are required for critical infrastructure. Redundancy is mandatory and all efforts need to be taken to overcome real and perceived failures.
SOLUTION - 1 year, 22 weeks, 4 days, 21 hours, 12 minutes, 2 sec... uptime data on school district's phone system. It has been up since installation and throughout all patching and updates. Technically, this data is true for the redundant system in the solution. In the event these both go down, their system is paired with our voice service where we can emergency call route their inbound calls on demand. This scenario helps overcome technical (hardware/software), power, and connectivity outages.
Improved Quality of Life – No system should add to workflow complexity or require a dedicated 24/7 team of experts to operate.
SOLUTION - Our access control and surveillance systems have a tight integration. For example, Vision CTS set a rule in the access control system to send an alert when an access card is declined. In addition, we automated the video camera at the door to take a snapshot of the event. Now, we (and the customer) know when someone is trying to gain unauthorized access and are able to potentially identify the individual making the attempt.
Results
Technology that is "set-it-and-forget-it", failure resistant and makes life better, certainly beats the alternative.