IT Support

ServiceCare is our premier IT support solution, delivering prompt, efficient and reliable technical support services, backed by an experienced team of IT, voice and network engineers.

Desktop and server support
Cloud, virtualisation and VDI
Storage, DR and Backups
Learn more

Telecoms and Voice

Hosted Telephony, VoIP solutions and corporate telephone systems. We provide a range of unified communications platforms and telecoms consultancy services.

SIP Trunking
Telecoms Consultancy
Learn more

Network Security

Firewalls, pro-active service monitoring,  web platforms and mobile device management. Our range of managed services can extend to every element of your business IT environment.

Network Segmentation
Learn more

Network Support

Multi vendor enterprise network support and consultancy. Switching, routing, MPLS and wireless solutions. Consultancy and managed service contracts.

Enterprise Networks
Wireless Networking
Learn more

Endpoint Security

Data Leak Protection (DLP), antivirus and malware defence, intrusion prevention system (IPS) and device control. Our security solutions extend from the network to the desktop, server and virtualised environments.

Learn more

Contact Us

Get in touch today to see how ServiceTech can benefit your business with a comprehensive range of tailored IT support and consultancy services. Our ServiceCare philosophy is at the core of our business, putting the customer first – and making IT work for you. Contact us

Tel : 01624 639420
Email : info@servicetech.co.uk
Learn more

Latest News

  • Power Routing with ShoreTel
    1st July 2016
    Power Routing is a powerful, simple to use feature of the ShoreTel IP Phone system that allows your users to customise their incoming call routing in a flexible manner. Users can opt to have certain callers divert to their mobile, change the routing...
  • Reach up for the clouds
    15th June 2016
    A survey of over 2,000 security professionals has found only 42% of organisations have policies in place that restrict or monitor the use of unsanctioned cloud applications. This figure is despite the fact that 53% of respondents said unauthorised ap...
  • How to defend against Ransomware
    13th June 2016
    Articles, Business
    More and more companies are being impacted by Ransomware. Not a week goes by where cyber-attacks, malware and ransomware are not featuring in the news. Unfortunately, this trend does not appear to be slowing down. There are a number of steps an orga...
  • USB Device DLP - Take ownership
    3rd August 2015
    Articles, Business
    Many organisations have a desktop estate that could range from an SMB with handful of desktops in a single site or an enterprise with several hundred (or thousand) workstations and laptops deployed across many sites. Take the example of an organisati...
  • The actuarial challenge of cyber security
    25th July 2015
    Articles, Business
    Risk assessment There are several ways of address the risks that originate from a risk assessment; you can avoid the risk entirely (withdraw), reduce or mitigate the risk, transfer the risk (e.g. insurance) or accept the risk. If you consider a...
  • IT secrets lurking in the shadows
    23rd July 2015
    Articles, Business
    Shadow IT is a term often used to describe a situation where IT systems; applications, software, devices, cloud services and similar solutions are used by an enterprise without the knowledge or approval of the business. This can present a security ...

Join our mailing list