Circuits

Latest News > Uncategorized

  • If you’ve ever wondered what exactly “EOL” means, you’re in the right place. EOL stands for End of Life, a term that carries significant weight in the IT industry. In simple terms, EOL refers to hardware or software becoming so outdated that its manufacturer no longer supports it.

    Now, you might be asking, “Why should I care about EOL for my business?” That’s a valid question and one we’re here to address. Essentially, EOL can have profound implications for your business operations, posing risks to your critical data and processes. So, join us as we dive into EOL IT services, explaining its importance and shedding light on why organisations of all sizes must take it seriously.

    EOL Impact on Network Infrastructure

    In the digital age, the role of firewalls in safeguarding your business cannot be overstated. Think of a firewall as the gatekeeper of your network, controlling the flow of traffic in and out. Its primary job? To keep out the bad and let in the good.

    EOL Meaning

    Now, imagine what happens when this gatekeeper is no longer up to standard when it’s past its prime and falls out of manufacturer support. That’s where the term “End of Life” (EOL) comes into play. When a firewall reaches EOL, the manufacturer no longer provides updates, patches, or technical support.

    The Role of a Firewall in Cyber Security

    So, why does this matter? Well, consider the ramifications: without ongoing support, your firewall becomes vulnerable to evolving cyber threats. It’s like having a rusty lock on your front door while burglars are armed with high-tech tools. Once protected by a robust firewall, your network is now exposed to potential breaches, data leaks, and other malicious attacks. Consequences of unprotected firewalls can include:

    1. Loss of Patch Management:

    Without manufacturer support, updates and patches for security vulnerabilities are no longer provided. Unpatched vulnerabilities create entry points for cyber threats, leaving your network exposed to attacks.

    2. Lack of Bug Fixes:

    Unsupported firewalls do not receive fixes for software glitches or errors (bugs). Unresolved bugs can lead to system instability, performance issues, and potential security vulnerabilities.

    3. Absence of Hardware Warranty:

    When a firewall reaches EOL, any existing hardware warranty expires. In the event of hardware failure, there’s no recourse for replacement or repair from the manufacturer, potentially resulting in costly downtime for your business.

    4. Limited Technical Support:

    Without manufacturer support, technical assistance for troubleshooting and resolving issues is severely restricted. IT providers may face challenges in addressing firewall-related issues effectively, leading to prolonged downtime and increased vulnerability to cyber threats.

    Importance of Servers Remaining Within Support

    Your server is the backbone of your network infrastructure, the central hub that orchestrates data flow and empowers your business operations. It’s the digital nerve centre where critical applications reside, files are stored, and communication and collaboration thrive. In essence, your server is the heart and soul of your IT ecosystem.

    Now, imagine what happens when this vital component falls out of support, reaching its End of Life (EOL) status. The implications can be far-reaching and significant, posing risks to your business continuity and security.

    1. Security Vulnerabilities:

    Servers that are no longer supported by their manufacturer miss out on essential security updates and patches. Without these updates, your server becomes susceptible to cyber threats, leaving your business data and sensitive information at risk of compromise.

    2. Software Incompatibility:

    Newer applications and software are optimised to run on the latest operating systems. When your server is running on an outdated or EOL operating system, compatibility issues arise, hindering your ability to leverage new technologies and advancements in software capabilities.

    3. Compliance Concerns:

    Compliance with industry standards and regulations is paramount in regulated industries such as healthcare and finance. Operating servers on EOL software may lead to non-compliance with data protection regulations such as GDPR or PCI-DSS, exposing your business to potential fines, penalties, and reputational damage.

    4. High Operating Costs:

    Maintaining and supporting servers running on EOL software can incur significant expenses. The cost of patching outdated systems or dealing with system failures may outweigh the cost of investing in newer, supported hardware and software solutions.

    5. Poor Performance and Reliability:

    Ageing servers running on EOL software are prone to performance degradation and reliability issues. Downtime caused by server failures can disrupt business operations, leading to lost productivity and revenue.

    Proactive EOL IT Services Management

    When it comes to technology, change is constant. Hardware ages, software evolves, and cyber threats become increasingly sophisticated. In this landscape, the concept of End of Life (EOL) looms large, presenting both challenges and opportunities for businesses. While it may be tempting to adopt a reactive approach, addressing EOL issues as they arise, proactive EOL management offers a host of benefits that can safeguard your business and propel it forward.

    By keeping hardware and software systems up-to-date with the latest patches and updates, businesses can fortify their cybersecurity defences, safeguard sensitive data, and minimise the risk of breaches.

    Proactive EOL management enables businesses to optimise budget allocation, avoiding sudden expenses associated with emergency replacements or unplanned downtime. By forecasting and planning for EOL upgrades and replacements, organisations can allocate resources strategically, maximising the return on their IT investments. 

    Embracing proactive EOL management empowers businesses to future-proof their IT infrastructure, adopting scalable, flexible solutions that can adapt to evolving technology trends. In essence, proactive EOL management isn’t just about mitigating risks; it’s about positioning businesses for growth, resilience, and success in an ever-evolving digital landscape.

    Secure Your Digital Future with Proactive EOL Management

    Proactive management of End of Life (EOL) assets is essential for businesses aiming to navigate the complexities of the digital age with confidence and resilience. By prioritising proactive EOL management, organisations can fortify their cybersecurity defences, enhance operational efficiency, ensure regulatory compliance, and optimise their IT investments. 

    If you’re ready to take proactive steps to safeguard your business against EOL risks and bolster your cybersecurity, we’re here to help. Contact us today for expert guidance on EOL management and discover how our comprehensive cybersecurity services can protect your business in an ever-evolving threat landscape.

    EOL IT Services FAQs

    What does EOL stand for?

    EOL stands for End of Life. In the context of IT services, it refers to the point at which hardware or software is no longer supported by its manufacturer.

    How can I tell if my hardware or software has reached EOL?

    Manufacturers typically announce EOL dates for their products, and they may provide notifications or documentation regarding the end of support. Additionally, your IT provider can help assess the status of your hardware and software and advise on EOL management strategies.

    How can Odyssey help with EOL management and cybersecurity services?

    Odyssey offers expert guidance on EOL management, including assessing the status of your hardware and software, developing proactive upgrade plans, and implementing robust cybersecurity solutions to protect your business from evolving threats. Contact us today for personalised assistance tailored to your business needs.

    Related Articles 

    MOVE YOUR DATA TO THE CLOUD

    PROTECT YOUR DATA

  • In recent years, cloud computing has revolutionised the way businesses approach IT infrastructure, becoming a cornerstone of modern operations. The shift towards cloud-first strategies has been accelerated by global events, such as the COVID-19 pandemic, prompting organisations to embrace the flexibility and scalability offered by cloud solutions. However, amidst the buzz surrounding “The Cloud,” some confusion remains. At Odyssey, we understand the importance of cloud deployment in empowering businesses to leverage technology effectively.

    Learn more about cloud deployment in our guide, and don’t hesitate to get in touch for more information and advice. 

    Understanding The Cloud 

    Before we dive any further into cloud deployment, let’s go back to basics to understand what the cloud is. At its core, the cloud refers to a network of remote servers hosted on the internet rather than on-premises infrastructure. These servers are designed to store, manage, and process data, run applications and deliver various services to users over the internet.

    One of the fundamental aspects of cloud computing is its on-demand availability, allowing users to access computing resources, such as storage, processing power, and applications, without the need for direct management or ownership of physical hardware. This accessibility is facilitated through a pay-as-you-go model, where users only pay for the resources they consume, similar to utility billing.

    The cloud operates on a shared infrastructure model, where multiple users or organisations can utilise the same pool of computing resources simultaneously.

    What is Cloud Deployment?

    Cloud deployment involves getting your computer systems, like servers and storage, set up and running on the internet instead of in your own building. You decide on the best setup for your needs, whether it’s using a public cloud service, setting up a private cloud just for your company, or a combination of both. Essentially, it’s like shifting your IT operations to a virtual space where you can manage everything online easily.

    3 Cloud Deployment Models 

    Cloud deployment models represent different configurations of how cloud computing resources are provisioned, managed, and accessed. These models play a crucial role in shaping the infrastructure and operations of businesses, offering varying levels of control, security, and customisation. Let’s explore the main cloud deployment models and their relevance to businesses:

    1. Public Cloud:

    In the public cloud deployment model, computing services are provided by third-party cloud providers over the Internet. These services are shared among multiple users or organisations, allowing them to access computing resources on demand.

    Public clouds offer scalability, flexibility, and cost-effectiveness, making them ideal for startups, small businesses, and enterprises alike. Businesses can leverage the pay-as-you-go model to scale resources based on fluctuating demands without the need for upfront investments in hardware or infrastructure.

    2. Private Cloud:

    Unlike the public cloud, a private cloud is dedicated exclusively to a single organisation. It can be hosted on-premises or by a third-party provider, offering greater control, security, and customisation options.

    Private clouds are suitable for organisations with specific compliance, security, or performance requirements. They provide granular control over infrastructure and data, making them ideal for industries such as finance, healthcare, and government, where data sovereignty and regulatory compliance are paramount.

    3. Hybrid Cloud:

    A hybrid cloud deployment combines elements of both public and private clouds, allowing data, applications, and workloads to be seamlessly shared between them. This model provides the flexibility to leverage the scalability of the public cloud while maintaining sensitive data or critical workloads in a private environment.

    Hybrid clouds offer the best of both worlds, enabling businesses to optimise performance, cost, and security based on their specific needs. They are particularly beneficial for organisations undergoing digital transformation, allowing them to modernise legacy systems while retaining control over sensitive data and applications.

    Cloud Computing Models

    Cloud computing service models define the type of cloud services provided to users and how they are delivered. These models offer businesses different levels of management, flexibility, and control over their IT infrastructure and applications.

    Infrastructure as a Service (IaaS):

    IaaS provides users with virtual computing resources over the internet, including servers, storage, and networking infrastructure. Users can rent these resources on-demand, paying only for what they use, without the need to manage physical hardware.

    Platform as a Service (PaaS):

    PaaS offers a platform for developing, deploying, and managing applications over the Internet without the need to manage the underlying infrastructure. It provides tools and services for application development, such as databases, middleware, and development frameworks.

    Software as a Service (SaaS):

    SaaS delivers software applications over the internet on a subscription basis. Users access these applications through a web browser or API without the need for installation or maintenance. Examples of SaaS applications include email, customer relationship management (CRM), and productivity tools.

    By understanding the cloud service models, businesses can make informed decisions about how to harness the power of the cloud to drive innovation, streamline operations, and accelerate growth. Whether building scalable infrastructure, developing and deploying applications, or accessing software solutions, the cloud provides a flexible and scalable platform for businesses to thrive in today’s digital era.

    At Odyssey, we specialise in delivering expert IT and cloud services tailored to businesses of all sizes. If you’re looking to embark on your cloud journey or need guidance on optimising your existing cloud infrastructure, we’re here to help. Get in touch with us today for more expert advice and personalised assistance in unlocking the full potential of cloud computing for your business.

    Frequently Asked Questions 

    What are the benefits of using the cloud?

    Cloud computing offers several benefits, including scalability, flexibility, cost-efficiency, accessibility, and improved collaboration. It allows businesses to scale resources up or down based on demand, access applications and data from anywhere with an internet connection, and reduce upfront infrastructure costs.

    Is the cloud secure?

    Security is a top priority for cloud providers, who implement robust measures to protect data and infrastructure. However, it’s essential for businesses to implement proper security practices and protocols to ensure the safety of their data and applications in the cloud.

    How can businesses migrate to the cloud?

    Businesses can migrate to the cloud by assessing their current IT infrastructure, identifying workloads suitable for migration, selecting the appropriate cloud deployment model and service model, and implementing a migration strategy with the help of cloud experts or service providers.

    At Odyssey, we can help you make the migration process simple. Contact us today to learn more.

    Related Articles 

    Types Of Internet Connectivity For Your Business

    Move Your Data To The Cloud

    What Is The Cloud?

  • Choosing the right connectivity for your business can be a challenge. With many choices, how do you know which type is right for your business. Here we outline the different types of connectivity, how infrastructure plays a part, and what you would be paying for.

    1. Internet Connectivity:
      • Description: Internet connectivity refers to the ability of devices to access the World Wide Web and other online services using Internet Service Providers (ISPs) and internet infrastructure.
      • Types of Internet Connections:
        • DSL (Digital Subscriber Line): Uses telephone lines to provide internet access. Speeds can vary depending on distance from the provider’s central office.
        • Fiber Optic Internet: Utilises fibre optic cables to transmit data at high speeds. Offers faster and more reliable connections compared to DSL and cable.
        • Satellite Internet: Provides internet access via satellite communication. Suitable for remote areas where traditional wired connections are unavailable.

    Local ISP Infrastructure: The quality and reliability of internet connectivity depend on the infrastructure provided by local ISPs. Areas with better infrastructure may have faster and more reliable internet connections.

    Last-Mile Connectivity: The “last mile” refers to the final leg of the telecommunications network that delivers services to customers’ premises. In areas with poor last-mile connectivity, users may experience slower speeds or service outages.

    • What You’re Paying For:
      • Access to the internet backbone.
      • Bandwidth and speed of data transmission.
      • Data usage allowances or unlimited access.
      • Additional services such as email accounts, web hosting, and security features.
    1. Local Area Network (LAN) Connectivity:
      • Description: LAN connectivity enables devices within a confined geographical area, such as a home, office, or campus, to communicate and share resources.
      • Types of LAN Connections:
        • Ethernet: Uses wired connections and Ethernet cables to connect devices within a LAN.
        • Wi-Fi (Wireless Fidelity): Enables wireless connections between devices using radio waves.

    Wired Infrastructure: LAN connectivity relies on wired infrastructure such as Ethernet cables and switches. The quality of these components, as well as the layout and design of the network, can affect performance and reliability.

    Wi-Fi Interference: In densely populated areas or locations with many wireless networks, Wi-Fi performance may be affected by interference from neighbouring networks, physical obstructions, or electronic devices.

    • What You’re Paying For:
      • Network infrastructure including routers, switches, and cables.
      • Software licensing for network management tools.
      • Maintenance and support services.
      • Security measures such as firewalls and antivirus software.
    1. Wireless Connectivity:
      • Description: Wireless connectivity allows devices to communicate without the need for physical cables, using wireless protocols such as Wi-Fi.
      • Types of Wireless Connections:
        • Wi-Fi: Provides wireless internet access within a certain range of a Wi-Fi router or access point.

    Wi-Fi Coverage: The layout of buildings, the presence of walls and other obstacles, and the placement of wireless access points can all impact Wi-Fi coverage and signal strength.

    Cellular Coverage: Local terrain, building materials, and distance from cellular towers can affect the strength and reliability of cellular signals. Rural or remote areas may have limited cellular coverage.

    • What You’re Paying For:
      • Wireless infrastructure including routers, access points, and antennas.
      • Internet service if Wi-Fi is used for internet access.
      • Device costs for wireless-enabled devices.
      • Maintenance and support services.
    1. Cellular Connectivity:
      • Description: Cellular connectivity allows devices to access the internet and other services via cellular networks operated by mobile carriers.
      • Types of Cellular Networks:
        • 2G, 3G, 4G LTE, 5G: Different generations of cellular networks offering varying speeds and capabilities.

    Cell Tower Density: The density of cellular towers in an area affects signal strength and coverage. Urban areas typically have more cell towers, providing better coverage and higher data speeds compared to rural areas with fewer towers.

    Obstructions: Natural or man-made obstructions such as hills, buildings, or foliage can block or degrade cellular signals, leading to dead zones or poor reception in certain areas.

    • What You’re Paying For:
      • Mobile service plans including data, voice, and text allowances.
      • Device costs if purchased through a carrier.
      • Roaming charges for international use.
      • Additional services such as device insurance and premium content subscriptions.
    1. Satellite Connectivity:
      • Description: Satellite connectivity provides internet access and communication services via satellites orbiting the Earth.
      • Types of Satellite Connections:
        • Satellite Internet: Offers internet access in areas where terrestrial broadband is unavailable.

    Line of Sight: Satellite dishes require a clear line of sight to the satellite in orbit. Buildings, trees, or other obstructions can interfere with the signal, affecting the quality of satellite connectivity.

    Weather Conditions: Satellite signals may be affected by adverse weather conditions such as heavy rain, snow, or fog, leading to signal degradation or temporary service interruptions.

    • What You’re Paying For:
      • Subscription fees for satellite internet.
      • Equipment costs for satellite dishes, modems, and receivers.
      • Installation and setup charges.
      • Data usage allowances and additional charges for exceeding limits.
    1. Ethernet Connectivity:
      • Description: Ethernet connectivity involves wired connections using Ethernet cables, commonly used for local networks and internet connections.
      • Types of Ethernet Connections:
        • Ethernet LAN: Connects devices within a LAN using Ethernet cables and switches.
        • Ethernet WAN: Provides high-speed internet access using Ethernet connections.

    Physical Infrastructure: The quality and reliability of Ethernet connectivity depend on the physical infrastructure, including Ethernet cables, switches, and routers. Poorly maintained or outdated equipment can lead to network issues and downtime.

    Local Network Configuration: The configuration of the local network, including network topology, VLANs, and quality of service (QoS) settings, can impact performance and prioritization of network traffic.

    • What You’re Paying For:
      • Internet service fees if Ethernet is used for internet access.
      • Network infrastructure including Ethernet switches, routers, and cables.
      • Installation and configuration costs.
      • Maintenance and support services.

    Each type of connectivity has its own characteristics, advantages, and costs associated with it, catering to different needs and preferences of users and organisations.

    Local infrastructure plays a crucial role in determining the quality, reliability, and availability of different types of connectivity. Factors such as the presence of local ISPs, the condition of wired and wireless infrastructure, and environmental considerations all influence the overall connectivity experience for users and businesses in each area.

  • Whether you’re ready or not, it’s happening!

    In 2017 BT announced Public Switch Telephone Network (PSTN) and the Integrated Services Digital Network (ISDN) would no longer exist.

    “Why” I hear you say…

    Many phone lines today are using copper cables and unfortunately, both the PSTN and ISDN are becoming increasingly pressurised to meet the demands of the ever evolving and fast paced business environment that we see today. 

    With the switch off happening in December 2025, we are set to see fixed telephone networks replaced with digital systems such as IP telephony and Voice over internet protocol (VoIP).

    So ultimately, whilst this is a good thing, I’ve listed a few details below to help you to understand it a little more.

    Will My Phone Lines Stop Working?

    Yes, all analogue, ISDN2, and ISDN30 platforms will be retired in 2025 so if your business is currently using one of these legacy platforms to deliver your telephone calls you need to make sure you have a plan in place for the switch off.  Ensure your business telecoms are unaffected by changes to the wider network with High Quality internet, SIP compatible telephone systems and a robust data network infrastructure. 

    Does This Just Effect My Phone Lines?

    No, any technology that you have operating through your current PSTN, or ISDN will no longer function. This may include alarm systems, lifts, and door entry systems to name a few.

    What Should I Do?

    Start planning now! If you’re not ready for the switch off when it happens, your business will suffer. Ultimately, leading to operational issues. 

    Your plans should include the following.

    • Seek advice via an on-site infrastructure audit.
    • Understand if your current telephone system is suitable for your requirements moving forward. For example, are you gearing up for hybrid or remote working.
    • Some systems may be ready for the switch off, but it’s important to check if you need to upgrade to an internet-based solution to replace the current PSTN or ISDN.
    • You may need to upgrade to an IP based solution for compatibility. If you need to retain legacy equipment you may require analogue convertors.
    • Moving to IP enables you to embrace the latest collaboration tools. For example, you can integrate your telephone system with your Microsoft 365 environment, allowing you to make and receive calls from one application. 

    Is IP Better Than PSTN and ISDN?

    The quick answer is yes. IP telephony allows us to embrace the ever-evolving possibilities of cloud-based communication. You will have access to higher quality audio, resiliency, redundancy, and scalability.

    What is Best for My Business After PSTN and ISDN?

    There are many options. From a physical phone box with SIP trunking to a hosted cloud-based telephone system with IP handsets. We would work with you to understand your requirements.

    You may need to upgrade your internet connection to ensure that it has the capacity to withstand all your business tech requirements.

    How much will this cost?

    This is dependent on your requirements and current infrastructure. However, switching to a cloud-based system can save on expenditure in the long run. 

    Finally

    Being prepared now will prevent any big panic, as December 2025 really is just around the corner. With so many options available, talk to our experts to find the best solution for you. 

    To get yourself and employees ready for the switch off, get in touch with us today on 01642661888 or email us at wayne@odyssey.uk.

  • Supporting growth on Teesside

    MGL Group is a huge contributor to the ongoing Stockton-on-Tees Borough Council Waterfront redevelopment, undertaking the demolition of Castlegate Shopping Centre and the Swallow Hotel.

    For nearly 30 years Odyssey, based in Stockton-on-Tees, has been proud to support MGL Group.

    “We were extremely proud to be appointed for the demolition work enabling the Stockton Waterfront redevelopment. This is an important project which will breathe new life into the High Street and open out the town to the river; we are delighted to have played a role in that.

    Our relationship with Odyssey, above all, has delivered reliable business telephony; a key reason why we recently made the decision to upgrade again with Odyssey. Our last solution from them served us for over 20 years and we expect the new Mitel solution to do the same.”

    Mark Davison, joint chief executive of MGL Group

    Odyssey completed the installation of the fully hosted system across all MGL Group locations. By creating one global group solution, MGL can communicate efficiently and effectively regardless of where each person is located, via both physical and software phones. Odyssey successfully migrated MGL to the new Mitel solution using a team of experienced in-house engineers. There was zero down time and not a single lost phone call.

    “I have personally worked with MGL Group for the past 15 years, and am delighted to be able to continue our longstanding relationship. We know how vital our services are for clients like MGL and I am excited to see the new look Stockton town centre.”

    Freya App, head of customer success of Odyssey

    Odyssey now also offers a suite of IT solutions that delivers secure anytime, anywhere, any device access to business applications and data. The end-to-end IT solutions are delivered by Odyssey in partnership with Microsoft.

  • A better way to deliver business IT

    Technology never stands still, and at Odyssey Systems the team continually work to innovate with products and services for clients across the Northeast.

    Having delivered over 35 years of award-winning business telecommunications and connectivity, they have now successfully launched a new IT service.

    As we know the pandemic changed how businesses used technology, working from home because the new norm for millions of people. This has left a legacy of hybrid working, which accelerated need for secure, robust IT for business to control and manage their entire workforce regardless of user, device, and location.

    Odyssey Desktop is the flagship IT service that empowers businesses with anytime, anywhere any device access to applications and data. It is a complete, end-to-end solution delivered by Odyssey Systems in partnership with Microsoft, resulting in a perfect desktop blueprint every time, regardless of who the user is, where they are working from, and when they are logging in.

    Odyssey Desktop gives business owners total peace of mind for their business continuity, so in the event of fire, flood or even in the event of another pandemic, trading is not interrupted, and all business-critical data is backed up securely and therefore able to be restored quickly if needed, with minimal disruption to the business.

    Being a trusted technology expert, Odyssey clients have one point of contact that takes ownership.

    People just want IT to work, they need to focus on their business. Most find IT requirements are difficult to forecast, and decisions are often reactive when an issues arises from a blind spot in ownership. Clients who opt for this service understand that we are taking control and responsibility to ensure technology enables them to succeed.

    Matt Park Matt Park Technical Director
  • There are many good reasons why Odyssey Systems has been around for 35 years.

    The owner-managed business, with a solid reputation dating back to 1987, values good old-fashioned customer service – with a real person at the end of the phone who will answer within three rings.

    Odyssey Systems’ convergence of the traditional and the state-of-the-art is evident everywhere you enter its Preston Farm premises.

    Flat screen wallboards blink away, tracking the performance of all the firm’s clients’ services. But the décor also makes a firm nod to its history, with antique telephones dating as far back to the 1800s featuring in a boardroom media wall.

    Traditionally a provider of telecoms and internet services, the company has experienced increasing demand to provide IT services with the same level of award-winning customer service.

    “For many years, our clients have asked us to help with more than their telephony and internet,” says technical director Matthew Park.

    “We had always resisted, feeling that the way IT is traditionally delivered simply doesn’t work. Odyssey did not want to become part of the problem.

    “It is clear far too many businesses are using an outdated, inefficient, and ineffective approach to IT. Solutions are often sourced from many separate entities and treated as individual elements. Investment is usually erratic and reactive, with lines of responsibility blurred.

    “If we applied the same logic to any other industry, you realise how bizarre the status quo within business IT is. When you a buy a vehicle, you expect reliable, predictable and safe travel. Nobody buys hundreds of parts, an engine and gearbox, then fits everything together expecting the same result.”

    Their answer to this problem is Odyssey Desktop, which Matthew believes is a better way to deliver business IT. The service allows Odyssey to take total ownership of its clients’ technology, and in turn deliver significant business benefits. It is a complete, end-to-end solution delivered by Odyssey in partnership with Microsoft.

    “People just want IT to work, they need to focus on their business. Most find IT requirements are difficult to forecast, and decisions are often reactive when an issue arises from a blind spot in ownership,” Matthew says.

    Impressive – Odyssey Systems’ Preston Farm offices converge the traditional and the state-of-the-art. Picture: Cal Carey.
    Impressive – Odyssey Systems’ Preston Farm offices converImpressive – Odyssey Systems’ Preston Farm offices converge the traditional and the state-of-the-art. Picture: Cal Carey.ge the traditional and the state-of-the-art. Picture: Cal Carey.

    The team has been developing the service for several years and has recently a completed a multi-million-pound expansion of their existing infrastructure into London Docklands data centres.

    “Clients who opt for this service understand that we are taking control and responsibility to ensure technology enables them to succeed,” adds Matthew.

    “It’s on us, and we do not hide behind ticket systems. Our solutions enable us to answer the phone and meet clients in person, instead of wrestling a huge backlog of support enquires.”

    The service delivers benefits that are usually out of reach for smaller businesses accessing business apps and data from any modern device, anywhere. A consistent, secure experience with a perfect desktop blueprint regardless of who, when and where. Scalability to hundreds of users and sites. Rapid delivery of new users in minutes not months, and enterprise-grade security.

    “How many business leaders are 100 per cent confident they can recover from a ransomware event?” Matthew asks.

    “Data security isn’t just a button press. We bring industry-leading technology, decades of expertise and bulletproof process together to deliver next-level security, massively reducing the likelihood and impact of a breach.

    “We see businesses fall down with tech security time and time again. An old PC in a warehouse running Windows 7 can be the weak link that takes a whole company offline. Sixty per cent of businesses who become victims do so for this reason – a known vulnerability in software that hasn’t been updated.”

    As part of the service, Odyssey commits to the monitoring, assessment, and installation of updates for all software running on Odyssey Desktop, including operating system and client applications.

    “Insecure password practices are exploited in 81 per cent of cyberattacks,” says Matthew.

    “It’s human nature to take the path of least resistance, and unfortunately by default, that isn’t the path most secure. We provide tools to eliminate password reuse and allow management from one place, with secure sharing between users.

    “We also include and enforce multifactor authentication as standard to prevent 99.9 per cent of automated attacks.”

    The concept of being able to access the service anywhere on any device means it’s the perfect solution for business leaders looking for true peace of mind.

    Data backup and business continuity are built in. No data is stored on local devices and work can continue in the event of any disruption to business premises.

    Users can access the service via a web browser or app from the Google or Apple store. At office locations, Odyssey supplies secure all-in-one desktop Terminals and converters to re-task existing PC hardware.

    “To convert existing PCs to an Odyssey desktop terminal we remove any data stored on the existing device and replace the operating system with Odyssey SecureOS,” adds Matthew.

    “It’s a barebones environment with only one goal – to securely connect users to their Odyssey desktop. By doing this we extend the useful life of the hardware – two to three times is typical. This is particularly beneficial as Windows 11 requires a specific electronic chip that lots of older PCs don’t have.”

    Odyssey provides simple options for administrative users all the way to computer-aided designers. Everything is based on a predictable monthly cost with zero upfront investment delivering consistent, high-quality business IT.

    Some of Odyssey’s existing clients in the region include PD Ports, Charles Clinkard, Cleveland Containers and Nick and Gordon Carver Estate Agents.

    View original story on Tees Business

  • Matthew Smith, IT manager at Carmel College in Darlington talks about his satisfaction with his new telephone system and his reasons for choosing Odyssey Systems.

  • At Odyssey Systems we host a bi monthly ladies discussion group. This film was taken just before the 2015 general election, where we discussed what was important for us a working women.

  • Early 2016 saw Odyssey Systems move into new offices. After extensive refurbishment our Preston Farm headquarters features a dedicated video conferencing suite, technology demonstration area and a data centre facility.