Computer One inspire a relationship built on trust. They have served us for 8 years and we trust their staff, their integrity and their technical knowledge. They support our critical business systems and play an important role in shaping our competitive advantage. Their expertise is something I don’t think we would get if we hired 2 or 3 people directly. I'm pleased to recommend them.
We are the kind of company that simply cannot afford to have our computers down; so we are prepared to pay for top class service, and that’s exactly what we get from Computer One. Whenever I have the slightest problem I make a call and they fix the issue fast.
One of our most recent projects was to create an accelerated and high performing Wide Area Network, capable of delivering voice and data over a combination of ADSL, Satellite and Cellular networks at remote locations around the country.
From the briefing in Brisbane to powering up the completed network on-site took just 14 days and it was a seamless experience. Our client came to us with a requirement, and we matched the technology and implemented a solution.
They said their previous IT consultancy, a globally-recognised Tier One provider, couldn’t even have completed its quote in that time. Now we provide a Managed IT Service to ensure that their ongoing IT requirements are catered for, without interruption.
We have the same skill sets and the same vendor relationships as a Tier One IT Consulting Company.
The difference with us is that you will engage directly with the person who can actually solve your problem.
We’ve tackled just about every challenge related to IT and delivered successfully. We work in Brisbane, Sydney, Melbourne, in remote deserts and tropical jungles. We’re a can-do kind of company.
You will find some case studies in our Industry Expertise section.
We have extensive experience in:
Shadow Brokers, an unidentified group of hackers popped up nine months ago claiming to have stolen the secret hacking techniques of a group linked to the American NSA. They provided some workable samples of exploits and tried to sell their treasure trove for up to 1 million bitcoins (A$1.6 billion) ever since. When no bidders were […]
According to IT News, transport giant Toll has received permission to inspect the contents of 8 USB devices it suspects were used to illegally copy its intellectual property by an ex-employee. Currently locked in a legal stoush with the former National Sales Manager for subsidiary NQX, Toll alleges that in the days immediately before his […]
Hot on the heels of the Mirai botnet of 2016 comes news of a new IoT malware, dubbed Hajime. As reported in Computerworld, Hajime is “like Mirai on steroids” with a more sophisticated method for command and control of compromised IoT devices based on a peer-to-peer network rather than a direct server connection. Estimates so […]