Hardware Sales

Hardware Sales


Mobiles



Security Appliances

Hardware Sales
At Catapult TEK, we know software and the hardware needed to run it. We have years of experience custom designing end-to-end IT solutions to satisfy the needs and budgets of our clients. We are vendor agnostic and look for the best fit for components within the overall client environment. We also work with other vendors that you might already use for some services. As our tagline says, “we make IT work for you”.
We did not start by selling hardware and later add services. We started with services and our clients asked us to help with their hardware selection, configuration and installation. We now provide IT architecture and design services + hardware + software + configuration + installation + environment preparation + 24×7 management and maintenance services (NOC) + special projects + conversions + training + warranty services + secure destruction services + 24×7 US based help desk + 24×7 security operations center (SOC).
Some of our products and services are listed on the tabs below. Please give us a call to discuss your specific needs.

Whether you need a single workstation for your own use or hundreds for a large department refresh, our staff can procure, configure and install just what you need. Some of your options include:
- High-end graphics workstations
- Mobile workstations
- Space saving small form factors
- Ultralight notebooks
- Laptops
- Lenovo, Dell, HP and others
- Full custom hardware configuration; software installation, delivery, network integration, user configuration and onsite installation (including wiring management)
- Windows, Macs
- Warranty servicing
- Complete managed services available including software patching, backups and antivirus
- DOD equipment disposal
- Up to 24/7 US based Help Desk
- Onsite Installation
- Let us show you how easy and fast you can have new working endpoints

Mobiles
Modern work environments must support and integrate with personal and company owned mobile devices. We will incorporate your entire technology needs into your solutions including:
- 2 in 1 notebook
- Tablets
- Phones
- Your direct purchase or through us
- Full custom configuration to your needs/specs
- Complete managed services available including software management, remote data removal and equipment tracking

Small environments may have a single server while larger environments may have dozens or even a hundred interconnected servers in climate controlled high security environments. In either case, we will make sure your data is secured, protected and backed up. These items are only a few of our offerings in a server environment (physical, virtual, cloud, hybrid):
- Domain controllers
- File servers
- Backup/DR/Business continuity
- Application servers
- Virtualization
- Database Servers
- Mounting Racks and Enclosures
- Server Room Buildouts; UPS, AC, Cabling, Network Switches, Routers and More
- 24/7 NOC Services (including software patching, backups, antivirus and performance monitoring)
- 24/7 SOC Services
- Backup monitoring and recovery

Computers that don’t connect to anything else are long gone. Technology usefulness today is highly dependent on a network of shared computers and communications capabilities. Data must be shared with authorized users yet protected from those that are not. In many cases, staff productivity is directly related to the number and types of other data sources they connect with. We are network experts and proficient with these items and more:
- Switches
- Routers
- Modems
- Low voltage wiring
- Network monitors
- UPS and power management
- ISP and POE integration
- High speed wireless networks
- WAPS
- SDWAN
- 24/7 performance monitoring
- Copper, fiber

Security Appliances
Data and network security are not casual or part time endeavors anymore. Every environment needs specialized security equipment, software and the experts to constantly monitor events and detect security events and respond with action. Our expertise and SOC (Security Operations Center) address security concerns in the following ways:
- Hardware and software firewalls
- Full 24/7 SOC capabilities
- Full log diagnostics
- Intrusion prevention
- Reputation enabled defense
- WebBlocker
- SpamBlocker
- Gateway AV
- Application control
- APT Blocker
- Data Loss Prevention (DLP)
- Network discovery
- Multi factor authentication
- DNS protection