Services TI
Solutions and services for all technical and networking needs, offered by a reliable and experienced team.


Opt for the reliable services of professional and experienced technicians to ensure the proper functioning and performance of your IT equipment.
A complete service
Strategic management
Preventive maintenance
Offered services.
Even in the case of a quality infrastructure, it is important to maintain it and ensure regular monitoring so that it continues to provide the best performance, while aiming to minimize technical problems. that may arise. The CIS Group technical team offers quality support entirely dedicated to troubleshooting and technical maintenance of IT infrastructure. Whether it’s a new device or an existing device, trust the experts for efficient service that will keep you more productive.
Rely at all times on the qualified expertise of our technicians who ensure the good continuity of your activities. We are committed to offering you the best experience, remotely, by email or phone, as well as in person, to ensure that you get optimal performances.
We offer you high-quality hosting solutions. Our experts are with you every step with personalized service for your server hosting, cloud services, backups and secure management of all your data.
Discover the possibilities that best adapt to your industry, and to your real needs. We offer different types of servers (domain controller, messaging server, file server, application server, cloud servers, etc.) that optimally integrate with your network.
We offer virtualization, which consists in creating a software (or virtual) version of physical entities, such as applications, servers, storage systems and virtual networks, to help you reduce IT expenses while stimulating the efficiency an agility of your enterprise.
We can help you optimize the performance of your IT systems, through comprehensive management of all the required resources related to the proper functioning of IT services and systems, from initial planning through to delivery.
We are qualified to help you safeguard your IT structure with a whole set of cybersecurity strategies that prevent all unauthorized access to your organization’s assets, like computers, networks and data. They preserve the integrity and confidentiality of sensitive information by blocking access to hackers.
Our offer includes the sale and the after-sale service for applications like the Office 365 suite or the Kaspersky security suite (replacement plan, license renewal management). Afford access to a diversified range of cutting-edge applications, optimized in agreement with the evaluation of your needs.
We can offer you all the IT tools you need: computers, laptops, printers, etc. We also offer the diverse supplies and parts for the repair and maintenance of your devices, to keep your IT installations in perfect condition. Our team of experts can recommend the best tools for your needs.
Our IT team ensures the continuous upkeep of your IT installations through long-term planning of equipment procurement, but also by clearly defining the replacement cycle. We can provide help with the planning of equipment acquisition and assignment, with support, and with maintenance.
Packages Management of repairs, fleet of mobile devices and batteries
We also offer the service of managing your mobile equipment. Opt for peace of mind by letting the CIS Group IT team take care of managing your RMA requests, your fleet of devices and spare batteries.
Different packages are available to you.
RMA numbers
With the manufacturer’s contract: your team has direct and free access, both to request RMA numbers from the manufacturer and to follow up on inquiries
from the manufacturer
CIS, intermediary with the manufacturer
- CIS provides RMA numbers when you call customer service, and takes care of monitoring.
- You send the defective device to the manufacturer for repair, using the RMA label provided by our customer service, and you take care of providing the user with a device from your reserve.
- The manufacturer must return the repaired device to CIS within the prescribed period of receipt (generally 5 working days).
- Upon receipt of the device, CIS undertakes to validate the repair, to configure the device so that it is ready for use, and to return it to you within a maximum of 2 working days.
- If CIS finds that the device is not satisfactorily repaired, it returns it to the manufacturer. The customer is notified and the time limit is reset.
Annually
Management of spare devices by CIS
- We take care of the management of the fleet of devices and ensure the availability of spare equipment at the CIS offices (Saint-Jérôme).
- When a device is identified as defective, the process of sending a device from the spare bank is initiated.
- You will receive the device no later than the next working day (by email)
Annually (option Intermediate required)
Management of spare batteries by CIS
- CIS must have access to computer and printer management software (MobiControl or otherwise) to be able to monitor battery charge cycles.
- Using data from the management software and following the manufacturer’s recommendations, new batteries will automatically be sent to users when needed.
- Occasional battery issues will also be addressed by sending in a spare battery from the bank.
- A monthly battery usage report will be provided to the customer.
- When the battery bank reaches a critical level, a P.O. request is automatically sent to the customer for stock replenishment.
Annually (options Intermediate and Professional required)
Suppliers
Microsoft
HP
Dell
Lenovo
LG
Samsung
Philips
Kaspersky
ESET
Symantec
Brother
Lexmark
Motion
Getac
Canon
Xerox
D-Link
WatchGuard
APC
Tripp Lite
TP-Link
Veeam
StarTech
QNAP
Western Digital
Seagate
Toshiba
Acer
ASUS
Logitech
Intel
AMD
Quantum
Jabra
Poly (Plantronics)
TRENDnet

The security of your information is our top priority.
CIS Group is an ISO / IEC 27001 certified company. This is a global standard (which includes ISO / IEC 27002 best practice guidelines) for managing the security of information assets. It provides the requirements for an Information Security Management System (ISMS). ISMS is a systematic approach to managing and securing sensitive information, involving staff and applying risk management processes to IT systems.


