California State Contractors License #1053415

Cabling that connects your organization

Switching & Routing Infrastructure

Today’s networks are requiring more power and bandwidth to each device than ever before. The most valuable changes are the advancement of UPOE and M-Gig technologies. UPOE is able to power anything from ceiling lights to wireless access points and is  changing how and what we connect to the internet. On the other hand the M-Gig specification is greatly expanding the amount bandwidth available on cat6 cables. 

Universal Power Over Ethernet (UPOE) extends the IEEE Power over Ethernet Plus (PoE+) standard to double the power per port to 60 watts. It can extend resilient network power to a broad range of devices, including virtual desktop terminals, IP turrets, compact switches, building management gateways, LED lights, wireless access points, and IP phones.

Multigigabit increases network bandwidth and speed without running multiple cables between switches and access points. Lower operational costs by getting more performance out of existing cabling infrastructure.

Wireless Infrastructure

Whether you are updating replacing or redesigning your network, our team of network engineers in here to assist you along the way. We bring a simple, yet powerful network design to power your organization. Our solutions are 5Ghz heavy and work well in high density environments.

The latest wifi standard will provide vast improvements in high density deployments and overall throughput. 

Get the most out of your network by contacting our engineers. Base IT’s years of experience will provide high preforming networks.

Network Security

Keeping your data protected is your number one goal as an IT professional. Base IT’s network audits help ensure your data in secure. 

  • Make sure all procedures are well documented
  • Review the procedure management system
  • Assess training logs and processes
  • Review security patches for software used on the network
  • Check the penetration testing process and policy
  • Test software which deals with sensitive information
  • Look for holes in the firewall or intrusion prevention systems
  • Make sure sensitive data is stored separately
  • Encrypt company laptop hard disks
  • Check wireless networks are secured
  • Scan for unauthorized access points
  • Review the process for monitoring event logs
  • Compile your report and send it to the relevant people