Tellerix

Custom IT Solutions + Management Services
At Tellerix, our solutions empower you to make the business-critical decisions that push your credit union toward a modern infrastructure, helping you transform operations faster to realize ROI sooner, and save you from your legacy technology.

With a finger on the pulse of emerging technology, we bring a complete industry perspective, helping your credit union remain modern, efficient, and relevant.

WHILE TECHNOLOGY CHANGES, YOUR NEED TO SERVE YOUR MEMBERS DOESN’T.

SOLUTIONS

  • PROJECT MANAGEMENT – On-demand CIO services and expert-level technology project management.
  • HOSTING SERVICES – Managed server hosting and systems management to streamline operations.
  • CYBERSECURITY – Complete risk management assessment with remediation of vulnerabilities identified throughout your network.
  • CORE MANAGEMENT SERVICES – Research and management of Requests of Proposals (RFPs) for core conversions, vendor due diligence, cost benefit analysis, industry needs assessments, and more.
  • NETWORK & TELECOM MANAGEMENT SERVICES – Managed services that will increase your operational efficiency and create significant cost savings.
  • ATM AND ITM FLEET MANAGEMENT SERVICES – Complete ATM or ITM management services to ensure stability and uptime for your fleet.

FAQs

The process begins with Tellerix assessing your current environment, making recommendations, and presenting the best possible solutions to move your organization forward.

Tellerix offers transformative solutions that integrate systems and automate processes to scale operations. Our advisory services and technical solutions improve productivity, security, system scalability, and ease of use.

  • Server installation/support - Windows/*NIX/VMware along with support for physical servers
  • MSSQL configuration support – Microsoft SQL configuration/troubleshooting
  • Automated core job scheduling
  • Hardware and software analysis – enhancement recommendations and application installations
  • Application Implementations
  • Core processing development
  • BCP development and data recovery planning

  • Security checklist – Review of your current security posture and implementation of improved security settings within your environment
  • Vulnerability scans – Scan of your existing environment followed by reporting of vulnerabilities found and necessary remediation steps
  • Firewall policy review – Review of your firewall policies and implementation of improved security policies for your environment
  • Outsource security program development and administration
  • Risk assessment capture and regulatory compliance framework

  • PC, Printer, and phone support
  • User Account Management
  • PC Security and patching
  • Application implementations
  • Documentation development – Policies, process, and procedures

  • Transition and merging of data into KeyStone
  • Data extraction from your core system
  • Script automation
  • Application implementations
  • Programming development resources
  • MIS development

  • Firewall support – Support for all major firewall vendors
  • Router/Switch support – Support for all major router/switch vendors
  • 3rd party vendor connections – Network design for third parties connecting into your existing environment
  • Network architecture assessments – Infrastructure update implementations and maintenance

Request Resources

Resources include:

To fulfill your request, please provide the following:

* = Required field.

Close