Top
 

Sunset Services

Empowering Dental Practices with Comprehensive Technology Integration, Support, Security, and Compliance Solutions

Welcome to Sunset Technologies, your trusted partner in harnessing the power of technology to drive success in the dental industry. We specialize in delivering customized services encompassing technology integration, comprehensive support, robust security measures, and meticulous compliance solutions. Our expertise enables dental practices and DSOs to thrive in the digital age. Here is a holistic view of our services –

  • 24/7/365 Remote technical support
  • On-site technical support
  • Third-Party Liaison
  • Account Management
  • Assigned Team Lead
  • Microsoft 365 Managed Services
  • Domain Hosting
  • Maintenance
  • 24/7/365 Monitoring
  • DNS Hosting
  • Inventory Reports
  • Network Device Management
  • Managed Antivirus
  • Managed Security Platform (Firewall)
  • Web and Content Filtering
  • Peripheral Device Support
  • HIPAA Compliant Secure Remote Access
  • Data Backup and Disaster Recovery
  • Virus, Malware, and Ransomware Removal
  • Forensic investigation HIPAA certification
  • Breach Prevention Platform
  • Cyber Liability Insurance
  • Certified Asset Disposal Services
  • SSL Certificates
  • Onboarding
  • New Locations
  • Project Management (governance of all installations or updates of new equipment/software)
  • Purchase of specified hardware and software.  Financing options available.

Monthly Support - Integration

  • 24/7/365 Remote technical support
  • On-site technical support
  • Third-Party Liaison
  • Account Management
  • Assigned Team Lead
  • Microsoft 365 Managed Services
  • Domain Hosting
  • Maintenance
  • 24/7/365 Monitoring
  • DNS Hosting
  • Inventory Reports

Security and Compliance

  • Network Device Management
  • Managed Antivirus
  • Managed Security Platform (Firewall)
  • Web and Content Filtering
  • Peripheral Device Support
  • HIPAA Compliant Secure Remote Access
  • Data Backup and Disaster Recovery
  • Virus, Malware, and Ransomware Removal
  • Forensic investigation HIPAA certification
  • Breach Prevention Platform
  • Cyber Liability Insurance
  • Certified Asset Disposal Services
  • SSL Certificates

Ready for Prime Time

  • Onboarding
  • New Locations

Projects

  • Project Management (governance of all installations or updates of new equipment/software)

Procurement

  • Purchase of specified hardware and software.  Financing options available.
icon 2

Ready for Primetime

Our services begin with our “Ready for Prime Time” phase. Sunset has defined four vital steps in successfully implementing new practices. We conduct a thorough assessment, streamline onboarding processes, implement remediation strategies, and facilitate secure data transfer setup. This crucial phase ensures a seamless transition to our co-managed Outsourced Environment.

Assessment

We comprehensively assess your network, physical hardware, and security measures. This service is essential for optimizing your existing infrastructure and offers a pre-purchase option. By conducting these assessments, during the pre-purchase phase, we equip you with valuable insights and knowledge that can be utilized during negotiations, ensuring informed decision-making at the negotiating table while providing a deeper understanding of the risk associated.

Onboarding

During this step, we focus on assuming control of the IT environment smoothly and efficiently. This involves transferring power from the previous IT provider, addressing any existing agreements, and assessing the environment for future remediation. Additionally, we prioritize establishing a solid working relationship with the key contacts at the site. However, we anticipate some immediate barriers that we must overcome, including:

  • Previous IT Agreement: We will carefully navigate any existing agreements with the last IT provider to ensure adherence to contractual obligations.
  • Obtaining Passwords and Relevant Information: We understand the importance of accessing essential passwords and pertinent information from the previous provider. Our team will work diligently to acquire and change these necessary credentials to ensure your environment is secure.
  • Understanding the Environment: To effectively manage your IT infrastructure, we will conduct a more in-depth assessment to gain a comprehensive understanding of your existing environment. This assessment allows us to identify areas for improvement and develop a tailored remediation plan.
  • Building Connections with Clinic Staff: Establishing strong communication and collaboration with the clinic staff is vital for a successful partnership. We will actively engage with your team to foster a positive working relationship, ensuring their needs and concerns are heard and addressed.

Our team is well-equipped to handle these challenges and facilitate a seamless transition. We prioritize open communication, proactive problem-solving, and efficient execution to overcome these barriers and ensure a successful partnership from the beginning.

Remediation

Our primary objective in this phase is to address outdated or non-compliant equipment within your IT infrastructure. By updating the environment, we aim to establish a solid foundation for improved uptime, enhanced security, compliance adherence, and an overall better user experience. Additionally, we can update the practice management software and initiate data feeding to the data warehouse, if required.

To guide us through this phase, we will start by understanding your environment’s current challenges and expectations. This includes assessing aspects such as phone systems, internet connectivity, response times, past issues with cybersecurity, and any other relevant factors. By gathering this information, we can identify areas that require attention and align our remediation efforts accordingly. Our approach includes the following:
  • Defining the Environment: We will work closely with you to clearly define the current IT environment, considering its unique characteristics, challenges, and specific requirements.
  • Explaining the Changes: We will provide a detailed explanation of the changes that will take place during the remediation process. This includes outlining the specific improvements, the estimated timing of implementation, and the anticipated impact on your operations.
To standardize our approach, we have a predefined set of items typically addressed when onboarding a new affiliate. However, during the assessment phase, we will conduct a comprehensive scan of your environment to determine the specific needs and customize our remediation plan accordingly.
The standard set of hardware that may be considered for remediation includes:
  • Network
  • Server
  • Pan/Imaging Computer
  • PC/Clients
  • Other Devices
  • Microsoft 365
By addressing these aspects, we aim to create a modern, secure, and efficient IT environment that supports your operations effectively. Our team will work closely with you to ensure minimal disruption and a smooth shift throughout the remediation process.

Data Transfer Setup

Not all clients will need this service, as it is the process of establishing the mechanisms and protocols for transferring data from a source system to a data warehouse. If you require these services, it involves configuring the necessary infrastructure, tools, and procedures to extract relevant data from your practice management software, or other data sources, and transfer it securely to your data warehouse.

The data transfer setup serves multiple purposes:

  • Data Integration: It allows for unified integration of your practice’s data with your data warehouse, enabling comprehensive analysis, reporting, and insights. By consolidating data from multiple sources, you can gain a holistic view of your operations and make informed decisions.
  • Data Centralization: The data warehouse is a centralized repository, housing structured and organized data from various systems. This consolidation simplifies data management and facilitates efficient access and retrieval of information.
  • Data Accessibility: Once the data transfer setup is established, authorized users within your organization, including decision-makers and analysts, can access and query the data warehouse to generate reports, conduct data analysis, and extract meaningful insights.
  • Data Security: Sunset Technologies ensures appropriate security measures are in place during the data transfer setup process. This includes employing encryption protocols, access controls, and other security measures to protect the confidentiality and integrity of the transferred data.

By setting up the data transfer process, Sunset Technologies enables you to leverage the capabilities of your data warehouse, unlocking the potential for advanced analytics, reporting, and data-driven decision-making. This integration ensures that your practice’s data is securely and efficiently transferred to the data warehouse, contributing to improved data management, performance monitoring, and strategic planning

Once Ready for Prime Time is completed, we will either hand the office off to your internal IT Team, a Co-Managed Environment, or to our Sunset Team, in a Fully Outsourced Environment.

Discover the Sunset Core

Sunset Technologies assumes full responsibility for your technology infrastructure, providing comprehensive support to optimize your operations. Our expert team offers ongoing services which revolve around providing comprehensive support to all locations, recognizing the value and need for assistance whenever required. We offer two primary delivery methods: Remote Helpdesk Support and Onsite Support.

REMOTE SUPPORT

ONSITE SUPPORT

Our Remote Support ensures you have access to assistance 24/7, including holidays and weekends. You can reach us through various channels, including system tray, email, a helpdesk portal, and phone. We offer flexibility in choosing the structure that best suits your requirements. You have the following options to consider:

  • Email, System Tray or Helpdesk Portal Only: Receive support exclusively through email, system tray or our user-friendly helpdesk portal.
  • Email, System Tray, Helpdesk Portal, or Voicemail: Expand your support options to include email, system tray, the helpdesk portal, or voicemail. Phone support can be limited to business hours or provided round the clock.
  • Email, System Tray, Helpdesk Portal, and Phone Support: Enjoy the benefits of comprehensive support by utilizing email, system tray, the helpdesk portal, and phone channels to access assistance.
  • Maintenance: We perform regular maintenance tasks, including system updates and patches, to address vulnerabilities and maintain a secure environment.
  • Monitoring and maintaining network availability:  Team receives alerts to key systems and gets the key system running when necessary.
  • System Device Inventory Reports: We provide detailed inventory reports of your system devices, including hardware and software components, helping you effectively manage and plan for future technological needs.  Delivered annually.
Get A Quote

+ Learn More

We understand that specific issues necessitate a hands-on approach, which is why we offer national onsite services in two different ways. You can choose from the following options:

  • On-Demand Only (Billed Hourly): Engage our onsite support as needed, and you will be billed based on the hours of service provided. Pre-paid blocks of time can be purchased at a discounted rate for added convenience.
  • Unlimited Onsite Support: Opt for unlimited onsite support, allowing you to have our expert technicians readily available to address any issues without incurring additional charges based on hourly billing
Get A Quote

+ Learn More

Sunset’s Ongoing Services

Our services can begin before you purchase a practice and continue through that relationship. We provide many different types of ongoing services that are catered to your needs and your risk tolerance. Our main categories are Support, Data Security and Compliance, and Data Backup and Disaster Recovery. We also have additional services that can be added in each category.

Data Security & Compliance

At Sunset Technologies, we are committed to delivering top-notch security services to protect your digital environment. We define security as our capability to safeguard your entire network, including servers, computers, scanners, printers, and other connected devices, from potential threats. Additionally, we take measures to secure your network traffic against any unauthorized intrusion.

Our Base Level Security offerings are essential building blocks of a robust security program. They provide the foundational security measures required for the safety of our clients. From this foundation, we offer a range of additional services that are necessary for comprehensive security, albeit with some associated costs.

Our Base Level Security services include:

  • Network Device Management: We effectively manage and monitor your network devices to ensure optimal performance and security.
  • Managed Antivirus: We provide proactive antivirus solutions that detect and eliminate potential threats, ensuring the integrity of your systems.
  • Endpoint Detection & Response (EDR): Our comprehensive EDR platform offers advanced threat detection, intrusion prevention, and real-time monitoring to keep your network secure.
  • Web and Content Filtering: We implement filtering mechanisms to control and restrict access to potentially harmful websites and inappropriate content, enhancing your network security.
  • Peripheral Device Support: Our team supports peripheral devices such as printers, scanners, and other connected devices, ensuring their smooth operation and security.

By partnering with Sunset Technologies, you gain access to these critical security measures as part of our comprehensive service package. Our expertise and dedication to securing your digital environment enables you to focus on your core operations confidently.

Data Backup & Disaster Recovery

As part of our security services, we offer robust data backup and disaster recovery solutions to safeguard your valuable information. We understand the critical importance of protecting your data from unforeseen events such as successful cyber-attacks, system failures, natural disasters, or human error. Our backup solutions are designed to cater to your specific needs and desired recovery time.

We provide the following backup options, all of which are compliant with HIPAA regulations and feature encryption to ensure the confidentiality and integrity of your data:

  • HIPAA Compliant Encrypted Onsite Backup: This solution involves creating backup copies of your data on-site within your practice’s premises. It offers a secure and accessible backup option that can be quickly restored in the event of a data loss incident.
  • HIPAA Compliant Encrypted Onsite & Cloud Backup: In addition to on-site backups, this solution extends the protection of your data by replicating it to a secure cloud storage environment. This provides an added layer of redundancy and protection against physical damage or theft of on-site backup devices.
  • HIPAA Compliant Encrypted Onsite & Cloud Backup with Rapid Recovery: This comprehensive backup solution combines both on-site and cloud backup strategies. It offers the benefit of rapid data recovery in case of a disaster, ensuring minimal downtime and maximum business continuity.
  • Ongoing monitoring of the deployed backup solution including verification that backups have updated and corrective action for failed or incomplete backups. [This service is provided regardless of the back-up solution selected]

By choosing the appropriate backup solution for your practice, you can mitigate the risks associated with data loss and confidently restore your systems to a functional state. Our team of experts will guide you in selecting the most suitable option based on your recovery objectives, budget, and compliance requirements. With Sunset Technologies, you can rest assured that your critical data is protected and ready for recovery whenever the need arises.

Additional Value-Added Services

In addition to our base level services, we offer a range of services that provide value and enhance your technology environment’s functionality, security, and overall efficiency. To address your unique requirements, these services can be selected and added to your package based on your specific needs and requirements.

Our team will work closely with you to customize the service package that best suits your unique requirements and objectives.

Support:

  • 24/7/365 Monitoring: Our vigilant monitoring system provides real-time oversight of your environment, promptly responding to alerts or proactively sharing them with your team, ensuring a proactive approach to maintaining system health and security.
  • Third-Party Liaison: We work closely with third-party vendors to integrate their products and services with your existing systems and infrastructure, ensuring smooth and efficient operations.
  • Account Management: Our dedicated account management team will ensure effective communication, coordination, and alignment of services to meet your goals and address any concerns or requests you may have.
  • Project Management: We provide skilled project management professionals who will oversee and guide the successful execution of technology projects within your organization, ensuring timely delivery and adherence to quality standards.
  • Assigned Team Lead (and Technicians): Our experienced team leads and technicians are available to provide specialized technical expertise and support, ensuring smooth operation and resolution of any technical issues that may arise.
  • HIPAA Compliant Secure Remote Access: We implement secure remote access solutions that adhere to HIPAA guidelines, allowing authorized personnel to access data and systems from anywhere, ensuring flexibility without compromising security.
  • Microsoft 365 Managed Services: We offer comprehensive management and support for your Microsoft 365 environment, including user administration, license management, security configuration, and ongoing maintenance.
  • Virus, Malware, and Ransomware Removal: Our dedicated team employs advanced techniques to detect and remove viruses, malware, and ransomware, minimizing the risk of cyber threats and potential disruptions to your operations.  This service is provided as a project with an agreed upon fee based on the scope of the cyber issue.
  • Domain Hosting: We provide secure and reliable domain hosting services, ensuring the availability and accessibility of your website and associated services.
  • DNS Hosting: Our DNS hosting services ensure the efficient and reliable resolution of domain names, enabling smooth connectivity and online presence for your organization.

Security & Compliance

  • Breach Prevention Platform: We offer a comprehensive suite of services designed to protect your organization from cyber threats. This may include: 
    • Dark web monitoring 
    • Simulated phishing campaigns
    • Employee vulnerability assessments 
    • Weekly micro cyber training videos
    • Monthly security newsletters
    • HIPAA Compliant Secure Encrypted E-mail: We offer secure encrypted email solutions that will allow you to safely share patient information via email.
    • Asset Management: We offer an asset management solution that will allow you to track and manage internal (corporate) technology
    • And a phishing Outlook plug-in.
  • SSL Certificates: We offer SSL certificates to secure your website and protect sensitive data transmitted between your users and your server, enhancing trust and security.
  • Certified Asset Disposal Services: We ensure proper disposal and handling of retired or decommissioned IT assets, following industry-standard practices to protect data privacy and comply with regulations.

Backup & Disaster Recovery

  • MS 365 Backup Protection: Our backup services specifically tailored for Microsoft 365 ensure the protection and recoverability of your critical data stored in the cloud-based platform.
  • Network Assessment: Our network assessment services enable a thorough evaluation of your network infrastructure, identifying areas for improvement, security vulnerabilities, and opportunities for optimization.
  • Forensic investigation in the event of a successful ransomware attack.  Investigation includes assessment, remediation and correction without the need to pay the ransom.  Sunset can also provide a written report and letter that possibly removes the HIPAA reporting requirement for the clinic.  This service requires an additional project fee based on scope.
Note: The additional services listed above are not exhaustive, and we are committed to continuously expanding our offerings to meet the evolving needs of our clients.

At Sunset Technologies, we understand that each dental practice has unique needs. That’s why we offer the flexibility to tailor your service package, allowing you to choose the additional services that provide the greatest value to your organization.

 

Partner with Sunset Technologies today to harness the full potential of technology while ensuring the utmost security, compliance, and efficiency for your dental practice. Contact us to explore how we can help you achieve your goals and help you

Rest Assured.