Why Dewpoint?

  • Certified professionals with global experience at affordable costs.
  • Employ industry-standard solutions and processes (including ITIL and PMBOK) tailored to your needs.
  • Flexible spectrum of IT services ranging from project-based to staff augmentation to fully managed services.
  • Provide variable delivery and pricing models based on your requirements and budget.
  • Experience in waterfall and agile methodologies.

Assess IT - Ensure IT is an enabler for your business by focusing on
people, processes and technology

Transform IT - Increase IT flexibility and decrease costs through digital transformation

Run IT - Improve uptime and gain eciencies through applying ITIL based processes, standardized tools and technical personnel with
global experience

Manage IT - Employ industry best practices to provide comprehensive project management and metrics

Security Services

Our senior-level security professionals combine real world expertise with security certifications to help your business develop and operationalize security practices and reduce overall security risk. We provide a holistic approach to Information Technology security, from assessing your organization to providing a detailed view of IT security vulnerabilities, through implementing mitigation techniques. Full range of services including:

  • Security Awareness Training – Provides your organization with highly customizable training courses, Learning Management Systems and phishing campaigns
  • Incident Response - SWOT team available to managing unexpected security events to minimize risk and loss of business-critical data.
  • CISO-as-a-Service – Employ executive level security leadership to assess maturity of security governance and roadmap prioritization.
  • Vulnerability Management – Identify, track, manage and remediate vulnerabilities to business-critical systems and applications on both internal and external facing systems. 
    Network and Application Penetration Testing - Internal and external network penetration tests, application tests and on-site network penetration testing.
  • Threat Assessment - Evaluation of the threats and risks to your organization to obtain insight into applications on the network, threats and optimize performance

Assessment Services

Our assessment services focus on the people, processes and technology to ensure IT is truly an enabler for both current business objectives and desired future growth. Dewpoint provides a full range of IT Assessment Services to evaluate your current IT environment to produce a clear, concise, detailed and actionable recommendations. Our assessments include the following

  • Governance -  Review of how your business administers strategic goals and technology needs.
  • Infrastructure - Assessment of business-critical infrastructure including compute, storage, network and backup and recovery. Evaluates architectural design, performance and efficiencies in infrastructure components to identify gaps.
  • Security - Evaluates your enterprise security posture based on the CIS Top 20 Critical Security Controls.
  • Application - Advisory services to assess or rationalize application(s) for security, performance and modernization.

Program/Project Management

Our program and project management services add value to projects of all sizes through applying a consistent, proven methodology from project start-up through close-down. Dewpoint’s project management services are customized based on your needs and project complexity. We apply consistent project, program and portfolio practices to provide project management oversight, reports and metrics. Services include:

  • Project/Program Office – Implement and maintain project and program management offices both on the project level and enterprise wide (ePMO).
  • Project/Program Team or Staff Augmentation – Skilled, certificated professionals including program and project managers, business analysts, project schedulers, project coordinators, and trainers and peripherals.
  • Image Management – Methodology for the deployment of PCs and software using a combination of processes and COTS programs.

Application Services

We specialize in IT Application assessments, transformation (design-build-deploy) and management to help clients address challenges and maximize business benefits from applications. Beginning with an understanding of your business, IT goals and environment, we recommend the best cost-effective solution. Our professionals provide the following:

  • Application Consulting – Assessment of a single or portfolio of applications for modernization opportunities, health, performance and security.
  • Application Development – Full lifecycle application development of custom Web or Desktop (client/server) applications, using either Agile or Waterfall SDLC methodologies including modernization development in a traditional on-premise environment or the cloud.
  • Data and Analytics – Quick start analysis for analytics readiness to identify and review data sources, outline reporting and data exploration needs and provide initial technology recommendations.
  • Applications Management - Upon completion of an Application Development project, Dewpoint provides ongoing run services.
  • Image Management – Methodology for the deployment of PCs and software using a combination of processes and COTS programs.

End User Services

Supports your end users, including a single point of contact, for documenting and resolving end user IT requests and incidents. Our experts incorporate ITIL-based processes and tools to provide:
Service Desk -  Skilled resources and ITIL-based processes and tools to resolve incidents in a timely and professional manner.

  • L2 Desktop Support -  In-depth support level containing experienced, knowledgeable personnel on a particular product, service, or system including remote PC takeover.
  • Service Desk –
  • Desktop Support –Break fix incident resolution for end users including both hardware and software incidents.
  • IMAC - Installing, moving, adding, and changing desktop PC systems, parts, and peripherals.
  • Image Management – Methodology for the deployment of PCs and software using a combination of processes and COTS programs.

Data Center Services

Full range of services including design, implement and manage compute, network, storage, backup and restore and disaster recovery and business continuity tailored solutions in your data center or in our Michigan-based Tier III Uptime Institute Certified Designed data center.

  • Compute – Design, implement and manage server systems customized to your business needs.
  • Storage - Design and implement enterprise class storage systems to meet the demands of your applications.
  • Backup and Restore - Design and implement data backup system to protect your data in the event of a disaster, data corruption, accidental deletion or ransomware attacks.
  • Disaster Recovery and Business Continuity - Design a plan for maintaining business functions or quickly resuming them in the event of a major disruption. A business continuity plan outlines procedures and instructions for your organization to follow in the face of a disaster.
  • Managed Hosting - Provide full range of managed hosting services in Dewpoint’s data center including Server Monitoring, Security, Backup and OS patching.
  • Co-Lo - Physically moving your hardware into Dewpoint’s data center providing rack space, and data connection.

Knapp's Centre, Suite 200
300 S. Washington Square
Lansing, Michigan 48933
Phone: (888) DEWPOINT
Local: (517) 316-2860

1 Monroe Center Street NW
Grand Rapids, Michigan 49503

805 Oakwood Drive, Suite 108
Rochester, Michigan 48307
Phone: (248) 413-6108