Yes. In fact we recommend that our customers use a three-step development process. The first step is to use our development environment that provides access to log files and other information necessary to debug applications.
Once your application is fully …
MTI presents the Genesys platforms as is with almost no additional software wrapped around it. There are two notable exceptions. First, MTI developed a web service to handle client’s requests for outbound calling. Second, MTI developed a web site to …
Read MoreThe data center is fully protected with a state-of-the-art FM-200 Clean Agent fire suppression system by Cerberus Pyrotronics, controlled with a MRP-4424 Extinguishing Agent Release Panel. The system is fully automated and also is coupled to a Manual Pull, Manual …
Read MoreWe support user level VPN as well as site-to-site VPN where required. This allows remote administration to hosted services.
Client’s can either contract with MTI to monitor their specific applications or can coordinate self-directed or independent monitoring and administration of …
We accomplish load balancing through the use of multiple SIP proxy servers, which distribute traffic evenly across multiple platforms.…
Read MoreAtlanta- The overall facility’s physical security is modeled using HIPAA (The Health Insurance Portability and Accountability Act of 1996) security guidelines. Visitors must check in and are accompanied by an employee while in our space. The front entrance area is …
Read MoreMTI has modeled its security process against the HIPAA standard. In addition to the physical security that protects computers and databases, we have a variety of protocols in place such as: requiring workstations to become password locked after five minutes …
Read More