Submit your request below. We classify severity, assign the right technician, and keep you informed until resolution. Your SLA terms and response commitments are honored automatically.
For P1 emergencies (complete outage, security breach, data loss risk), call us directly for immediate response.
Every support request follows a structured process designed for speed, accountability, and clear communication.
You submit the form with issue details. We classify priority (P1–P4) based on impact and urgency.
The right engineer is assigned based on skill and availability. You receive confirmation and estimated response.
We fix the issue, update you throughout, and document the resolution for your records and future reference.
We triage every request based on business impact. Your SLA agreement determines response commitments.
| Priority | Definition | Response Target |
|---|---|---|
| P1 – Critical | Complete outage, security breach, or data loss affecting entire organization | ≤ 1 hour |
| P2 – High | Major function impaired, multiple users affected, no workaround available | ≤ 4 hours |
| P3 – Medium | Single user or non-critical system affected, workaround exists | ≤ 8 hours |
| P4 – Low | Questions, minor issues, planned changes, enhancement requests | ≤ 24 hours |
Response times are for initial acknowledgment during business hours (M–F, 9am–5pm CT). After-hours support available for P1/P2 per your agreement.
Whether you're on a managed contract, block-of-hours plan, or active project—this portal is your single point of entry.
Full SLA coverage with defined response times. Unlimited support requests included in your agreement.
Pre-purchased support hours. Requests are logged against your balance with transparent time tracking.
Active project support for implementation questions, change requests, or issues within project scope.
Not yet a client? Contact us to discuss your needs.
The more context you provide upfront, the faster we can diagnose and resolve your issue.
Describe the issue clearly. What were you trying to do? What error or behavior did you see?
One user? A department? The whole company? This helps us prioritize correctly.
Today? After an update? Did anything change recently? Timeline helps us isolate the cause.
Computer name, application, email, network—the more specific, the faster we can help.