West Virginia on-site + US remote support MOP + rollback on every critical change SLA: response plan within 24 hours
Secure Intelligence + Operations Built for owner-operated businesses

Managed IT + infrastructure delivery | Saint Albans, West Virginia (Kanawha County)

Enterprise Wi-Fi. No surprises.

MOP + rollback plan Validated cutover Supported stack Single pane of glass
PAFDS Technologies logo

Execution you can audit

From discovery to cutover to steady-state support, every change is planned, logged, and tied to a clear owner.

What your company gets

PAFDS Technologies delivers a managed operating model: clear ownership, documented systems, measurable service levels, and faster recovery during incidents.

Operational assurance

We turn unknown IT risk into a verified baseline you can actually manage.

  • Verified inventory of users, systems, vendors, and dependencies
  • Responsibility matrix: PAFDS vs your team vs third-party providers
  • Centralized logs and change history for auditability
  • Incident-response plan delivered within 24 hours for covered systems
  • Vendor escalation handled by PAFDS when authorized

Executive visibility

One operating view for system health, lifecycle risk, spending priorities, and accountability.

  • Unified dashboards and reports across network, systems, and service work
  • Leadership-ready reporting for compliance and planning
  • Current documentation that is maintained as work is completed
  • Field-to-office communication mapped to business operations

Standards-based infrastructure

We only take responsibility for systems we can support end-to-end. That is how we keep response times and outcomes predictable.

  • Structured cabling, labeling, and validation evidence delivered with each project
  • Clean installs, organized racks, and serviceable physical layouts
  • Power protection and distribution sized to real operational load
  • Upgrade plans for unsupported or legacy systems that must remain temporarily

Predictable operations

Problems usually come from undocumented changes and unsupported gear. Our onboarding removes that ambiguity and gives you a defendable support model.

End-to-end services

From network and cabling to identity, security, and recovery. If it impacts operations, we can own and run it.

Specialty

Wi-Fi deployments

Enterprise-grade wireless for offices and operations spaces, delivered with design validation, clean cutover, and monitoring.

Physical + IT

Structured cabling

End-to-end cabling delivery: routes, terminations, labeling, test results, and clean documentation handoff.

Security

Reliability + security

Security baselines, backup/restore readiness, centralized logging, and change control designed for fast recovery.

Unified

Microsoft 365 + Teams Voice

Identity, email, collaboration, endpoint management, and Teams Voice with clear tenant governance and ownership.

On-site

Cameras, PoE, TVs

Cameras, PoE switching, display installs, and physical infrastructure work delivered to production standards.

Custom

Applications + hosting

Custom tooling, automation, and hosting to reduce manual work and connect field execution to leadership reporting.

Platforms we build on

We use the right tools, then standardize them so your environment stays stable.

Cloud

Azure + AWS

Identity, hosting, storage, and DR.

Microsoft

M365 + Entra + Intune

Unified comms and managed endpoints.

Network

Cisco, Meraki, Fortinet, Ubiquiti

WLC, switching, routing, and Wi-Fi.

Ops

Linux + automation

Repeatable deployments and monitoring.

Industry-focused delivery

We support regulated and high-accountability environments where uptime, documentation, and audit evidence are critical.

Healthcare and dental

Clinical operations depend on privacy, uptime, and rapid recovery. We design around those realities.

  • HIPAA Security Rule/Privacy Rule safeguards and breach-response readiness
  • Business Associate Agreement (BAA) support with covered entities and vendors
  • ePHI protection: MFA, least privilege, encryption, and audit trails
  • Segmented networks for clinical systems, imaging, staff devices, and guest Wi-Fi
  • Resilient backup and restore testing for practice-management and imaging systems
  • Payment workflow hardening and PCI-aware network design where card processing is in scope

Financial services

Financial operations require disciplined controls, reliable evidence trails, and resilience under pressure.

  • GLBA Safeguards Rule-aligned security program controls
  • FFIEC-oriented change control, incident response, and operational documentation
  • MFA and privileged access governance with centralized logging
  • Network segmentation between critical banking systems, office users, and public access
  • Third-party risk and vendor escalation management with evidence capture
  • BCP/DR planning with restore testing, RTO/RPO targets, and audit-ready artifacts

Public sector and local government

Public-sector operations require secure delivery, continuity planning, and accountability under public scrutiny.

  • CJIS-aware controls where law-enforcement/public-safety systems are involved
  • NIST-aligned security baselines, policy mapping, and control documentation
  • Records-retention and public-records response support with clean evidence trails
  • MFA, conditional access, and least-privilege identity design for hybrid teams
  • Department-level network segmentation and secure public Wi-Fi boundaries
  • Formal change execution (MOP + rollback + approvals) and continuity planning

Compliance-aware operations

We implement and document technical controls so your compliance and legal advisors have clean, usable evidence. You get reliable operations and a defendable process.

Onboarding process

We only promise what we can measure and support. Onboarding converts unknowns into a manageable operating baseline.

Step 01

Baseline + verification

We gather users, devices, services, vendors, domains, and access points, then verify them with you.

Step 02

Define responsibility

We set control points for what PAFDS owns, what you own, and what your vendors own. Nothing is ambiguous.

Step 03

Operate under SLA + roadmap

Monthly service delivery with clear on-site/remote boundaries, scheduled improvements, and accountable execution.

SLA

Plan within 24 hours

You will not be left wondering what’s happening.

Monthly

Predictable support

Some on-site is covered, some is billable. It’s agreed up front.

Vendor handling

We talk to vendors for you

With proper authorization, we handle 3rd-party support calls, escalations, and act as your technical liaison.

What to expect (step-by-step)

Every step produces an output you can hold us accountable to. No vague “we’ll take care of it.”

  1. Step 0 Teams intro

    15 minute Teams call

    We confirm goals, urgency, and whether we are the right fit. You leave with clear next steps.

    We confirm environment shape (sites, SSIDs, ISP, switching/firewall, identity) and the refresh constraints.

    • Output: simple written summary + next-step plan
    • What we need: your best point-of-contact, and what is currently “broken” or “slow”
  2. Step 1 Scope + authorization

    Define scope and boundaries

    We define what PAFDS owns, what you own, and what vendors own. This prevents surprise invoices and surprise blame.

    We write the responsibility matrix and list supported vs unsupported systems. Vendor authorization is documented.

    • Output: responsibility matrix + supported/unsupported list
    • Output: vendor authorization letter (if you want us to call providers on your behalf)
  3. Step 2 Discovery baseline

    Baseline inventory and verification

    We inventory what you have and verify it with you, so decisions are made from truth, not assumptions.

    Devices, users, services, vendor accounts, network gear, and any existing diagrams/config exports. We validate access and ownership.

    • Output: verified baseline inventory (“verification stamp”)
    • Output: initial risk list + prioritized wins
  4. Step 3 Design + plan

    Design, upgrade path, and pricing

    We present a plan that turns your environment into a supported system with predictable monthly cost.

    Wi-Fi design, switching/VLAN/SSID plan, identity alignment, cable remediation list, BOM, and a staged upgrade path for legacy gear.

    • Output: roadmap + quote/SOW + schedule window
    • Output: “no surprises” standards agreement (what we will and will not support)
  5. Step 4 Execute (MOP)

    Implementation with MOP and validation

    Every change is planned, documented, and validated. If something goes sideways, we roll back cleanly.

    MOP, rollback plan, config backups, change window, acceptance tests (roaming, Teams call test, throughput, logs, monitoring).

    • Output: as-built documentation + validation notes
    • Output: centralized monitoring/logging enabled (as scoped)
  6. Step 5 Stabilize + operate

    Grace period, then steady-state MSP

    We stabilize, document, and move into monthly operations: predictable costs, predictable support, predictable outcomes.

    Post-cutover tuning, alert thresholds, log baselines, firmware policy, and continuous documentation upkeep.

    • Included: one on-site assessment/check-in per month by agreement. Additional implementation work is scoped and approved in advance.
    • Rule: anything done on-site is logged in the PAFDS app with a MOP reference.

FAQ

The important stuff, answered plainly.

Do you cover all of West Virginia?

Yes. We are based in Saint Albans (and regularly work across Kanawha County, Winfield, and beyond). We cover all of West Virginia with full MSP capability.

Do you work outside West Virginia?

Yes, with practical limitations. Remote work covers most needs; hardware support depends on shipping speed and scheduled on-site visits.

What if we have equipment we want to keep?

We can keep it running if it can be supported. If it is unsupported, we document it and provide a clear upgrade path so your system becomes sustainable with predictable outcomes.

Can you do the physical work too?

Yes. We drill, mount, trench, run and terminate cable, and deploy equipment. We also partner with Keith’s Kitchens for additional installer capacity when needed.

Leadership

PAFDS Technologies is led by Luke Lavender using an owner-operator model, with vetted specialist contractors engaged when scope requires additional capacity.

Luke Lavender

Founder and lead engineer | West Virginia based | Insured as required by scope.

  • Meta: Datacenter Technician supporting hyperscale infrastructure and globally distributed services
  • Eli Lilly and Company: enterprise application support in a regulated pharmaceutical environment
  • American Electric Power (AEP): physical server support for critical utility infrastructure
  • Primary point of accountability from discovery through steady-state operations

Operating principles

  • Standards first: managed support only for approved, supportable systems
  • Documentation always current and accessible to stakeholders
  • Formal change execution with MOP, rollback, and verification evidence
  • Security baseline and least-privilege model integrated by default
  • Transparent communication, scope, and financial expectations

Where we deliver value

Best fit: owner-operated businesses, multi-site organizations, and regulated environments that need dependable IT operations with audit-ready process.

Contact

Tell us what needs to improve, and we will respond with a practical first-step plan. Fastest path is Teams.

Send a message

Talk on Teams Email

Direct

Service area

West Virginia on-site delivery + U.S. remote support (hardware via shipping and scheduled visits).

Based in

Saint Albans, WV (Kanawha County) and Winfield, WV

Capacity note: vetted partner installer crews can be engaged for large physical infrastructure projects when needed.