<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1427829241519095&amp;ev=PageView&amp;noscript=1">
Skip to content

Safire.llc

About our company

We are a Limited Liability company

We were formed as an LLC in Deleware

We are physically located in Oklahoma

We have a handful of employees, that number fluctuates. We bring in additional contracted staff when necessary

We have General liability and professional insurance.

We do most work remote. However, we may travel to customer sites. It is more likely that we would travel to customer sites in Oklahoma and the Dallas Texas Area. Travel for project work would be billed back to the customer.

We typically work with small and medium businesses. Typically businesses up to around 100 employees and/or $10,000,000 in revenue. We do not work with Federal, State or Local Government.

We are Veteran owned.

Our mailing address is:

Safire Solutions LLC

820 W Danforth Rd #1075 Edmond, OK 73003-5006 United States

Our phone number is 4057387420

 

Services

 

We offer one time services. Designing and implementing a new system would be a one time service. Troubleshooting an existing problem would be a one time service. We also offer ongoing managed services for a monthly fee. That fee depends upon the scope of the managed service. One type of managed service that we provide consist of a certain number of hours per month at a negotiated rate to be used in whichever way adds the most value. Another type of managed service we provide is a certain set of tasks to be completed each month. Patching 4 servers would be an example of a certain set of tasks. Reviewing the security logs in Crowdstrike twice a month would be another example of  a certain set of tasks. We also provide managed services that comprise the complete outsourcing of certain technologies. If you do not want to worry about telephone issues and want to completely outsource the management and maintenance of your cloud voice system, that would be an example of outsourcing the management and support on a technologies. We do not host, or provide, any cloud services, we help design, implement and integrate solutions from other vendors. The value we bring is our experience in complex environments and getting disparate on-premise systems, hybrid systems and cloud services all integrated together. We do resell a small number of cloud services and vendor hardware solutions.

 

We can design and support the following technologies:

  • Traditional PBX, Private Branch Exchange
  • Cloud Voice Systems, VOIP, and SIP
  • Contact center and call center
  • Customer Relationship Management (CRM)
  • Service Management
  • Network routers, switches, Wireless and Wifi controllers and wireless and wifi access points, Wifi5, Wifi6 and Wifi7
  • Fiber optics, ethernet Cat6, Cat7 and Cat8, 5G
  • Market analysis tools
  • Buyer intent tools
  • AI chatbots
  • AI virtual agents
  • Intelligent routing
  • Skills based routing
  • Security Event and Incident management, SIEM
  • Conditional access, risk based access
  • Basic Ring Groups to
  • IVR
  • Conversational AI, Generative AI, AI-based Virtual Agents, and AI Conversational Action
  • Integration into CRM, ITSM, Market Intelligence, and Buyer Intent tools. Native and third-party Omnichannel solutions via MMS/SMS, voice, web chat, web forms and social channels
  • From basic Virtual receptionists who answer and route calls to complex Conversational AI that is almost indiscernible from human speech and enabled for Conversational Actions and most everything in between, Along with voice, we can also deploy AI-powered MMS/SMS bots, WhatsApp bots, social media bots, and web chatbots that can respond to customers, place orders, open tickets, and relay ticket status to customers all enabled by AI Conversational Actions.
  • In this world of data and assets living across multiple cloud vendors, company owned devices and BYOD devices, identifying threats tracing attacks and intrusions can be very complex. We can design and implement Security Incident and Event Management solutions to pull data points from individual security solutions to aggregate and analyze security data in a centralized location and provide a holistic view and approach to security.
  • Data Classification and Tagging, Retention Policies, Litigation Hold, Journaling, Data Loss Prevention policies, Digital Rights Management, Access Rights, Sharing Rights- organizing, managing and securing data in a way that only the internal users and external users that need to have it can get to it- can become overwhelming. Like most everything else, with data existing across multiple platforms and a mix of company-owned devices and BYOD devices, it can get even more complex. We can help data types, classifications, and policies to keep your data secure and your reputation intact.
  • Whether it's MultiFactor Authentication, Single Sign On, Passwordless Sign On or Biometric Sign, or combination of methods, we can work with you to provide the security you need and the user experience you want. 
  • We can design and implement solutions to provide Conditional Access, Risk-Based Access, Discretionary Access Control, Role-Based Access Control, Rule-Based Access Control, and more to protect your network and assets. We can also design and deploy application gateways and cloud security solutions to protect your apps and data hosted in XaaS services. 
  • Network Security
  • We can design hybrid network security to provide firewall, intrusion detection, intrusion prevention, deep packet inspection, SSL, and TLS inspection across physical and virtual networks in cloud environments and SDWAN.
  • Endpoint security
  • From local firewall and antivirus to endpoint and mobile device management, we can secure your data and applications on company-owned devices and BYOD devices. Whether they be Apple, Microsoft, Linux, iOS, or Andriod, we can insure your data, applications, and other systems are secure from what is one of the largest risk vectors at an organization- the user devices....
  • Security and risk management
  • Security in the Cloud and Hybrid age can be very complex. With some solutions living in XaaS services, some on premise and the proliferation of Bring Your Own Device policies, securing assets and data can be complex and overwhelming. Coupled with the dichotomy of security versus ease of use, and security can become overwhelming very quickly. We can help put together a strategy to provide the right blend of security and end user experience. An intrusion or, maybe worse, a situation where your access or data is held hostage can severely impact your reputation with your client base. Even an employee inadvertently sharing information with the wrong organization or person can be catastrophic to customer trust.
  • Wired networking
  • From traditional route/switch Ethernet to 40gbs Fiber to layer 7 application switching and from simple redundancy to self-healing network architectures, we can design the infrastructure that delivers the performance and reliability you need. 
  • Wireless networking
  • Wireless backhaul
  • We design and implement WiFi 5, 6, and 7 solutions for local network access, leveraging the 2.5, 5, and 6GHz spectrums, as well as bridging and long-range point-to-point and point-to-multipoint solutions leveraging the 5GHz and 60GHz spectrums.  We also have considerable experience leveraging solutions like Starlink and satellite internet for offshore rigs, and other extreme remote locations, and integrating those solutions into the overall network strategy. We can design a robust wireless network that does what you need it to do. 

 

 

 

Pricing

 

The services we provide are tailored for each customer and each project. Every customer has different requirements and every project has a different scope. Our solutions are bespoke solutions, not a one size fits all. Our process is to have a discovery call with you to learn more about you and what you are wanting to achieve and we will define the scope of the project together. We can offer time and material pricing and we can offer fixed fee pricing with different payment milestones, but unless we have advertised a very targeted service for a set price, any service we provide will be custom and will require at least one discovery call. We accept credit, debit and ach. Upon exception we may accept check.

 

Vendors and products we work with

  • Wireless and wired network providers
    • Cisco
    • Ubiquiti
    • Juniper
    • Mikrotik
    • HPE Aruba
    • AT&T
    • Verizon
    • T-Mobile
    • Cox Business
    • Meraki
    • Extreme networks
    • Barracuda
  • Voice, contact center and call center providers
    • Cisco
    • Microsoft
    • Microsoft Teams
    • Microsoft Azure Communications Server
    • PrimeVox
    • 8x8
    • RingCentral
    • Nice InContact
    • Genesys Cloud
    • Dialpad
    • Five9
    • Solgari
    • Zyra and ZyraTalk
    • Yealink
    • Poly
    • Crestron
    • AudioCodes
  • CRM, Service Management, Marketing analysis and buyer intent providers
    • Salesforce
    • Microsoft Dynamics
    • Hubspot
    • Breeze
    • ServiceTitan
    • ServiceNow
    • ZoomInfo
    • Pipedrive
    • Monday CRM
    • GoDaddy
    • Odoo
    • Convex
  • Payment systems and accounting providers
    • Square
    • Stripe
    • Quickbooks
  • Security, data governance and risk management providers
    • Cisco
    • Duo
    • Microsoft Purview
    • Trend Micro
    • Crowdstrike
    • Okta
    • Microsoft Defender
    • Microsoft CoPilot
    • Microsoft Sentinel
    • Ubiquiti
    • Airwatch
    • Microsoft 365
    • Microsoft Entra
    • Google Workspace
    • Barracuda
    • Mimecast
    • BitDefender
    • Fortinet

 

 

 

 

Vendors and products we resell

  • Ubiquiti
  • Mikrotik