Construction Infrastructure

Female building contractors visiting construction site
Corporate and Job Site Infrastructure

We have been working with medium to large construction companies for many years and collaborate with their IT staff members to optimize both corporate and job-site infrastructures. In fact, we have deployed dozens of ruggedized Job-Site-In-a-Box containers to remote job sites. These miniature data centers efficiently communicate drawings, email, project schedules, etc. with corporate and other construction partners per their required project needs.

Site Monitoring & Management

A key to controlling operational costs is standardizing job site infrastructure that can be deployed, managed and upgraded simply and efficiently. The Root Group understands the lack of IT expertise at job sites and we have helped many construction firms deploy plug and play infrastructure in remote or hostile areas.

Site Monitoring & Management

Packages include 24 x 7 or 8 x 5 monitoring and alerting of networks, security and environmental with 2 hour, 4 hour or NBD SLAs, onboarding and documentation to best practice standards, escalation procedures, patching and upgrading, troubleshooting, backups of devices and configurations, policy and access management changes and an assigned account manager.

Site Documentation

Detailed inventory of all site infrastructure assets including versions and attributes. Review of existing documentation and modify as appropriate and maintain throughout site lifecycle. Document security and firewall policies. Create or modify network diagrams and topology maps.

Patch Management

Weekly or monthly review of site assets and monthly or quarterly application of patches as recommended by vendors and engineering staff. Assets include; servers, hypervisors, switches, routers and firewalls.


Flexible engagement of our highly skilled engineers can be scheduled in blocks of hours or ad hoc response. Use as needed for remote or on-site needs. The hours can also be used for security incident response and remediation.

Firewall Auditing

Comprehensive review of firewall rules and event logs as they map to security policies. Policy recommendations and customized report generation including audit reports for specific compliance frameworks such as CMMC or NIST.

Security & Network Assessments

Review corporate and site security policies and assess for compliance to existing deployment. Report findings and provide recommendations and priorities for necessary remediation.

Vulnerability Scans

Quarterly, semi-annual or annual external vulnerability scans. Network scans of desired hosts, malware scans, host authentication and missing update identification, security bypass detection and notification, web vulnerability scanning, elevation of privilege detection. Provide report sorted by high, medium and low threat ratings along with notes on areas that need special attention.

Staff Augmentation

We have the ability to help fill engineering staff shortfalls or expertise gaps. Contact us to discuss our flexible options for temporary needs.