PROJECT PORTFOLIO

Real projects. Real infrastructure. Built right.

Every engagement below represents the type of work VYNX IT executes for small businesses across Cape Cod and the South Shore. Projects are anonymized — but the scope, complexity, and outcomes are real.

Network Infrastructure

Complete Office Network Rebuild — Medical Practice

Hyannis, MA · 14 staff

A busy medical practice had been running on a consumer-grade router installed by their ISP three years prior. No segmentation, no documentation, no monitoring — and a flat network where a guest tablet and the EHR server were on the same subnet.

Challenge

The practice had grown from 4 to 14 staff over three years. Their original network was never designed for that scale. The ISP router was overloaded, Wi-Fi coverage was failing in the examination rooms, and there was zero network segmentation — meaning every device had unrestricted access to every other device.

What Was Delivered
  • Full network redesign from scratch, including a topology diagram and IP address plan delivered before any hardware was ordered
  • Installation of a Fortinet FortiGate firewall replacing the ISP router as the network gateway
  • Deployment of a managed Cisco switch stack with 4 VLANs: Staff workstations, Medical devices, Guest Wi-Fi, and IP cameras
  • Ubiquiti UniFi access point deployment — 4 APs positioned via RF coverage survey covering all exam rooms, waiting area, and back office
  • Structured Cat6A cabling throughout the practice with labeled patch panel and organized rack
  • Full network documentation package delivered: topology diagram, IP address plan, device inventory, VLAN table, and all credentials in a secure vault
Outcome

Network instability eliminated. Staff reported immediate improvement in connectivity reliability. Medical devices isolated from guest traffic. Full documentation on file.

FortinetUbiquiti UniFiCisco
Cybersecurity & Firewall

Firewall Overhaul & Security Hardening — Law Firm

Plymouth, MA · 8 staff

A small law firm had a consumer firewall running default credentials with the management interface exposed to the internet. A security audit revealed open RDP ports, 5 stale VPN accounts from former employees, and no outbound traffic filtering.

Challenge

The firm had no dedicated IT support. Their 'firewall' was a $80 consumer device purchased at a retail store. The management interface was reachable from the public internet on the default admin password. Remote desktop was open to the world. Three former paralegals still had active VPN credentials.

What Was Delivered
  • Replaced consumer device with a properly sized Fortinet FortiGate for the environment
  • Configured inbound rules: closed all unnecessary ports, blocked management interface from internet access, restricted RDP to VPN-only
  • Configured outbound filtering: blocked known malicious domains, enabled DNS filtering, configured application control
  • Removed all 5 stale VPN accounts, implemented individual named accounts with certificate-based authentication
  • Enabled IPS (Intrusion Prevention System) with appropriate signature sets for the environment
  • Enabled firewall logging to a local syslog server for 90-day retention
  • Configured site-to-site VPN to connect the firm's two office locations
  • Delivered full firewall documentation: rule set export, VPN config, account inventory, and administrator guide
Outcome

Attack surface reduced from critical to acceptable. Management interface closed. All remote access now requires VPN authentication with named accounts.

FortinetIPSSite-to-Site VPN
Wi-Fi Deployment

Enterprise Wi-Fi Deployment — Restaurant & Event Venue

Falmouth, MA · Seasonal operation

A waterfront restaurant and event venue was using 2 consumer Wi-Fi extenders to cover 4,000 sq ft across indoor dining, outdoor deck, private event room, and kitchen — with POS terminals, staff tablets, and guest Wi-Fi all on the same network.

Challenge

The venue had three distinct connectivity needs: reliable POS terminals for the dining room and bar, staff tablets for order management, and guest Wi-Fi for a capacity crowd on summer weekends. Consumer extenders were causing POS timeouts during peak hours. There was no network separation between a guest's phone and the payment processing system.

What Was Delivered
  • RF site survey of the full 4,000 sq ft footprint including outdoor deck and basement kitchen
  • Designed 3-SSID, 3-VLAN architecture: POS & payment terminals (isolated, QoS priority), Staff operations, Guest Wi-Fi
  • Deployed 6 Ubiquiti UniFi access points — ceiling mounted with PoE switches, covering all areas with -65dBm or better signal throughout
  • Configured bandwidth limiting on guest SSID (10 Mbps per device) to prevent any single guest from saturating the uplink
  • POS VLAN hardened: no internet browsing, only payment processor IPs allowed outbound
  • Seasonal configuration documented — off-season mode reduces power consumption while maintaining core functionality
  • Full AP placement diagram and config backup delivered
Outcome

Zero POS timeouts in the first full summer season. Guest Wi-Fi consistently rated in reviews. Payment terminals isolated from guest traffic.

Ubiquiti UniFiVLANQoS
Server & Cloud

On-Premise Server Migration — Real Estate Agency

Sandwich, MA · 12 agents

A regional real estate agency was running their file server on a 9-year-old Windows Server 2012 machine with no automated backup, no monitoring, and a UPS that hadn't been tested in years. The server was end-of-support and actively exploitable.

Challenge

The agency's entire operation — transaction files, contracts, client records, and MLS database exports — lived on a single aging server with no redundancy. The last backup was a manual copy to an external drive that had not been verified in 18 months. Windows Server 2012 had reached end of extended support, meaning no security patches were being issued.

What Was Delivered
  • Procured and deployed new server hardware with Windows Server 2022, sized for 5-year growth
  • Migrated all data with integrity verification — file count and hash comparison pre and post migration
  • Configured Active Directory with individual user accounts and role-based folder permissions — replaced the shared password that everyone had been using
  • Implemented automated backup: nightly local backup to NAS + daily cloud backup to Azure Blob Storage with 30-day retention
  • Configured backup monitoring with email alerts on failure — first time the agency would know immediately if a backup failed
  • Tested full restore from backup before decommissioning the old server — took 23 minutes for a full restore
  • Deployed UPS with network management card — server shuts down safely on power loss
  • Delivered server documentation: hardware specs, role configuration, backup schedule, restore procedure, and administrator credentials in secure vault
Outcome

Agency migrated from a single point of failure to a redundant, monitored, documented environment. Backup restore tested and confirmed at 23 minutes.

Windows Server 2022Azure BackupActive Directory
Managed Services

Ongoing Managed Monitoring — Dental Practice Group

Barnstable County, MA · 2 locations, 22 staff

A dental practice group with two locations and 22 staff needed consistent infrastructure monitoring and maintenance across both sites — with a single point of contact and a monthly report the practice manager could actually understand.

Challenge

The group had grown through acquisition — the second location had different hardware, different ISP, and different Wi-Fi equipment from the original location. No one had a complete picture of what was running where. Firmware updates had not been applied at either location in over a year.

What Was Delivered
  • Full inventory and documentation of both locations — every device, IP, firmware version, and role
  • Deployed monitoring agents on all network infrastructure at both locations via Atera RMM
  • 24/7 automated alerts: network device offline, high CPU/memory, connectivity failure
  • Monthly firmware update cycle: all routers, switches, and access points updated and rebooted in maintenance window
  • Firewall log review monthly: unusual traffic patterns flagged and investigated
  • Monthly health report: one-page plain-language summary delivered to practice manager on the 1st of each month — covers uptime, events, maintenance completed, and anything planned for next month
  • Priority remote support: response within 2 hours for any issue at either location
  • Quarterly on-site visit to both locations
Outcome

Practice manager has full visibility for the first time. Both locations standardized on consistent firmware versions. Zero unplanned downtime in first 6 months of engagement.

Atera RMMMulti-siteProactive Monitoring
Cybersecurity & Firewall

VPN Architecture & Remote Access — Construction Firm

Bourne, MA · 18 staff, multiple job sites

A regional construction firm needed secure remote access for project managers working from job sites and a site-to-site connection between their main office and a remote storage yard — without relying on consumer VPN apps.

Challenge

Project managers were using a consumer VPN app to access the office file server from job sites — sharing a single set of credentials across the team. The storage yard 8 miles away had its own internet connection with no link to the main office, requiring staff to physically drive files between locations on a USB drive.

What Was Delivered
  • Designed and deployed FortiClient site-to-site VPN between the main office and storage yard — both locations now on the same private network
  • Deployed client-to-site VPN for project managers using named individual FortiClient accounts with certificate authentication
  • Removed all shared credentials — each of the 8 project managers has an individual VPN account tied to their email
  • Configured split tunneling: only office-bound traffic goes through the VPN, keeping job site internet traffic local
  • MFA configured on all VPN accounts via email-based one-time code
  • Documented full VPN configuration, account inventory, and onboarding procedure for new hires
  • Trained office administrator on how to add/remove VPN accounts — no longer requires a technician for routine user changes
Outcome

Storage yard connected to main office network. All remote access authenticated individually. USB drive transport eliminated. Admin can manage user accounts independently.

FortiClientSite-to-Site VPNMFA
Network Infrastructure

New Office Network Build — Financial Services Firm

Hingham, MA · First office, 9 staff

A financial services firm opening their first physical office needed a complete network built from bare walls — structured cabling, firewall, managed switching, Wi-Fi, and a server room rack — with zero tolerance for downtime from day one.

Challenge

The firm was moving from a home-office and co-working setup to their first dedicated office. The space was raw — no data cabling, no server room, and the landlord's electrician had not yet run any CAT cable. The firm's requirements meant the network could not have any guest or unauthorized devices on the same segment as workstations.

What Was Delivered
  • Network design produced before any cabling began: full topology, IP plan, VLAN architecture, rack layout
  • 24 data drops installed in Cat6A throughout the office — workstations, printer alcove, conference room, and server room
  • Rack assembly: patch panel, UPS, firewall, managed switch, and NAS — all labeled and organized to professional standards
  • Fortinet FortiGate configured as gateway with 3 VLANs: Corporate workstations, Conference room AV, Guest Wi-Fi
  • 3 Ubiquiti access points — open office, conference room, and lobby — all managed from single UniFi controller
  • NAS configured with RAID 1 + scheduled cloud backup for business-critical files
  • All configuration documented and provided to the firm before opening day
  • Full walkthrough with office manager: how to add devices, what to do if internet goes down, who to call
Outcome

Firm opened on schedule. Network fully operational on day one. Full documentation in hand before the first employee sat down.

Cat6AFortinetUbiquiti UniFiNAS
Managed Services

Network Assessment & Remediation — Retail Group

Mashpee, MA · 3 locations, 30 staff

A retail group with 3 Cape Cod locations requested a full network assessment after a POS outage at their busiest location during peak summer. The assessment revealed critical issues at all three sites — none of which had ever been professionally reviewed.

Challenge

The POS outage that triggered the assessment turned out to be a symptom — not the root cause. The root cause was a consumer router running at 98% CPU during peak hours because it was also acting as the Wi-Fi AP for 40+ guest devices simultaneously. The assessment of the other two locations revealed similar problems plus factory-default firewall credentials at one site.

What Was Delivered
  • On-site network assessment at all 3 locations: device inventory, firewall audit, Wi-Fi performance test, cabling inspection
  • Written assessment report for each location: findings ranked Critical / High / Medium / Low with plain-language explanations
  • Remediation executed over 3 weeks across all locations during off-hours to avoid business disruption
  • Location 1: Replaced consumer router with business-grade firewall + dedicated Wi-Fi AP — separated POS from guest traffic
  • Location 2: Changed all default credentials, closed management interface from internet, updated firmware
  • Location 3: Full switch replacement — existing unmanaged switch replaced with managed unit supporting VLANs
  • POS network isolated at all 3 locations — payment terminals on dedicated VLAN with outbound restrictions
  • Standardized Wi-Fi across all locations: same SSID naming, same password rotation schedule
  • Delivered consolidated multi-site documentation package covering all 3 locations
Outcome

Zero POS-related outages following remediation across all locations. All sites documented for the first time. Factory-default credentials eliminated.

Multi-site AssessmentVLANPOS Isolation

Don't see your exact situation here?

Every network environment is different. These projects represent the range of work we do — but the starting point is always the same: a free 60-minute audit of your specific environment.