Unify Systems Across Office Locations

Scalable Client Management Tools

Proactive IT Support and Leadership

Summary

[LOGO] Marr Scaffolding

"Marr Scaffolding Company was introduced to iCorps Technologies four years ago. iCorps provided Marr management at the front end of the engagement with a high-level overview of amendments needed at Marr. iCorps was instrumental in recommending upgrading our servers, routers, and backup routines. We were able to improve wide-area network connections with our branch offices in Providence, RI, and Springfield, MA, as well as complete upgrades to our office personnel computers.

Most recently, Marr Scaffolding successfully converted to a newer version of financial software. Support from iCorps during this transition was terrific. Working with Marr IT, our financial software dealer and iCorps was a team effort that worked.

We truly feel that communication, planning, and execution are the hallmarks of iCorps Technologies in dealing with their customers."

Sincerely,
Paul S. Tilley
Vice President and Controller
Marr Scaffolding Company

About

Marr Scaffolding is a well-respected, Massachusetts-based company that provides the rental, sales, and servicing of nationally marketed construction products and equipment. Marr Scaffolding operates through five divisions: Scaffold, Shoring, Aerial Lifts, Hydro Mobile Mast Climbers, and Bleachers and Special Events. The company also operates a Contractor’s Safety and Supply Center that offers a local, on-the-spot resource for contractor supplies and safety items.

Explore Related Services

SOC-as-a-Service

iCorps SOC-as-a-Service combines cutting-edge Security Information and Event Management technology and established threat intelligence to keep your network secure, 24x7.

SECURE YOUR NETWORK

Microsoft 365

The applications your employees love, backed by Microsoft's enterprise cloud. Secure, scalable, collaborative. Learn more about the new Microsoft 365.

EXPLORE THE PLATFORM

Mobile Security Solutions

If your employees are using personal and mobile devices, they're creating vulnerabilities in your network. Ensure you have the right tools to protect information at the device, application, and data levels.

PROTECT END USERS