The AME Group, Lexington, KY

3080 Harrodsburg Rd. Ste 104
Lexington, KY 40503
Phone: (859) 253-4284
Secondary phone: (800) 264-8851
Monday8:00 AM - 5:00 PM
Tuesday8:00 AM - 5:00 PM
Wednesday8:00 AM - 5:00 PM
Thursday8:00 AM - 5:00 PM
Friday8:00 AM - 5:00 PM

Lexington’s Most Comprehensive IT Services

The AME Group expanded into the beautiful region of Central KY in 2019 with the purchase of Integrity IT, a local managed IT services provider. Integrity IT founder Phil Miller remained on as Regional Manager, as well as co-owner Bryan Pryor as vCIO; and co-founder Joe Danaher as Senior Security Analyst. Since 2000, we’ve provided a full range of IT services to Kentucky businesses with an emphasis on Healthcare IT, Security, and Compliance. We serve a wide-range of industries, including manufacturing, financial, legal and other professional services. You will work with local staff and gain the efficiency of our central Operational Support Center’s technicians.
Phil Miller, Regional ManagerJoe Danaher Lexington KY

The AME Group’s office in Lexington, KY is near Nicholasville, Frankfort, Versailles, Paris, Winchester, Richmond and serves businesses across Central Kentucky.

Our local Strategic Advisors and vCIOs can work with you to develop the technology roadmap you need to support our business goals and gain the most value from your technology investments.

Our local service technicians and network engineers are close by when you need hands-on support and installation.

Our Operational Support Center is staffed with technicians and engineers who proactively maintain your network and promptly solve 97% of service issues remotely.

Request Your Free IT Consultation Today

IT Services available to Central KY

view a downloadable list of our services and our locations in Ohio, Tennessee, Louisiana and across Indiana.

Managed IT Services and Consultation

Business IT Alignment/Consultation
Managed IT Services / FLEX
Managed Internet Security Service
Roadmaps for Budgeting and Business Goals
Cost-savings through Intelligent Planning
Data Analytics

Cybersecurity Services

Security Risk Assessment
Compliance Risk Assessment
CMMC Preparation
Managed Security Services
Threat Hunting
Intrusion Detection and Prevention
Incident Response
Breach Prevention Training
Office 365 Hardening and eDiscovery

Physical Security Solutions

Access Control
Video Surveillance
Managed Security Cameras
IP Network and Digital Video
CCTV
Intrusion Detection
Motion Detection
Cabling
Alarm Communication

Voice Solutions

Telephone Systems
VOIP
Standard Analog
Unified Messaging
Auto Attendant
Call Recording
CRM Integration
Call Center Software

Business Continuity

Network Assessment
Backup Planning
Disaster Preparedness
Data Storage Assessment
Value Added Staffing

Audio-Video Solutions

Video Conferencing
Multimedia Projectors
Projector Screens
Digital Signage
Audio S

Selected Content

Suit of armor guarding entrance

Who is guarding the gatekeepers?

This is a timeless concept from roman times, passed down in popular culture, and can be applied to your business security plan. Companies of even modest size and complexity rely on some form of IT to support their computer systems and data. Although, most companies trust their IT department or Managed Services Provider to include security as a baseline component of their work, how do you verify your IT security is dong what you THINK it is doing? A Vulnerability Assessment is a valuable tool. Trust but verify. “Fidete, sed

CMMC: You Might Not Realize the Impact on Your Business

Cybersecurity Maturity Model Certification (CMMC) The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector.  Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement.  Standardization in security compliance is a win for businesses trying to juggle multiple requirements. Impact of

TAKING CARE OF SECURITY COMPLIANCE IN IT

TAKING CARE OF SECURITY COMPLIANCE IN IT

Regulatory compliance is an issue business has faced for years. Over time, not only have the regulations become more nuanced, they’ve become more difficult to track and address, as well. Given the importance of remaining compliant, it’s no wonder why businesses from all industries rely on The AME Group for assistance. The AME Group understands compliance requirements and has the tools to help you handle them with ease. HIPAA, PCI and GLBA are just the tip of the iceberg. Compliance regulations can be traced to global policy, national policy, and