|Monday||8:00 AM - 5:00 PM|
|Tuesday||8:00 AM - 5:00 PM|
|Wednesday||8:00 AM - 5:00 PM|
|Thursday||8:00 AM - 5:00 PM|
|Friday||8:00 AM - 5:00 PM|
Lexington’s Most Comprehensive IT Services
The AME Group expanded into the beautiful region of Central KY in 2019 with the purchase of Integrity IT. Founder Phil Miller remained on as Regional Manager; Bryan Pryor, vCIO; Joe Danaher, Senior Security Analyst; along with all the current staff. Since 2000, we’ve provided a full range of IT services to Kentucky businesses with an emphasis on Healthcare IT, Security, and Compliance.
Patient. Smart. Glitch Free.
Security. Patience. Peace of Mind.
If you want someone that has patience, answers questions in a very timely manner, and manages your IT infrastructure seamlessly, then choose The AME Group. We’re extremely pleased and greatly appreciate all they have done.
First Baptist Church Bracktown
Thorough. Proactive. Responsive.
Quality. Experience. Value.
We have complete peace of mind knowing our equipment and data are being cared for and monitored 24/7. I would not hesitate to recommend AME for their quality work and experienced team at a fair price.
Long Construction Management
A Lot More Love.
Eric Brooks, Site Manager
Ashland of Henry Clay Estate
Half the Cost. Team of Experts. No Brainer.
Jim Peyton, President
Execute. Deliver. Consistent.
Croswell Chambers, CIO
Bluegrass Care Navigators
Broad Experience. Depth of Knowlege.
Alex Tietz, IT Director
Reliable. Honest. Cutting-Edge Technology.
Brant Poore, CEO
Information Capture Solutions
This is a timeless concept from roman times, passed down in popular culture, and can be applied to your business security plan. Companies of even modest size and complexity rely on some form of IT to support their computer systems and data. Although, most companies trust their IT department or Managed Services Provider to include security as a baseline component of their work, how do you verify your IT security is dong what you THINK it is doing? A Vulnerability Assessment is a valuable tool. Trust but verify. “Fidete, sed
Cybersecurity Maturity Model Certification (CMMC) The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector. Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement. Standardization in security compliance is a win for businesses trying to juggle multiple requirements. Impact of
Regulatory compliance is an issue business has faced for years. Over time, not only have the regulations become more nuanced, they’ve become more difficult to track and address, as well. Given the importance of remaining compliant, it’s no wonder why businesses from all industries rely on The AME Group for assistance. The AME Group understands compliance requirements and has the tools to help you handle them with ease. HIPAA, PCI and GLBA are just the tip of the iceberg. Compliance regulations can be traced to global policy, national policy, and