FAQ
Frequently asked questions about the platform
General / About PDC
What does Preferred Data Corporation do?
Preferred Data Corporation (PDC) provides managed IT services, cybersecurity, AI transformation, cloud solutions, custom software development, and M&A technology advisory. Founded in 1987 in High Point, NC, we serve as a strategic technology partner for businesses across North Carolina and beyond. Learn more about PDC.
Where is Preferred Data located?
Our headquarters is located at 1208 Eastchester Drive, Suite 131, High Point, NC 27265. We provide on-site IT support within 200 miles of High Point, covering the Piedmont Triad, Charlotte, Raleigh, and surrounding areas. Get directions and contact information.
What industries does PDC specialize in?
We specialize in manufacturing, construction, furniture, textile, and professional services industries. Our deep domain expertise in these sectors allows us to deliver technology solutions that address industry-specific challenges and operational requirements. Explore our industry solutions.
How long has PDC been in business?
PDC was founded in 1987, giving us over 37 years of experience in business technology. Our average client retention exceeds 20 years, which reflects the lasting value and trust we build with every partnership. Read our story.
What makes PDC different from other IT providers?
PDC combines a local North Carolina presence with deep manufacturing expertise, a proprietary PDC Software Suite, and M&A technology advisory capabilities. We function as a strategic business partner focused on your growth and efficiency, not just a vendor fixing technical issues. See our strategic approach.
What is your service area?
We provide on-site IT support within 200 miles of our High Point, NC headquarters, covering the Piedmont Triad, Greensboro, Charlotte, Raleigh, and much of North Carolina. Remote support and monitoring are available nationwide. View our NC coverage areas.
Managed IT Services
What is included in managed IT services?
Our managed IT services include 24/7 network monitoring, help desk support, patch management, data backup, disaster recovery, hardware procurement, and strategic IT planning. We tailor each engagement to fit your business needs and budget. Explore managed IT services.
Do you offer 24/7 IT support?
Yes, we provide 24/7 monitoring and emergency support to ensure your systems remain operational around the clock. Our team proactively identifies and resolves issues before they impact your business. Learn about our support options.
Can you support remote and hybrid workers?
Absolutely. We deploy and manage cloud solutions, secure VPN access, endpoint management, and collaboration tools to keep remote and hybrid teams productive and secure regardless of location. See our cloud solutions.
What is your average response time?
Critical issues are addressed within 15 minutes. Our tiered support model ensures urgent problems receive immediate attention while routine requests are handled efficiently through our help desk. Contact our support team.
Do you provide on-site support?
Yes, we provide on-site IT support within 200 miles of our High Point, NC headquarters. Our technicians can be dispatched for hardware installations, network infrastructure work, and issues that require a hands-on approach. Learn more about on-site support.
Cybersecurity and CMMC
What cybersecurity services do you offer?
We offer SIEM/SOC monitoring, endpoint detection and response, email security, penetration testing, vulnerability assessments, and security awareness training. Our layered approach protects your business from evolving threats. View cybersecurity services.
Can you help with CMMC compliance?
Yes, we help defense contractors achieve and maintain CMMC (Cybersecurity Maturity Model Certification) compliance. Our team guides you through the assessment process, gap remediation, and ongoing compliance management to protect Controlled Unclassified Information (CUI). Learn about CMMC services.
Do you offer security awareness training?
Yes, we provide comprehensive security awareness training including simulated phishing campaigns, interactive modules, and regular testing. Training your employees is one of the most effective defenses against social engineering and cyber attacks. Explore security training.
What is an AI security audit?
An AI security audit is a comprehensive assessment of your AI systems, models, and data pipelines for vulnerabilities, bias, data leakage, and compliance risks. We evaluate how AI tools are deployed across your organization and provide actionable recommendations to secure them. Learn about AI security audits.
How do you protect against ransomware?
We use a multi-layered defense strategy that includes endpoint detection and response, advanced email filtering, immutable backups, 24/7 network monitoring, and incident response planning. This approach minimizes risk and ensures rapid recovery if an attack occurs. See our cybersecurity approach.
Cloud Solutions
What cloud platforms do you support?
We support Microsoft Azure, Amazon Web Services (AWS), and hybrid cloud environments. Our team helps you select the right platform based on your workload requirements, compliance needs, and budget. Explore cloud solutions.
Can you migrate our systems to the cloud?
Yes, we perform cloud migrations using a phased approach that minimizes downtime and risk. We assess your current infrastructure, design the target architecture, execute the migration, and provide ongoing optimization and support. Learn about cloud migration.
How do you ensure cloud security?
We implement zero trust architecture, data encryption at rest and in transit, multi-factor authentication, continuous monitoring, and regular security audits. Every cloud deployment follows security best practices aligned with your compliance requirements. View security services.
What about disaster recovery?
We provide cloud-based disaster recovery solutions with automated backups, geographic redundancy, and regularly tested recovery procedures. Our DR plans are designed to meet your recovery time objectives (RTO) and recovery point objectives (RPO). Learn about backup and disaster recovery.
AI Transformation
How can AI help my manufacturing business?
AI can drive measurable improvements in predictive maintenance, quality control, demand forecasting, and process optimization for manufacturers. These applications reduce downtime, lower defect rates, and improve operational efficiency across your plant floor. Explore AI transformation services.
What is your AI readiness assessment?
Our AI readiness assessment evaluates your existing infrastructure, data quality, business processes, and team capabilities to determine how prepared your organization is for AI adoption. We deliver a prioritized roadmap with specific recommendations and expected ROI. Start your AI readiness assessment.
Do you build custom AI solutions?
Yes, we design and build custom AI agents, automations, and integrations tailored to your specific business workflows. From intelligent document processing to automated customer interactions, our solutions are built to deliver practical, measurable results. Learn about custom AI solutions.
Is AI secure for business use?
Yes, when implemented with proper governance, data controls, and security protocols, AI is safe and valuable for business use. We offer AI security audits to evaluate your AI deployments and ensure they meet security and compliance standards. Learn about AI security audits.
M&A and Quality of Technology
What is a Quality of Technology assessment?
A Quality of Technology (QoT) assessment is a comprehensive technology due diligence review performed during mergers and acquisitions. We evaluate IT infrastructure, cybersecurity posture, software assets, technical debt, and integration risks to inform deal decisions. Learn about QoT assessments.
Do you support post-merger IT integration?
Yes, we provide full post-merger IT integration services including systems consolidation, network unification, security alignment, and change management. Our structured approach minimizes disruption and accelerates time to value after a transaction closes. Explore M&A technology services.
What is QoT Lite?
QoT Lite is a streamlined technology assessment designed for smaller deals and lower middle-market transactions. It delivers the essential insights of a full Quality of Technology report in a faster, more cost-effective format. Learn about QoT Lite.
Pricing and Getting Started
How much do managed IT services cost?
Managed IT service pricing varies based on the scope of services, number of users, and complexity of your environment. We offer a free initial assessment to understand your needs and provide a tailored proposal. Call us at (336) 886-3282 to get started. View pricing information.
Do you offer free consultations?
Yes, we offer a complimentary IT assessment and consultation. During this session, we review your current technology environment, identify risks and opportunities, and outline how PDC can help you achieve your business goals. Schedule your free consultation.
How do I get started with PDC?
Getting started is simple. Call us at (336) 886-3282 or visit our contact page to schedule a free consultation. We will discuss your business needs, assess your current technology, and recommend a tailored plan to move forward.