We help you to build a robust, scalable network that supports your organisation, providing the foundation for access to services, enhancing productivity, enabling efficiency and delivering the experience to your end users that business requires.

We partner with leading network vendors to deliver network solutions that reduce cost, complexity, and enhance security – from the data centre through to the mobile worker.


No matter the technology, the end result is always the same: a resilient, stable network that your business can rely on.

Why choose TET?

Experienced IT specialists

Our team of consultants, engineers and support specialists are always available whether your looking to implement, improve or support your business IT requirements.

Strong vendor partnerships

TET has been long term partners with major vendors and knows the thier portfolios through and through.

One end-to-end partner

With TET, you don’t need to find multiple suppliers for your IT project. We will deliver the project from the design phase through to the final installation steps and can even offer ongoing support post-launch.

Related Services

Core Network


The Core Network plays a pivotal role, ensuring that your datacentre infrastructure is capable of handling the growing demands of private cloud computing.

By providing connectivity and supporting all the connections between servers and storage within the datacentre, the Core Network provides the network for the physical and virtual environment, and connects physical servers to each other and to other data services. Technology advancements in datacentre networking means that software defined or application centric datacentre networking solutions are strategic options to be considered.


Our in-house, multi accredited team of Solution Architect’s will assess your existing data centre infrastructure to provide a Core Network solution that is stable, secure, reliable and scalable to accurately meet the needs of your organisation, users and customers.

Wireless Network


Unlike a wired network, which tethers your users to a desk, a wireless local area network (WLAN) enables flexible mobile network access. Untethering your users and enabling them to work where and when they need to, increasing productivity whilst reducing costs, cabling and set up time

A wireless local area network (LAN) allows you to connect devices such as laptops, tablets and mobile phones to the internet, corporate network and applications. Using radio waves broadcasted from access points, devices will stay connected to the network, from any location, untethered.


Our networking specialists will take the time to understand your requirements, existing infrastructure and site layout. Using industry leading site surveying software they are able to produce a wireless design showing access point location and heat maps demonstrating possible performance. Our designs focuse heavily on ensuring not only wireless coverage but that the solution is able to support the required density of devices to ensure a successful deployment.

Perimeter Network


A perimeter network allows you to gain better control when securing your data and application services by improving control over access to resources and reducing unauthenticated network traffic on your Local Area Networks..

A perimeter network, or De-Militarised Zone network (DMZ) as it is often referred, is a separate network, or multiple separate networks, segregated from the internal network and secured both internally and externally by a firewall. It is used to place application services such as web servers, some email servers and other public facing servers, to protect your internal network from unauthenticated external access.


Access in and out of the DMZ network is controlled by Firewall rules. Firewall rules controlling routes are configured to allow specific access from the internet and then to allow specific and definitive access to internal services.


We offer independent technical consultancy to design a perimeter (DMZ) network solution that allows you to control and secure your network, provide secure user access to corporate sources and applications, whilst reducing the risk of unauthenticated network traffic on your main LANs.