PNJ Technology Partners Provides Information Technology SolutionsFor Businesses Across The Capital District

Managed IT Services
Managed IT Services

Managed IT Services from PNJ Technology Partners Allows You to Improve Workforce Efficiency and Produce More Revenue

Network Security
Network Security

PNJ Technology Partners Protects Your Network and Keeps Sensitive Data Secure

Cloud Solutions
Cloud Solutions

The Cost-Cutting And Productivity-Enhancing Benefits Of The Cloud

Albany Businesses Trust PNJ Technology Partners With Information Technology

Consulting and Computer Support for Over Three Decades

PNJ Technology Partners Inc. was founded in 1984 by Paul Joralemon – giving us over 30 years experience – and we’re a proud second generation company, as Paul’s son Scott has since become President of PNJ Technology Partners after joining his father back in 1990. We’ve grown and thrived for over three decades with our innovative vision and willingness to adapt; moving beyond traditional IT services with a proactive approach that helps us minimize issues, disruption, and downtime for our clients.
We keep our clients happy as we help them grow and improve their bottom line – and we find it’s valuable for us in the long run to genuinely look out for our clients; because we know our success is tied to their success.

START

1984

Paul Joralemon founded PNJ Technology Partners, Inc. to serve Capital District businesses.

1999

A banner growth year as we helped Capital District companies get ready for Y2K.

2013

Relocated to New Karner Road to better serve growing list of satisfied clients.

1989

Scott Joralemon joins the team to help drive customer service and sales.

2001

Compaq merges with Hewlett-Packard strengthening PNJ’s Enterprise Networking, Server, Storage and Support portfolio.

TODAY

TECHNOLOGY NEWS & INSIGHTS From Your Albany IT Services & Technology Support Team.

  • The Remote Work Security Gap No One Talks About

    Remote work has been a game-changer. Lower overhead. Happier employees. Wider talent pool. All wins. But there’s a catch: every remote login, home Wi-Fi network, and personal device your team uses is another open door a hacker might walk through. In an office, you control the network. You control the devices. You control the environment. […]

    Read More...
    arrow
  • The Truth About Shadow IT

    Not every cyber risk comes from the outside. Some walk right in the front door … in the form of tools, apps, and devices your own employees are using without asking. It’s called shadow IT. And it’s probably already happening in your business. What Is Shadow IT? Shadow IT is any tech your employees use […]

    Read More...
    arrow
  • 6 Habits That Quietly Decide If Hackers Win or Lose

    Most cyberattacks don’t start with a mastermind hacker running lines of code in some movie-style lair. They start with something small. A sticky note with a password written on it.A rushed click on a link that “looked fine.”A laptop left unlocked while its owner grabs a coffee. One moment like that can undo every dollar […]

    Read More...
    arrow
Click Here To Read Our IT Services Blog