A symbol of a Keeshond with a cybersecurity symbol and a computer. it says IT Kees in the background
Line drawing of a dog wearing glasses, with a fluffy fur coat, facing to the right.

About Us

Founded by an Air Force veteran with over 15 years of experience in IT, cybersecurity, and intelligence, IT Kees was built on the belief that every business, big or small, deserves personal attention and dependable support.

The name IT Kees comes from both our field and our mascot, the Keeshond, a loyal and intelligent breed known for its deep affection for its family. That spirit defines how we serve our clients: with vigilance, dedication, and genuine care.


Our founder owns and trains an award-winning AKC Agility Keeshond, a reminder that great results come from patience, consistency, and teamwork; the same principles we bring to every client relationship.

How We Help You Succeed

Black and white illustration of a dog sitting next to a laptop computer.

Systems Administration and IT Services

Reliable setup, monitoring, and maintenance to ensure your technology works as hard as you do. This includes continuous support for IT infrastructure including monitoring, maintenance, asset management, and troubleshooting of hardware, software, and networks. Providing help desk assistance and support for hardware, software, and user-related issues.

A Keeshond anda a symbol representing Cloud IT Services

Cloud and Data Services

Tailored solutions to help your team collaborate securely and work seamlessly from anywhere. This includes setting up and maintaining cloud solutions, productivity suites, file storage/sharing, cloud applications, email services, and automated data backup and recovery systems.

Line drawing of a Keeshond with a speech bubble of a person icon, a pie chart, and an upward trending graph to indicate consultation services.

IT and Security Consulting

Expert guidance to secure your systems, strengthen compliance, and support your business goals. Services include comprehensive risk assessments, vulnerability assessments, and gap analyses to identify current security posture and compliance weaknesses. Companies can receive help creating and implementing custom security programs, policies, and procedures to meet specific regulatory frameworks. Help with compliance regulations and frameworks such as HIPAA, HITRUST, ISO27001, PCI DSS, SOC 2, ect.

Contact Us

Interested in working together? Fill out some info and we will be in touch shortly. We can’t wait to hear from you!

If you are looking to ask about services, feel free to contact us at:
‪(210) 446-6514‬

Privacy Policy