SlideShare a Scribd company logo
1 of 44
C O M P U T E R  N E T W O R K S D A T A  P R O T E C T I O N B I O M E T R I C  A C C E S S CAPABILITY  STATEMENT Innovative  Consulting & Technology, Inc. Chicago:  773.519.2495     www.Innovative.US.com DC:  202.494.8865  /  MD: 301.445.8000 Fax: 1.866.863.3399   CONTRACTOR
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Innovative  is a service optimization firm  composed of  the nation’s leading IT professionals, application developers, and technical installers. We use over 100 years of combined experience to create and implement processes for higher performance to government, commercial, and non-profit organizations. Innovative is committed  to achieving goals, increasing productivity, and finding Biometric solutions to enhance security. CAPABILITIES
GS-35F-0241P IT  PROFESSIONAL  SERVICES Contact: Dionte Alley – dalley@innovative.us.com (cell) 773.499.0336 Anthony Austin – anthony@innovative.us.com (cell) 773.519.2495 Alan Austin – alan@innovative.us.com (cell)  202.494.8865 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NATION WIDE GSA  SCHEDULE  70 nnovative   C onsulting  &  T echnology, Inc. ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Dedicated  To  Service” CAPABILITIES
Maryland Dept. of Transportation Management  Services  NAISC  Computer Systems Design & Install  541512 Computer & A/V Related Services    541519 Custom Computer  Programming    541511 Engineering Consulting Services   541330 Bldg. Architectural Design Services    541310 CAD Drafting Services     541512 CERTIFICATIONS
[object Object],[object Object],UNO Charter School Network GSN   Developers KBS  Computer Services, Inc. Select Client List U.S. Senate Capital  Hill Robert Half Technology, Inc. Voice Of America
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chicago, IL  Office Washington, DC  Office I n n o v a t i v e  Consulting  & Technology   Washington, DC  Officers: Director  of  Operations  - Alan Austin,  M. Arch Director  of  Technology  – Thomas Griner, BS IT Security Specialist  –Edward Patterson Office Manager  – Valerie Austin Legal Counsel  – Thomas Hart, Esq.  Chicago, IL Officers: Chief Information Officer  – Dionte Alley   Director of Strategic Planning  - Anthony Austin,  MBA/MPM Marketing Strategist  – Michael C. Bolden, MBA Director of Software Applications  – Maurtice Rosemond Network Engineer  - Mahiri Anderson, BSEE
DATA  RECOVERY ,[object Object],[object Object],REMOTE  ACCESS ,[object Object],[object Object],[object Object],SECURED  ACCESS ,[object Object],[object Object],D A T A  R E C O V E  R Y Non-Disclosure Statement Within this report, Innovative Consulting has developed certain valuable information, concepts, ideas or designs that is deemed strictly confidential.  Innovative  © 2009
DATA  RECOVERY  PLAN  (DRP) Many companies face challenges in stabilizing their network due to the threats of today’s computer environment.  Since September 11th, there has been loss of information due to terrorism, out-of-date hardware or software applications, and computer viruses.  Almost 50% of all companies will go out of business if they lost all of their computer data.  This information is vulnerable to the every day threats of fire and power outage.  Innovative  and its business partners have engineered several state-of-the-art Disaster Recovery Plans to protect your company’s data. A full data - DRP backs up all server data and applications.  The backup is programmed to occur every day to ensure the reinstallation of current information.  Innovative  also utilizes an imaging process to compress all of the stored data onto a single CD (compact disc.) The stored information can be uploaded quickly to minimize staff downtime.  A duplicate copy of the CD is also stored off-site to prevent damage in the case of a fire or power outage. “ Disaster recovery plans fall into the same category as various kinds of insurance: you have it because you cannot afford not to….  The main difference is that disaster recovery does not depend on how ‘likely’ something is to happen, because if a disaster does happen, it could put you out of business,”  states Heckman Consulting, a computer consulting company for law firms.  DATA  RECOVERY
INTENT The intent of this Disaster Recovery Plan (DRP) is to protect data/accounts and recover these electronic resources in the case of an emergency. SCOPE Eliminate  the Client’s responsibility of network administration and back-up activities. Design  a DRP that will automatically save data/accounts and business-critical applications on a remote server.  Store  the data/accounts online, on a real time basis, through a high-speed internet connection. Protect  the data/accounts in an encrypted format in a secured location. Activate  the DRP in the event that services are disrupted and the business location is declared unusable for normal operation.  Provide  routine data replication between main site and remote sites.  Supply  maintenance and testing services with evaluation of the devices that operate the DRP. DATA  RECOVERY
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DATA  RECOVERY
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DATA  RECOVERY
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DATA GLIDER DATA  RECOVERY
DATA  RECOVERY  ENTERPRISE Data protection specialists and 24x7 customer service reps. are available at the  off-site data protection centers. EVault  offers application agents that provide finer granularity backups of business-critical applications while they are up and running. Application agents for Microsoft Exchange, SQL Server, Microsoft Cluster Services, and Oracle are available. EVault  is the leading provider of secure, online backup & recovery services. Since 1997, more than 7,000 companies worldwide have trusted their business-critical data to these professionals.  Data is encrypted, then backed up to a secure data center. Safely off-site, the data is professionally managed and available online at all times for immediate recovery. DATA  RECOVERY
DATA  WAREHOUSE  SYSTEM   Electronically archive paper files through an Automated Data Processing (ADP) system with Innovative / ExCel for the digital imaging of account documents.  Please visit excelcorporation.com for a preview of the IMIGIT (imaging software  application) engineered by ExCel.  IBM made several offers to purchase this application, however, ExCel retains ownership of this proprietary software.  IMIGIT is a user-friendly system that organizes files in a cabinet, document, and page hierarchy for unlimited indexes within the search engine.  Transform hardcopy files into CD Rom, DVD, and hard drive (PC & Server) data formats.  This service is utilized by the Department of Labor (Washington, DC), Public School systems (Richmond, VA), and private clients throughout the DC Metro Area.  DATA  RECOVERY
Imaging Server Congressmen  Office  Computers Internet: 100 Mb Speed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DATA  RECOVERY
Systems  Engineering BLACKBERRY  NETWORKS Innovative  has configured Servers for the Blackberry Application to transmit E-mail & Data for the Federal Aviation Administration (FAA). The project also included project management services for the research and development of a Disaster Recovery Plan (DRP) to warehouse the data of the Blackberry Servers.  The off-site Servers were to be connected to the main network by an internet link that maintained continuous back-up activities.  The DRP was documented in a Policies and Procedures Manual that listed the actions to be taken if a disaster occurred. REMOTE  ACCESS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],REMOTE  ACCESS
NETWORK  MAINTENANCE Innovative  has provided IT professional services to Esystems for Remote network maintenance and computer up-grades for clients in the DC metro area. +  Virus  Protection  Updates +  Operating System Updates  +  Software Configurations for Network Servers +  Remotely Trouble Shoot Network Problems +  Data Back-up with Veritas Application Mitchell & Titus, LLP ,[object Object],[object Object],[object Object],[object Object],[object Object],REMOTE  ACCESS
BIOMETRIC IDENTIFICATION Increase Security : Password based authentication is susceptible to hacking, spoofing, and lax security practices by employees.  DigitalPersona Pro replaces passwords with fingerprint authentication assuring that only approved users can gain access to networks and applications.  In addition, DigitalPersona Pro supports multiple credential authentications.  Lower Password Administration Costs: On average, organizations spend $150 per employee/per year* on help desk costs driven by forgotten and expired passwords.  In addition, productivity is lost when people are “locked out” of their systems. DigitalPersona Pro takes passwords and password management out of the hands of users. Every authentication takes place with a simple touch of a finger.  After deploying DigitalPersona Pro, Office of the Secretary of Defense reported a 90% reduction in password related help desk calls** – along with high user satisfaction. Easy to Install: DigitalPersona Pro is easy for IT administrators to install into Active Directory networks without the need for expensive professional services or integration support. *SC Magazine, June 2003 **GCN, March 2004 SECURED  ACCESS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],US Senate   on Capital Hill SECURED  ACCESS
NETWORK  SYSTEMS ,[object Object],[object Object],[object Object],IT  STRATEGIC  PLANNING ,[object Object],[object Object],SYSTEMS  INTEGRATION ,[object Object],[object Object],[object Object],NETWORK  ENGINEERING
PM & NETWORK  SYSTEMS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remote  Workstations E-mail Server Printer Server Website Server Back-up Server Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],File Share Server Main Server Office  Workstations & Wireless Laptops NETWORK  SYSTEMS AACAP  NETWORK  ENGINEERING
AACAP  IT  INFRASTRUCTURE Network Server Voice Mail  and Telephone Panel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Patch Panel NETWORK  SYSTEMS
Start Review Application  Development / Systems  Integration Life Cycle Phases IEEE Software Engineering Standard © 1984 (Institute of Electrical and Electronic Engineers) Phase 1 Phase 2 Phase 3 Phase 4
Application  Development  / Systems  Integration   Project Management Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Innovative  has coined the term  FIT ©   ( Financial Information Technology)  and we are  registered as systems  integrators of automated applications that are cutting edge  technology.  DATA GLIDER SYSTEMS  INTEGRATION ,[object Object],[object Object],[object Object],Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Portal Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],Automated Applications
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SYSTEMS  INTEGRATION
[object Object],Workforce – Timekeeper and Payroll Chicago  Public  Schools (CPS)  Saves  $15 Million with District-Wide  Kronos®  Implementation.  CPS  is  the nation's  third - largest school  district  and  the  second-largest  employer  in Illinois.  The school  system operates 602 schools with 65,000 employees  and  serves more than  435,000 students.   Human Resource managers are more productive due to the use of Workforce Timekeeper and Payroll ®.  Employees can answer many tedious questions for themselves by viewing their time & attendance information on-line.  Employees have access to their vacation time, sick leave, works worked, and salary payments. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SYSTEMS  INTEGRATION
'Point of View' portal technology:   A web application that offers a single interface to various information sources and Healthcare applications. This technology is integration-capable, meaning the DataGlider system can retrieve data from more than one source at a time, and, applications can run on the interface through any of the portlets.  Access and interaction with information from Web and Wireless devices:   DataGlider's single architecture accommodates cabled internet access and wireless PDA access for ease and mobility. Combine general account information and  financial  information onto one interface:   View emails, news, and reference material, combined with specific account data, such as, cash flow reports, profit & loss statements, bank account data, financial chart and graphs. DATA GLIDER SYSTEMS  INTEGRATION
IT  Strategic Planning  The chart below displays the firm’s capabilities for technology integrated solutions and serves as performance measurements (metrics). Innovation Analysis  4.0   Market Place Analysis 4.1  Private Sector 4.2  Non-Profit Organizations 4.3  Commercial Applications 4.4  Federal Government 4.5  State & Local Agencies 4.6  Hospitals, Real Estate, Construction  3.0   Thought Leadership 3.1  Maintain Project Requirements 3.2  Forecast Project Budget 3.3  Emerge as Forerunner in technology solutions 3.4  Provide Turn-Key solutions: assess, implement, and  train 2.0   Systems Integration 2.1  Application Architecture & Design 2.2  Application Integration 2.3  Application Development 2.4  Testing, Migration, & Conversion 2.5  Technology Infrastructure 1.0   IT Business Management & Strategies 1.1  Planning and Vendor Selection 1.2  Performance Driven Organization  1.3  Governance & Portfolio Management 1.4  Value Management 1.5  Service Management 1.6  Outsource Consulting
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT  STRATEGIC  PLANNING
NEW  PRODUCTS  INITIATIVES Bio-Metric  ID  for  Computer Security Innovative managers obtained Security Clearance and  installed  Biometric  finger print scanners, by  Digital Persona,  to  replace  passwords  for the network  log-on  process.  The Biometric authentication increased the security for the Users and simplifies the log-on process.    This application is configured to work within the Windows OS environment. Innovative  also provided Computer Maintenance services for US Senators: •   Computer Network Upgrade & Maintenance of Network Devices for 27      U.S. Senators, including, Senators Barak Obama and John McCain;  •   Help Desk Responsibilities;  •   Blackberry cellular telephone configuration to the Blackberry Enterprise      Servers  (BES) IT  STRATEGIC  PLANNING
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT  STRATEGIC  PLANNING
Experienced Professionals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CORPORATE  OFFICERS
Dionte Alley is an established Network & Systems Engineer, he has 16 years of experience in  technical design, new products, and information technology. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alan Austin is an established program manager, he has 18 years of experience in the fields of architectural design, construction management, and information technology. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Anthony Austin is an experienced strategic planner, he has 18 years of experience in the fields of automated systems, program management, and information technology.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Michael Bolden an experienced strategic planner, he has 18 years of experience in the fields of market analysis, performance metrics, and industrial engineering.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Minimize  Staff Expenditures Contract Technicians  who are Dedicated  to Service

More Related Content

What's hot

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceMichelle Holley
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in Indiafranc24
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Prasant Mishra
 
Accelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT ConvergenceAccelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT ConvergencePanduit
 
AIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesAIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesJorge Cardoso
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Predictive Maintenance - Portland Machine Learning Meetup
Predictive Maintenance - Portland Machine Learning MeetupPredictive Maintenance - Portland Machine Learning Meetup
Predictive Maintenance - Portland Machine Learning MeetupIan Downard
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Prasant Mishra
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Prasant Mishra
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportCorporacion Colombia Digital
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017Smart ERP Solutions, Inc.
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 

What's hot (20)

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
Accelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT ConvergenceAccelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT Convergence
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
AIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesAIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed Traces
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Predictive Maintenance - Portland Machine Learning Meetup
Predictive Maintenance - Portland Machine Learning MeetupPredictive Maintenance - Portland Machine Learning Meetup
Predictive Maintenance - Portland Machine Learning Meetup
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision Support
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 

Similar to It Capabilities.2009

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Arindam_Kuila_Resume
Arindam_Kuila_ResumeArindam_Kuila_Resume
Arindam_Kuila_ResumeArindam Kuila
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptxssuser41d278
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Maximum Overdrive: How Cloud-Born Data Changes the Game
Maximum Overdrive: How Cloud-Born Data Changes the GameMaximum Overdrive: How Cloud-Born Data Changes the Game
Maximum Overdrive: How Cloud-Born Data Changes the GameInside Analysis
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4National Management Olympiad
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Informa solutions services and solutions
Informa solutions   services and solutionsInforma solutions   services and solutions
Informa solutions services and solutionsHarikumar Bhaskaran
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfKen Fuller
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 

Similar to It Capabilities.2009 (20)

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 
Arindam_Kuila_Resume
Arindam_Kuila_ResumeArindam_Kuila_Resume
Arindam_Kuila_Resume
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
resume.doc
resume.docresume.doc
resume.doc
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Peter J. Simpson Resume
Peter J. Simpson ResumePeter J. Simpson Resume
Peter J. Simpson Resume
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
DreamzTech CMMS Solutions
DreamzTech CMMS SolutionsDreamzTech CMMS Solutions
DreamzTech CMMS Solutions
 
Maximum Overdrive: How Cloud-Born Data Changes the Game
Maximum Overdrive: How Cloud-Born Data Changes the GameMaximum Overdrive: How Cloud-Born Data Changes the Game
Maximum Overdrive: How Cloud-Born Data Changes the Game
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Informa solutions services and solutions
Informa solutions   services and solutionsInforma solutions   services and solutions
Informa solutions services and solutions
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 

It Capabilities.2009

  • 1. C O M P U T E R N E T W O R K S D A T A P R O T E C T I O N B I O M E T R I C A C C E S S CAPABILITY STATEMENT Innovative Consulting & Technology, Inc. Chicago: 773.519.2495 www.Innovative.US.com DC: 202.494.8865 / MD: 301.445.8000 Fax: 1.866.863.3399 CONTRACTOR
  • 2.
  • 3.
  • 4.
  • 5. Maryland Dept. of Transportation Management Services NAISC Computer Systems Design & Install 541512 Computer & A/V Related Services 541519 Custom Computer Programming 541511 Engineering Consulting Services 541330 Bldg. Architectural Design Services 541310 CAD Drafting Services 541512 CERTIFICATIONS
  • 6.
  • 7.
  • 8.
  • 9. DATA RECOVERY PLAN (DRP) Many companies face challenges in stabilizing their network due to the threats of today’s computer environment. Since September 11th, there has been loss of information due to terrorism, out-of-date hardware or software applications, and computer viruses. Almost 50% of all companies will go out of business if they lost all of their computer data. This information is vulnerable to the every day threats of fire and power outage. Innovative and its business partners have engineered several state-of-the-art Disaster Recovery Plans to protect your company’s data. A full data - DRP backs up all server data and applications. The backup is programmed to occur every day to ensure the reinstallation of current information. Innovative also utilizes an imaging process to compress all of the stored data onto a single CD (compact disc.) The stored information can be uploaded quickly to minimize staff downtime. A duplicate copy of the CD is also stored off-site to prevent damage in the case of a fire or power outage. “ Disaster recovery plans fall into the same category as various kinds of insurance: you have it because you cannot afford not to…. The main difference is that disaster recovery does not depend on how ‘likely’ something is to happen, because if a disaster does happen, it could put you out of business,” states Heckman Consulting, a computer consulting company for law firms. DATA RECOVERY
  • 10. INTENT The intent of this Disaster Recovery Plan (DRP) is to protect data/accounts and recover these electronic resources in the case of an emergency. SCOPE Eliminate the Client’s responsibility of network administration and back-up activities. Design a DRP that will automatically save data/accounts and business-critical applications on a remote server. Store the data/accounts online, on a real time basis, through a high-speed internet connection. Protect the data/accounts in an encrypted format in a secured location. Activate the DRP in the event that services are disrupted and the business location is declared unusable for normal operation. Provide routine data replication between main site and remote sites. Supply maintenance and testing services with evaluation of the devices that operate the DRP. DATA RECOVERY
  • 11.
  • 12.
  • 13.
  • 14. DATA RECOVERY ENTERPRISE Data protection specialists and 24x7 customer service reps. are available at the off-site data protection centers. EVault offers application agents that provide finer granularity backups of business-critical applications while they are up and running. Application agents for Microsoft Exchange, SQL Server, Microsoft Cluster Services, and Oracle are available. EVault is the leading provider of secure, online backup & recovery services. Since 1997, more than 7,000 companies worldwide have trusted their business-critical data to these professionals. Data is encrypted, then backed up to a secure data center. Safely off-site, the data is professionally managed and available online at all times for immediate recovery. DATA RECOVERY
  • 15. DATA WAREHOUSE SYSTEM Electronically archive paper files through an Automated Data Processing (ADP) system with Innovative / ExCel for the digital imaging of account documents. Please visit excelcorporation.com for a preview of the IMIGIT (imaging software application) engineered by ExCel.  IBM made several offers to purchase this application, however, ExCel retains ownership of this proprietary software. IMIGIT is a user-friendly system that organizes files in a cabinet, document, and page hierarchy for unlimited indexes within the search engine. Transform hardcopy files into CD Rom, DVD, and hard drive (PC & Server) data formats.  This service is utilized by the Department of Labor (Washington, DC), Public School systems (Richmond, VA), and private clients throughout the DC Metro Area. DATA RECOVERY
  • 16.
  • 17. Systems Engineering BLACKBERRY NETWORKS Innovative has configured Servers for the Blackberry Application to transmit E-mail & Data for the Federal Aviation Administration (FAA). The project also included project management services for the research and development of a Disaster Recovery Plan (DRP) to warehouse the data of the Blackberry Servers. The off-site Servers were to be connected to the main network by an internet link that maintained continuous back-up activities. The DRP was documented in a Policies and Procedures Manual that listed the actions to be taken if a disaster occurred. REMOTE ACCESS
  • 18.
  • 19.
  • 20. BIOMETRIC IDENTIFICATION Increase Security : Password based authentication is susceptible to hacking, spoofing, and lax security practices by employees.  DigitalPersona Pro replaces passwords with fingerprint authentication assuring that only approved users can gain access to networks and applications.  In addition, DigitalPersona Pro supports multiple credential authentications.  Lower Password Administration Costs: On average, organizations spend $150 per employee/per year* on help desk costs driven by forgotten and expired passwords.  In addition, productivity is lost when people are “locked out” of their systems. DigitalPersona Pro takes passwords and password management out of the hands of users. Every authentication takes place with a simple touch of a finger.  After deploying DigitalPersona Pro, Office of the Secretary of Defense reported a 90% reduction in password related help desk calls** – along with high user satisfaction. Easy to Install: DigitalPersona Pro is easy for IT administrators to install into Active Directory networks without the need for expensive professional services or integration support. *SC Magazine, June 2003 **GCN, March 2004 SECURED ACCESS
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Start Review Application Development / Systems Integration Life Cycle Phases IEEE Software Engineering Standard © 1984 (Institute of Electrical and Electronic Engineers) Phase 1 Phase 2 Phase 3 Phase 4
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. 'Point of View' portal technology: A web application that offers a single interface to various information sources and Healthcare applications. This technology is integration-capable, meaning the DataGlider system can retrieve data from more than one source at a time, and, applications can run on the interface through any of the portlets. Access and interaction with information from Web and Wireless devices: DataGlider's single architecture accommodates cabled internet access and wireless PDA access for ease and mobility. Combine general account information and financial information onto one interface: View emails, news, and reference material, combined with specific account data, such as, cash flow reports, profit & loss statements, bank account data, financial chart and graphs. DATA GLIDER SYSTEMS INTEGRATION
  • 32. IT Strategic Planning The chart below displays the firm’s capabilities for technology integrated solutions and serves as performance measurements (metrics). Innovation Analysis 4.0 Market Place Analysis 4.1 Private Sector 4.2 Non-Profit Organizations 4.3 Commercial Applications 4.4 Federal Government 4.5 State & Local Agencies 4.6 Hospitals, Real Estate, Construction 3.0 Thought Leadership 3.1 Maintain Project Requirements 3.2 Forecast Project Budget 3.3 Emerge as Forerunner in technology solutions 3.4 Provide Turn-Key solutions: assess, implement, and train 2.0 Systems Integration 2.1 Application Architecture & Design 2.2 Application Integration 2.3 Application Development 2.4 Testing, Migration, & Conversion 2.5 Technology Infrastructure 1.0 IT Business Management & Strategies 1.1 Planning and Vendor Selection 1.2 Performance Driven Organization 1.3 Governance & Portfolio Management 1.4 Value Management 1.5 Service Management 1.6 Outsource Consulting
  • 33.
  • 34. NEW PRODUCTS INITIATIVES Bio-Metric ID for Computer Security Innovative managers obtained Security Clearance and  installed  Biometric  finger print scanners, by Digital Persona,  to  replace  passwords  for the network  log-on  process. The Biometric authentication increased the security for the Users and simplifies the log-on process.    This application is configured to work within the Windows OS environment. Innovative also provided Computer Maintenance services for US Senators: •  Computer Network Upgrade & Maintenance of Network Devices for 27     U.S. Senators, including, Senators Barak Obama and John McCain; •   Help Desk Responsibilities; •   Blackberry cellular telephone configuration to the Blackberry Enterprise     Servers  (BES) IT STRATEGIC PLANNING
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.