Your IT Infrastructure Support Partner

1,465 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,465
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
106
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Your IT Infrastructure Support Partner

  1. 1. IT Infrastructure Services (IT IS)<br />Systems Plus Solutions<br />India | USA | UK<br />
  2. 2. IT IS @ SPS<br />Our IT Infrastructure Services are aimed to help our customers build, manage, and optimize their IT infrastructure<br />We enable our customers keep their business-critical applications and IT infrastructure running 24x7<br />We help our customer lower the cost of managing their IT infrastructure through high service levels and operational competence<br />This on the other hands frees up your key resources for engaging into strategic important strategies for your organization<br />Our SLA based service approach is delivered by eminent professionals with decades of experience in IT & Infrastructure Consulting / Management and provides enhanced value to customers<br />
  3. 3. Our Core Services<br />Remote Monitoring and Support<br />Security Audits<br />IT Infrastructure Services<br />(IT IS)<br />SMB Lite<br />Advanced IT Infrastructure Consulting<br />
  4. 4. Remote Monitoring & Support Offerings<br />Remote Monitoring and Support<br />
  5. 5. Server Management – Key <br />Remote Monitoring and Support<br /><ul><li>Alert Monitoring
  6. 6. Remote monitoring of servers on a 24x7 basis for fault, performance, and security alerts. Proactively escalate issues to appropriate groups.
  7. 7. Resolution Management
  8. 8. Remote resolution of server problems on a 24x7 basis for fault, performance, and security issues.
  9. 9. Vulnerability Management
  10. 10. Periodic and real-time scanning for vulnerabilities on servers. Identify potential security vulnerabilities and resolve them.
  11. 11. User Monitoring
  12. 12. Track and report all user activity on critical servers. Identify suspicious activity and take corrective action.
  13. 13. Backup and Archiving
  14. 14. Proactively backup the critical data stored in your servers, and protect yourself from any critical data loss or failure of storage.
  15. 15. Remote System Administration
  16. 16. Instantly solve any server issue with access to real-time access to certified server administrators. Remote access resolution of any type of server problem.</li></li></ul><li>Server Management<br />Remote Monitoring and Support<br /><ul><li>System log / console errors / warnings
  17. 17. Message Queuing Management
  18. 18. Installation of packages / patches / OS upgrades
  19. 19. Anti Virus & Security Patch Management
  20. 20. Server and User account admin
  21. 21. Data backup and restore process
  22. 22. AS-400 Support
  23. 23. MQ support
  24. 24. Queues / Job / JCL management
  25. 25. Z/Os support
  26. 26. Application support based on RPG
  27. 27. Servers:
  28. 28. Microsoft
  29. 29. Linux, Unix/AIX
  30. 30. Mainframe
  31. 31. Reporting
  32. 32. Availability
  33. 33. Call logs (we can log all the problems and send it over to the main team supporting the environment)
  34. 34. Upgrade needs
  35. 35. Fixes to the common problems
  36. 36. Tools:
  37. 37. Nagios, Solarwinds, Nimsoft
  38. 38. Jira or BugZilla</li></li></ul><li>Database & Middleware Support<br />Remote Monitoring and Support<br />Our DBA & Middleware support services are designed to help put in place an ideal team that supports your system. Our team of skilled DBAs and Middleware consultants work with you to configure a program that is best suited to your requirements.<br /><ul><li>Databases</li></ul>Oracle, MS SQL Server, MySQL, DB2<br /><ul><li>Microsoft / 3rd Party Application Support
  39. 39. Support
  40. 40. Migration
  41. 41. Application Upgrades
  42. 42. Web Server / Middleware Management & Support: Microsoft / Sun / IBM / Oracle / Open Source</li></ul>DBA Consulting Services<br /><ul><li>Database and application assessment and upgrade / migration
  43. 43. Project planning & management
  44. 44. Installation of applications, new features and functionality
  45. 45. Business continuity solution design and implementation
  46. 46. Implementation of backup and recovery solutions
  47. 47. High availability solution design and implementation
  48. 48. Integration service - with Oracle or non-Oracle applications
  49. 49. Performance assessment and tuning
  50. 50. Implementation of advanced database, application security configuration</li></li></ul><li>Database & Middleware Support<br />Remote Monitoring and Support<br />Remote Database & Applications Management<br /><ul><li>Monitoring instance parameters and health of the system
  51. 51. Monitor alert log and other application-related logs and take corrective actions
  52. 52. Install application and security patches
  53. 53. Monitor application, database usage and record the data for further analysis
  54. 54. Check performance parameters and tune accordingly
  55. 55. Manage application or database cloning
  56. 56. Monitor and manage COLD or HOT database backups, recovery
  57. 57. Extended support during month-end closing activity
  58. 58. Quick response emergency support for production instance outage
  59. 59. Managing users, responsibility, profiles
  60. 60. Managing advanced database security configuration</li></li></ul><li>Database & Middleware Support<br />Remote Monitoring and Support<br />Infrastructure Consulting for Applications & Databases<br /><ul><li>Short-term solutions with quick, measurable ROI to resolve critical business pains
  61. 61. Clear and concise designs which help you to rapidly select and deploy the solution right for your business and existing infrastructure
  62. 62. Review the infrastructure, application and database servers
  63. 63. Review the operating system details, performance parameters
  64. 64. Review the database, application performance statistics
  65. 65. Review database security and applied patches
  66. 66. Review backup and recovery policies and procedures
  67. 67. Provides a detailed report on the infrastructure assessment</li></li></ul><li>Delivery Methodology<br />Remote Monitoring and Support<br />
  68. 68. Security Audits: WHY?<br />Security Audit<br />Why Security Audits?<br />Key Questions? <br /><ul><li>Recent security research performed by Deloitte suggests that most data security breaches have happened due to internal threats than external.
  69. 69. Just one unhappy employee having access to crucial systems is more than capable to cause security data breaches.
  70. 70. Hence it is important to secure the assets (systems and databases) internally too.
  71. 71. What technologies do we have on board (like server OS, middleware etc)?
  72. 72. Are the core technologies (servers, networks and application) secure enough to conduct business?
  73. 73. Can someone from within the company easily disrupt the business operations?
  74. 74. Are the passwords on all devices set and strong enough?
  75. 75. How easy / difficult is it for an individual to access all crucial data?
  76. 76. Do people have access to information / email not pertaining to their work?
  77. 77. Can an unauthorized user (internal or external) access any information?</li></li></ul><li>Security Audit Offerings<br />Security Audit<br />Our Offerings<br />Deliverables<br />We perform host, network and application security for the enterprise to present high, medium and low vulnerabilities on the internal assets.<br /><ul><li>Host Security
  78. 78. Network Security
  79. 79. Application Security
  80. 80. Detailed Audit Findings Report:
  81. 81. Each finding of the audit categorized as High, Medium, Low or Critical
  82. 82. Includes necessary information / evidence for justification
  83. 83. Risk of running the services based on the findings
  84. 84. All services mapped with findings which will help present an appropriate perspective of business continuity.
  85. 85. Remediation path / recommendation for high and medium findings:
  86. 86. Recommendations / suggestions will be given for all critical and high vulnerabilities along with the size of the effort to address each of those</li></li></ul><li>Security Audits: Delivery Methodology<br />Security Audit<br /> <br />
  87. 87. Security Audits: How it helps?<br />Security Audit<br />The audit report would present an unbiased, practical and an effective perspective to the management and shall provide answers to some key questions like:<br /><ul><li>Are the IT services aligned from reliability, availability, security and scalability perspective?
  88. 88. What steps should be taken to improve the IT services to support the business needs?
  89. 89. What areas of IT should the management focus on how do we get best returns on the investments.</li></ul>Audit help the management determine further course of action. <br />
  90. 90. Advanced IT Infrastructure Consulting: Offering<br />Advanced IT Infrastructure Consulting<br />Performance Engineering<br />IT Infrastructure Consulting<br />Engineering & Operations Standards & Policies<br />We shall understand and analyze the build / deploy and support policies to ensure smooth functioning of IT operations.<br />Our engineers will perform network packet captures to analyze the traffic between hosts to determine if the application’s performance on the wire is optimal enough.<br /><ul><li>Design assessment, Optimization, Capacity planning
  91. 91. Data model refactoring
  92. 92. Performance engineering:
  93. 93. LAMP, open source stacks & Databases
  94. 94. Performance feasibility analysis, modeling and benchmarking</li></ul>Our engineers can provide designs to host and secure web based applications with a defense-in-depth mechanism. We also provide guidelines to engineer secure operating system and middleware builds. <br /><ul><li>IT & Systems Diagnostic
  95. 95. Infrastructure Planning
  96. 96. Conception and implementation of new IT environments / Apps & ERP infrastructure
  97. 97. Client/server infrastructure (including virtual environments)
  98. 98. Multilevel security concepts
  99. 99. Outsourcing</li></li></ul><li>SMB Lite: Offering<br />SMB Lite<br /><ul><li>This unique offering will harness the potential of Internet and Software as a Service (SaaS).
  100. 100. A perfect combination of the two will basically reduce SMB’s capital investment in IT infrastructure (servers, licenses) and IT man power.
  101. 101. Domain registration for your company
  102. 102. Setup and configuring internet based email and installing email clients on your desktops
  103. 103. Setup of internet based office automation products (documents, spreadsheets, calendar and integrated chat)
  104. 104. Training to end users (two sessions of an hour each) for use of those applications.
  105. 105. Create a basic corporate website using standard templates or a SharePoint portal setup</li></li></ul><li>Case Studies: PepsiCo Germany MIS Support<br />Case Studies<br /><ul><li>SQL Server Support (offshore)
  106. 106. MSSQL Server 2000 DTS Packages
  107. 107. MS SQL Analysis Server Cubes
  108. 108. Linked Server
  109. 109. Key Support Activities:
  110. 110. Batch process Monitoring
  111. 111. Performance Monitoring
  112. 112. Loading Data from Clipper to SQL Server 2000
  113. 113. Monthly OLAP Cube data processing
  114. 114. SQL Job processing issue resolution
  115. 115. SQL Server : space and log files management
  116. 116. Designing and maintaining of SQL Data transformation packages (DTS packages)
  117. 117. Map and document application data structure and architecture of the existing system
  118. 118. Understand and documented the data flow and system architecture
  119. 119. Knowledge gaining on functionalities of different applications and documented
  120. 120. Setup Test Environment for easy deployment of new versions
  121. 121. Other Support Activity
  122. 122. Technologies Supported:
  123. 123. ProClarity OLAP Reporting tool
  124. 124. Clipper, Business Objects
  125. 125. Visual Objects
  126. 126. Crystal Reports
  127. 127. Report Pro
  128. 128. AppFact 5.0 Framework
  129. 129. Other Activities:
  130. 130. Infrastructure Setup (VPN, Voice Communication, Systems Plus web enabled service desk.)
  131. 131. Developed and implemented web based User rights management system for existing clipper system
  132. 132. Scheduled task management for downloading data from AS/400
  133. 133. Implemented Service desk for online issue tracking and updating/ closure
  134. 134. Document all incidents and solutions for future help</li></li></ul><li>Thank You<br />Please visit us at www.systems-plus.com <br />Systems Plus Solutions Ltd.<br />Soane Point, 6-8 Market Place, <br />Reading, RG1 2EG, <br />United Kingdom <br />richard.gillespie@systems-plus.co.uk<br />Tel: + 44 (0) 118 907 2507 (Direct Line)<br />Systems Plus Solutions<br />USA LLC<br />Suite 1-A, 9 Glenmere Pl.<br />Old Bridge, NJ 08857, USA<br />Merveille.n@spluspl.com<br />Tel: 732-414-8943<br />Fax: 732-414-4260<br />Systems Plus Solutions<br />Hiranandani House, Saraswat Lane, Off Linking Road, Santacruz (West), Mumbai - 54<br />aabhas.z@spluspl.com<br />Tel: + 91 22 26608201<br />(Ext: 108)<br />SPS Group Offices: Pune, Belapur, Ahmedabad<br />

×