About US


           Based in Gloucestershire, we offer a range of IT design,
           consultancy and support services to small and medium sized
           businesses throughout the UK and internationally.


           We recognize that all businesses have different requirements,
           resources and preferences which is why we build flexibility and
           understanding into every service.


           Whether acting as your IT department or supporting existing IT
           personnel, our friendly, experienced staff will work in harmony
           with your business and provide the expertise to develop and
           support one of your biggest assets….. your network.




FM035/01
Consultancy

    Growth and change within your business will invariably mean changes to your IT infrastructure. Whether planning changes and
    upgrades using your own IT personnel or outsourcing, we will work with you to evaluate the current status of your network,
    identify opportunities for improvement, and provide a strategy




    •      Support your business objectives

    •      Enable effective budgeting and planning

    •      Maximize your investment




FM035/01
IT Project Design & Implementation




  Initial Scope                          Training



  Planning                               Documentation



   Implementation                        Hardware




FM035/01
International Solutions

     Our proven track record in the design, installation and maintenance of international IT platforms makes us the perfect choice for
     businesses embarking on an international presence and for those who already possess one.

                                                 We currently provide support in......

                                   Germany                                                 Poland
                                 Austria                                                       Hong Kong
                           Hungary                                                                  Switzerland

                         Canada                                                                      Spain
                                                                                                     Czech Republic
                         Italy
                                                                                                    Singapore
                           Romania
                                                                                               South Africa
                                 China                                                     Israel
                                    France                                               USA




FM035/01
IT Project Design & Implementation

    Virtualization allows you to run multiple machines on a single physical machine, with each virtual machine sharing the resources
    of that one physical computer across multiple environments. Different virtual machines can run different operating systems and
    multiple applications on the same physical computer.



                                                                            Top five reasons to virtualize



                                                                            •    Make better use of existing resources

                                                                            •    Reduce costs

                                                                            •    Improve business continuity

                                                                            •    Gain operational flexibility

                                                                            •    Improve desktop manageability & security




FM035/01
Structured Cabling Installations


    Replacing multiple traditional cabling systems with structured
    cabling, provides a single, unified infrastructure with the ability to
    carry data in any format.


    With structured cabling, your business can enjoy data, voice and
    multimedia with vital functionality and reliability.


    Managing change, whether relocating one desk, a whole
    department, or restructuring an entire floor, could not be easier.


    A well designed, standards compliant structured cabling system,
    backed by a comprehensive warranty programme can help protect
    your investment and cope with future requirements.


    Excel and Connectix accredited installations, both carrying a 25 year
    warranty,equal sound investment and peace of mind.




FM035/01
Managed Firewall & Security Solutions


    Transferring and sharing valuable and confidential information via a
    network is commonplace.

    Unfortunately, this information can be open to theft or misuse and the
    systems communicating or storing it susceptible to disruption or
    damage.

    Attacks on a network can be planned and specifically targeted, whereas
    others may be opportunistic.

    Ensuring your network is resilient to such attacks is vital not only
    commercially but legislatively.




    How secure is your network?




FM035/01
Remote Access (VPN)


    Many companies have remote facilities and individuals posted
    around the country and indeed the world, all with the need to
    maintain fast, secure and reliable communications wherever their
    location.


    A VPN (virtual private network) is a private network that uses a
    public network (e.g. the Internet) and offers a complete solution for
    companies seeking a cost-effective method of transferring data
    between users in multiple locations




FM035/01
Centralized Antivirus Management
    Having a tightly controlled firewall on the perimeter of a network will prevent incoming malicious connections and is a vital
    component within the security function. However, sophisticated and devious methods, designed to trick users into allowing
    malware (malicious software) onto their computers remain prevalent, making antivirus software at client / server level as
    important as ever.

    Viral attacks can take many forms. As manufacturers of operating systems develop the effectiveness of their security
    patching, creators of malware adopt more inventive methods to infiltrate networks and PCs.



    Virus
                                                                                         Find out if your IP address is blacklisted
    Email Virus
                                                                                             To find out your IP address, visit
    Trojan Horse                                                                                   www.whatismyip.com

    Worm                                                                                   Visit www.mxtoolbox.com and select
                                                                                             ‘Blacklists’. Enter your IP address.
    Spyware




FM035/01
DR Planning and Business Recovery

    With an organization’s data being the lifeblood of the business, an effective and efficient back-up process is crucial to protect
    hard-earned information and critical records.

    Forming a fundamental part of a business continuity or disaster recovery plan, a back-up procedure must ensure that vital
    information is preserved and can be fully restored



    Tape Back-up                                  Online Back-up                                  Disk 2 Disk Back-up

    Still a popular method and can be             An ideal solution for businesses                Providing a higher end solution
    reliable if procedures regarding              with a limited amount of data to                and removing the need for many
    tape storage and security are                 back-up. The transit time via the               administration tasks, such as
    adhered to and processes such as              Internet may make it unsuitable                 performing nightly or even hourly
    restore checks are routinely                  for businesses with larger                      back-ups of critical data.
    conducted.                                    amounts of data. In addition, the               Businesses with more than one
                                                  restore options available are                   site are able to replicate these
                                                  largely limited to file only, as                devices between sites, negating
                                                  opposed to bare metal                           the need to manually remove and
                                                  restore, etc.                                   store data off-site.




FM035/01
Thank you for taking the time to view this presentation.




FM035/01

Evolve Com Tec Presentation

  • 1.
    About US Based in Gloucestershire, we offer a range of IT design, consultancy and support services to small and medium sized businesses throughout the UK and internationally. We recognize that all businesses have different requirements, resources and preferences which is why we build flexibility and understanding into every service. Whether acting as your IT department or supporting existing IT personnel, our friendly, experienced staff will work in harmony with your business and provide the expertise to develop and support one of your biggest assets….. your network. FM035/01
  • 2.
    Consultancy Growth and change within your business will invariably mean changes to your IT infrastructure. Whether planning changes and upgrades using your own IT personnel or outsourcing, we will work with you to evaluate the current status of your network, identify opportunities for improvement, and provide a strategy • Support your business objectives • Enable effective budgeting and planning • Maximize your investment FM035/01
  • 3.
    IT Project Design& Implementation Initial Scope Training Planning Documentation Implementation Hardware FM035/01
  • 4.
    International Solutions Our proven track record in the design, installation and maintenance of international IT platforms makes us the perfect choice for businesses embarking on an international presence and for those who already possess one. We currently provide support in...... Germany Poland Austria Hong Kong Hungary Switzerland Canada Spain Czech Republic Italy Singapore Romania South Africa China Israel France USA FM035/01
  • 5.
    IT Project Design& Implementation Virtualization allows you to run multiple machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer. Top five reasons to virtualize • Make better use of existing resources • Reduce costs • Improve business continuity • Gain operational flexibility • Improve desktop manageability & security FM035/01
  • 6.
    Structured Cabling Installations Replacing multiple traditional cabling systems with structured cabling, provides a single, unified infrastructure with the ability to carry data in any format. With structured cabling, your business can enjoy data, voice and multimedia with vital functionality and reliability. Managing change, whether relocating one desk, a whole department, or restructuring an entire floor, could not be easier. A well designed, standards compliant structured cabling system, backed by a comprehensive warranty programme can help protect your investment and cope with future requirements. Excel and Connectix accredited installations, both carrying a 25 year warranty,equal sound investment and peace of mind. FM035/01
  • 7.
    Managed Firewall &Security Solutions Transferring and sharing valuable and confidential information via a network is commonplace. Unfortunately, this information can be open to theft or misuse and the systems communicating or storing it susceptible to disruption or damage. Attacks on a network can be planned and specifically targeted, whereas others may be opportunistic. Ensuring your network is resilient to such attacks is vital not only commercially but legislatively. How secure is your network? FM035/01
  • 8.
    Remote Access (VPN) Many companies have remote facilities and individuals posted around the country and indeed the world, all with the need to maintain fast, secure and reliable communications wherever their location. A VPN (virtual private network) is a private network that uses a public network (e.g. the Internet) and offers a complete solution for companies seeking a cost-effective method of transferring data between users in multiple locations FM035/01
  • 9.
    Centralized Antivirus Management Having a tightly controlled firewall on the perimeter of a network will prevent incoming malicious connections and is a vital component within the security function. However, sophisticated and devious methods, designed to trick users into allowing malware (malicious software) onto their computers remain prevalent, making antivirus software at client / server level as important as ever. Viral attacks can take many forms. As manufacturers of operating systems develop the effectiveness of their security patching, creators of malware adopt more inventive methods to infiltrate networks and PCs. Virus Find out if your IP address is blacklisted Email Virus To find out your IP address, visit Trojan Horse www.whatismyip.com Worm Visit www.mxtoolbox.com and select ‘Blacklists’. Enter your IP address. Spyware FM035/01
  • 10.
    DR Planning andBusiness Recovery With an organization’s data being the lifeblood of the business, an effective and efficient back-up process is crucial to protect hard-earned information and critical records. Forming a fundamental part of a business continuity or disaster recovery plan, a back-up procedure must ensure that vital information is preserved and can be fully restored Tape Back-up Online Back-up Disk 2 Disk Back-up Still a popular method and can be An ideal solution for businesses Providing a higher end solution reliable if procedures regarding with a limited amount of data to and removing the need for many tape storage and security are back-up. The transit time via the administration tasks, such as adhered to and processes such as Internet may make it unsuitable performing nightly or even hourly restore checks are routinely for businesses with larger back-ups of critical data. conducted. amounts of data. In addition, the Businesses with more than one restore options available are site are able to replicate these largely limited to file only, as devices between sites, negating opposed to bare metal the need to manually remove and restore, etc. store data off-site. FM035/01
  • 11.
    Thank you fortaking the time to view this presentation. FM035/01