SlideShare a Scribd company logo
About US


           Based in Gloucestershire, we offer a range of IT design,
           consultancy and support services to small and medium sized
           businesses throughout the UK and internationally.


           We recognize that all businesses have different requirements,
           resources and preferences which is why we build flexibility and
           understanding into every service.


           Whether acting as your IT department or supporting existing IT
           personnel, our friendly, experienced staff will work in harmony
           with your business and provide the expertise to develop and
           support one of your biggest assets….. your network.




FM035/01
Consultancy

    Growth and change within your business will invariably mean changes to your IT infrastructure. Whether planning changes and
    upgrades using your own IT personnel or outsourcing, we will work with you to evaluate the current status of your network,
    identify opportunities for improvement, and provide a strategy




    •      Support your business objectives

    •      Enable effective budgeting and planning

    •      Maximize your investment




FM035/01
IT Project Design & Implementation




  Initial Scope                          Training



  Planning                               Documentation



   Implementation                        Hardware




FM035/01
International Solutions

     Our proven track record in the design, installation and maintenance of international IT platforms makes us the perfect choice for
     businesses embarking on an international presence and for those who already possess one.

                                                 We currently provide support in......

                                   Germany                                                 Poland
                                 Austria                                                       Hong Kong
                           Hungary                                                                  Switzerland

                         Canada                                                                      Spain
                                                                                                     Czech Republic
                         Italy
                                                                                                    Singapore
                           Romania
                                                                                               South Africa
                                 China                                                     Israel
                                    France                                               USA




FM035/01
IT Project Design & Implementation

    Virtualization allows you to run multiple machines on a single physical machine, with each virtual machine sharing the resources
    of that one physical computer across multiple environments. Different virtual machines can run different operating systems and
    multiple applications on the same physical computer.



                                                                            Top five reasons to virtualize



                                                                            •    Make better use of existing resources

                                                                            •    Reduce costs

                                                                            •    Improve business continuity

                                                                            •    Gain operational flexibility

                                                                            •    Improve desktop manageability & security




FM035/01
Structured Cabling Installations


    Replacing multiple traditional cabling systems with structured
    cabling, provides a single, unified infrastructure with the ability to
    carry data in any format.


    With structured cabling, your business can enjoy data, voice and
    multimedia with vital functionality and reliability.


    Managing change, whether relocating one desk, a whole
    department, or restructuring an entire floor, could not be easier.


    A well designed, standards compliant structured cabling system,
    backed by a comprehensive warranty programme can help protect
    your investment and cope with future requirements.


    Excel and Connectix accredited installations, both carrying a 25 year
    warranty,equal sound investment and peace of mind.




FM035/01
Managed Firewall & Security Solutions


    Transferring and sharing valuable and confidential information via a
    network is commonplace.

    Unfortunately, this information can be open to theft or misuse and the
    systems communicating or storing it susceptible to disruption or
    damage.

    Attacks on a network can be planned and specifically targeted, whereas
    others may be opportunistic.

    Ensuring your network is resilient to such attacks is vital not only
    commercially but legislatively.




    How secure is your network?




FM035/01
Remote Access (VPN)


    Many companies have remote facilities and individuals posted
    around the country and indeed the world, all with the need to
    maintain fast, secure and reliable communications wherever their
    location.


    A VPN (virtual private network) is a private network that uses a
    public network (e.g. the Internet) and offers a complete solution for
    companies seeking a cost-effective method of transferring data
    between users in multiple locations




FM035/01
Centralized Antivirus Management
    Having a tightly controlled firewall on the perimeter of a network will prevent incoming malicious connections and is a vital
    component within the security function. However, sophisticated and devious methods, designed to trick users into allowing
    malware (malicious software) onto their computers remain prevalent, making antivirus software at client / server level as
    important as ever.

    Viral attacks can take many forms. As manufacturers of operating systems develop the effectiveness of their security
    patching, creators of malware adopt more inventive methods to infiltrate networks and PCs.



    Virus
                                                                                         Find out if your IP address is blacklisted
    Email Virus
                                                                                             To find out your IP address, visit
    Trojan Horse                                                                                   www.whatismyip.com

    Worm                                                                                   Visit www.mxtoolbox.com and select
                                                                                             ‘Blacklists’. Enter your IP address.
    Spyware




FM035/01
DR Planning and Business Recovery

    With an organization’s data being the lifeblood of the business, an effective and efficient back-up process is crucial to protect
    hard-earned information and critical records.

    Forming a fundamental part of a business continuity or disaster recovery plan, a back-up procedure must ensure that vital
    information is preserved and can be fully restored



    Tape Back-up                                  Online Back-up                                  Disk 2 Disk Back-up

    Still a popular method and can be             An ideal solution for businesses                Providing a higher end solution
    reliable if procedures regarding              with a limited amount of data to                and removing the need for many
    tape storage and security are                 back-up. The transit time via the               administration tasks, such as
    adhered to and processes such as              Internet may make it unsuitable                 performing nightly or even hourly
    restore checks are routinely                  for businesses with larger                      back-ups of critical data.
    conducted.                                    amounts of data. In addition, the               Businesses with more than one
                                                  restore options available are                   site are able to replicate these
                                                  largely limited to file only, as                devices between sites, negating
                                                  opposed to bare metal                           the need to manually remove and
                                                  restore, etc.                                   store data off-site.




FM035/01
Thank you for taking the time to view this presentation.




FM035/01

More Related Content

What's hot

Hitachi data systems agora edition
Hitachi data systems agora editionHitachi data systems agora edition
Hitachi data systems agora edition
Agora Group
 
26 a6 emc europe - arnaud christoffel
26 a6   emc europe - arnaud christoffel26 a6   emc europe - arnaud christoffel
26 a6 emc europe - arnaud christoffel
Scott Adams
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
SimonZXu
 
Challenges faced by small and medium business
Challenges faced by small and medium businessChallenges faced by small and medium business
Challenges faced by small and medium business
Nevales Networks
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeley
Stanford University
 
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
Evy Van Rompay
 
Emc san-overview-presentation
Emc san-overview-presentationEmc san-overview-presentation
Emc san-overview-presentation
jabramo
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
Centuric
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
Gen-i
 
Sbs2008 Networking Guide
Sbs2008 Networking GuideSbs2008 Networking Guide
Sbs2008 Networking Guide
Xpress Computers Ltd.
 
Hosted Contact Centre Security
Hosted Contact Centre SecurityHosted Contact Centre Security
Hosted Contact Centre Security
Contact Centre Management Group
 
Estrategia Information lifecycle Management
Estrategia Information lifecycle ManagementEstrategia Information lifecycle Management
Estrategia Information lifecycle Management
Jaime Contreras
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
Succor Consulting Group, Inc.
 
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010
Agora Group
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
EMC Forum India
 
Tiger brands cisco
Tiger brands  ciscoTiger brands  cisco
Tiger brands cisco
Cisco Case Studies
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storage
Interop
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP

What's hot (18)

Hitachi data systems agora edition
Hitachi data systems agora editionHitachi data systems agora edition
Hitachi data systems agora edition
 
26 a6 emc europe - arnaud christoffel
26 a6   emc europe - arnaud christoffel26 a6   emc europe - arnaud christoffel
26 a6 emc europe - arnaud christoffel
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
Challenges faced by small and medium business
Challenges faced by small and medium businessChallenges faced by small and medium business
Challenges faced by small and medium business
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeley
 
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
 
Emc san-overview-presentation
Emc san-overview-presentationEmc san-overview-presentation
Emc san-overview-presentation
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Sbs2008 Networking Guide
Sbs2008 Networking GuideSbs2008 Networking Guide
Sbs2008 Networking Guide
 
Hosted Contact Centre Security
Hosted Contact Centre SecurityHosted Contact Centre Security
Hosted Contact Centre Security
 
Estrategia Information lifecycle Management
Estrategia Information lifecycle ManagementEstrategia Information lifecycle Management
Estrategia Information lifecycle Management
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Tiger brands cisco
Tiger brands  ciscoTiger brands  cisco
Tiger brands cisco
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storage
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 

Viewers also liked

A Workaholic’S Legacy Ch.3
A Workaholic’S Legacy Ch.3A Workaholic’S Legacy Ch.3
A Workaholic’S Legacy Ch.3
chickenchaps
 
Hrach sun room
Hrach sun roomHrach sun room
Hrach sun room
Blotner Social Media
 
Teaching creative
Teaching creativeTeaching creative
Teaching creativeTim Ryaken
 
人生有夢,築夢踏實
人生有夢,築夢踏實人生有夢,築夢踏實
人生有夢,築夢踏實Tim Ryaken
 
Martina Gemmola, Caravanna
Martina Gemmola, CaravannaMartina Gemmola, Caravanna
Martina Gemmola, Caravanna
Martina Gemmola
 
Alsc Wiki Overview
Alsc Wiki OverviewAlsc Wiki Overview
Alsc Wiki Overview
edu_and20
 
Client Endorsements
Client EndorsementsClient Endorsements
Client Endorsements
samanthahubbard
 
Targets of the story
Targets of the storyTargets of the story
Targets of the story
Elena Olasolo
 
Ross
RossRoss
Copy Of Tong Ket 2007 2008
Copy Of  Tong Ket 2007 2008Copy Of  Tong Ket 2007 2008
Copy Of Tong Ket 2007 2008guest3ffdd3
 
Candidates Endorsements
Candidates EndorsementsCandidates Endorsements
Candidates Endorsements
samanthahubbard
 
5 productos mas de un fututo catalogo web
5 productos mas de un fututo catalogo web5 productos mas de un fututo catalogo web
5 productos mas de un fututo catalogo web
Absalon
 
Attorney Social Marketing
Attorney Social MarketingAttorney Social Marketing
Attorney Social Marketing
Blotner Social Media
 
Dmc builds finehomes2
Dmc builds finehomes2Dmc builds finehomes2
Dmc builds finehomes2
Blotner Social Media
 

Viewers also liked (14)

A Workaholic’S Legacy Ch.3
A Workaholic’S Legacy Ch.3A Workaholic’S Legacy Ch.3
A Workaholic’S Legacy Ch.3
 
Hrach sun room
Hrach sun roomHrach sun room
Hrach sun room
 
Teaching creative
Teaching creativeTeaching creative
Teaching creative
 
人生有夢,築夢踏實
人生有夢,築夢踏實人生有夢,築夢踏實
人生有夢,築夢踏實
 
Martina Gemmola, Caravanna
Martina Gemmola, CaravannaMartina Gemmola, Caravanna
Martina Gemmola, Caravanna
 
Alsc Wiki Overview
Alsc Wiki OverviewAlsc Wiki Overview
Alsc Wiki Overview
 
Client Endorsements
Client EndorsementsClient Endorsements
Client Endorsements
 
Targets of the story
Targets of the storyTargets of the story
Targets of the story
 
Ross
RossRoss
Ross
 
Copy Of Tong Ket 2007 2008
Copy Of  Tong Ket 2007 2008Copy Of  Tong Ket 2007 2008
Copy Of Tong Ket 2007 2008
 
Candidates Endorsements
Candidates EndorsementsCandidates Endorsements
Candidates Endorsements
 
5 productos mas de un fututo catalogo web
5 productos mas de un fututo catalogo web5 productos mas de un fututo catalogo web
5 productos mas de un fututo catalogo web
 
Attorney Social Marketing
Attorney Social MarketingAttorney Social Marketing
Attorney Social Marketing
 
Dmc builds finehomes2
Dmc builds finehomes2Dmc builds finehomes2
Dmc builds finehomes2
 

Similar to Evolve Com Tec Presentation

Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
Jessica Tanner
 
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
Srijan Technologies
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
Apixel IT Support
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2
Neermal Doolub
 
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Teleglobal International Pvt. Ltd.
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
ssuser41d278
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
Vitalie Bucatel
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
Symantec
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
Canon Business CEE
 
Cloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your AssociationCloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your Association
Associations Network
 
VeeamUP
VeeamUPVeeamUP
VeeamUP
S. Hanau
 
What Does a Data Centre Do.docx
What Does a Data Centre Do.docxWhat Does a Data Centre Do.docx
What Does a Data Centre Do.docx
Gary Crilly, RCDD/OSP
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
CaseCentral
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?
InteractiveNEC
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
Canon Business CEE
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
Enda Folan
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Erik Von Schlehenried
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
Embotics Corp.
 

Similar to Evolve Com Tec Presentation (20)

Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
[Srijan Wednesday Webinars] 11 Things You Don't Know About Cloud
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 
L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2L8802_Private_Cloud_Overview_Bro_UK_v2
L8802_Private_Cloud_Overview_Bro_UK_v2
 
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Cloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your AssociationCloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your Association
 
VeeamUP
VeeamUPVeeamUP
VeeamUP
 
What Does a Data Centre Do.docx
What Does a Data Centre Do.docxWhat Does a Data Centre Do.docx
What Does a Data Centre Do.docx
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 

Evolve Com Tec Presentation

  • 1. About US Based in Gloucestershire, we offer a range of IT design, consultancy and support services to small and medium sized businesses throughout the UK and internationally. We recognize that all businesses have different requirements, resources and preferences which is why we build flexibility and understanding into every service. Whether acting as your IT department or supporting existing IT personnel, our friendly, experienced staff will work in harmony with your business and provide the expertise to develop and support one of your biggest assets….. your network. FM035/01
  • 2. Consultancy Growth and change within your business will invariably mean changes to your IT infrastructure. Whether planning changes and upgrades using your own IT personnel or outsourcing, we will work with you to evaluate the current status of your network, identify opportunities for improvement, and provide a strategy • Support your business objectives • Enable effective budgeting and planning • Maximize your investment FM035/01
  • 3. IT Project Design & Implementation Initial Scope Training Planning Documentation Implementation Hardware FM035/01
  • 4. International Solutions Our proven track record in the design, installation and maintenance of international IT platforms makes us the perfect choice for businesses embarking on an international presence and for those who already possess one. We currently provide support in...... Germany Poland Austria Hong Kong Hungary Switzerland Canada Spain Czech Republic Italy Singapore Romania South Africa China Israel France USA FM035/01
  • 5. IT Project Design & Implementation Virtualization allows you to run multiple machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer. Top five reasons to virtualize • Make better use of existing resources • Reduce costs • Improve business continuity • Gain operational flexibility • Improve desktop manageability & security FM035/01
  • 6. Structured Cabling Installations Replacing multiple traditional cabling systems with structured cabling, provides a single, unified infrastructure with the ability to carry data in any format. With structured cabling, your business can enjoy data, voice and multimedia with vital functionality and reliability. Managing change, whether relocating one desk, a whole department, or restructuring an entire floor, could not be easier. A well designed, standards compliant structured cabling system, backed by a comprehensive warranty programme can help protect your investment and cope with future requirements. Excel and Connectix accredited installations, both carrying a 25 year warranty,equal sound investment and peace of mind. FM035/01
  • 7. Managed Firewall & Security Solutions Transferring and sharing valuable and confidential information via a network is commonplace. Unfortunately, this information can be open to theft or misuse and the systems communicating or storing it susceptible to disruption or damage. Attacks on a network can be planned and specifically targeted, whereas others may be opportunistic. Ensuring your network is resilient to such attacks is vital not only commercially but legislatively. How secure is your network? FM035/01
  • 8. Remote Access (VPN) Many companies have remote facilities and individuals posted around the country and indeed the world, all with the need to maintain fast, secure and reliable communications wherever their location. A VPN (virtual private network) is a private network that uses a public network (e.g. the Internet) and offers a complete solution for companies seeking a cost-effective method of transferring data between users in multiple locations FM035/01
  • 9. Centralized Antivirus Management Having a tightly controlled firewall on the perimeter of a network will prevent incoming malicious connections and is a vital component within the security function. However, sophisticated and devious methods, designed to trick users into allowing malware (malicious software) onto their computers remain prevalent, making antivirus software at client / server level as important as ever. Viral attacks can take many forms. As manufacturers of operating systems develop the effectiveness of their security patching, creators of malware adopt more inventive methods to infiltrate networks and PCs. Virus Find out if your IP address is blacklisted Email Virus To find out your IP address, visit Trojan Horse www.whatismyip.com Worm Visit www.mxtoolbox.com and select ‘Blacklists’. Enter your IP address. Spyware FM035/01
  • 10. DR Planning and Business Recovery With an organization’s data being the lifeblood of the business, an effective and efficient back-up process is crucial to protect hard-earned information and critical records. Forming a fundamental part of a business continuity or disaster recovery plan, a back-up procedure must ensure that vital information is preserved and can be fully restored Tape Back-up Online Back-up Disk 2 Disk Back-up Still a popular method and can be An ideal solution for businesses Providing a higher end solution reliable if procedures regarding with a limited amount of data to and removing the need for many tape storage and security are back-up. The transit time via the administration tasks, such as adhered to and processes such as Internet may make it unsuitable performing nightly or even hourly restore checks are routinely for businesses with larger back-ups of critical data. conducted. amounts of data. In addition, the Businesses with more than one restore options available are site are able to replicate these largely limited to file only, as devices between sites, negating opposed to bare metal the need to manually remove and restore, etc. store data off-site. FM035/01
  • 11. Thank you for taking the time to view this presentation. FM035/01