Profile
 In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more
dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and
misuse. There are many software and hardware available in the market to protect our computers and its data but very
often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,
Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to
Data Pilferage and Abuse.
 Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it
investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my
Phd. in Information security. And having worked for close to two decade in various large establishments I have gained a
fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises
be it Small Medium or Large.
 Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solution an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
 Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market
research team who are in the process of continuously scanning the market and keeping us updated in the latest
technologies available and also newer challenges our clients come up with. We share these developments with our
clients by way of periodical news letter by e-mail.
 We have to our credit a very small client base both in India and overseas who are extremely appreciative to our
perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in
reassuring ourselves that this is what a client in need of.
 Above all as a policy we share our knowledge with the younger generation by giving them training programmes at
the college levels so that they become better IT Professional having a holistic approach.
IT Consultancy Services




        IT Managed Services               Mailing Solutions
        Data Management                   Internet Bandwidth Solutions
        Network Design                    IT Inventory Management
        Data Center Design                Application Support
        Firewall (Hardware/Software)      IT Outsource
        ASC (Annual Service Contract)     IT Road Map
        Help Desk and Ticketing Systems
Information Security                               IT Policies




  Defining Information Security Strategies           Group Policies
  Securing Servers and Clients Data from             Removable Drive Policies
  Internal & External Threat                         Network Policies
  Conducting PEN Test. (Penetration Test)            Do’s & Don’ts for IT Users
  IT Assessment & Audits                             BYOD (Bring Your Own Device) concept
  Application Audit for Security Vulnerabilities     Defining BYOD Security Policies and Best
  IT Security Awareness Programs and Training        Practices
  Security guidelines                                Patch management
  Network Audit                                      Application Usage Definitions
  Implementation of Firewall & UTM                   Data Security Policies
  AV / IPS / IDS / DLP / DR / BCP / RSA              Backup & Restoration Policies
  Data Encryption                                    Vendor SLA’s & NDA’s
  Rights Management Services                         Data Centre Policies
                                                     Mailing Policies
ERP                        Business Promotions




 Finance/Accounting          Internet Marketing
 Human Resources             Tele Marketing Strategies & Applications
 Manufacturing               SEO (Search Engine Optimization)
 Supply Chain Management     Bulk Mailing & SMS
 Project Management          Social Networking Site links
 Customer Relationship       Event Management
 Management                  Web Design & hosting
                             Mobility Applications
                             Present Marketing Strategies
                             Printing & Publishing
                             Presentations
Mailing Solutions




       Open Source or Paid Mailing     Spam, Virus, Malware Control
       Solutions                       Mail Server Redundancy
       Mailing Policies                Incorporation of multiple domains
       Cloud Based Mailing Solutions   Log Tracking
       Security Policies               Mail Encryptions
       Archive & Restore plan
       Security Certification
Video & Audio                               Data Center
 Conferencing                                Solutions




Video/Audio Conferencing                Requirements for modern data centers
Desktop Conferencing                    Design considerations
Chat                                    Fire protection
Audio Conferencing with multi channel   Environmental control
Bandwidth Sizing                        Site Selections
On demand Video/Audio Conferencing      Security
VOIP Solutions                          Power and cooling analysis
                                        Green datacenters
Network                           Virtualization




 Network Designing
                                    Server virtualization (Vmware,
 Structure Cabling Design
                                    Citrix, Hyper-V)
 Wireless Network Design
                                    VDI (Virtual Desktop Interface)
 Design & Implementation of
                                    Storage
 VLAN (Virtual LAN)
                                    Failover
 Switches & Routers
                                    Network
 Documentation
                                    Snapshotting
 Cable Testing & Certifications
 Vendor Co ordination
 for Implementation
 OFC
 Network Audits
Internet Services                  Cloud Computing




  RF Links                           Applications
  Leased Line                        Platforms
  MPLS , RF, and Leased Lines        Communications
  Bandwidth Sizing                   Content
  Performance analysis               Servers
  Best Practices and Guidelines      Finance
  NOC (Network Operating Center)     Database
  Coordination's
Sales                  Services




  Servers                 Servers
  Desktops                Desktops
  Laptops                 Laptops
  Network Components      Storage
  Storage                 Printers
  Printers                UPS
  Biometric Machines
  Printer Cartridges
  UPS
CSR Initiative

                 E-waste Collection Program for
                           supporting
                         Senior Citizens




                           In partner with




                         Dignity Foundation
Articles – Head Consultant
Articles – Head Consultant
Clients




Partners
Thank you




IT Outsourcing
      @
 www.hkit.in

IT consultancy presentation

  • 2.
    Profile In thisrapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and misuse. There are many software and hardware available in the market to protect our computers and its data but very often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software, Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to Data Pilferage and Abuse. Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my Phd. in Information security. And having worked for close to two decade in various large establishments I have gained a fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises be it Small Medium or Large. Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this umbrella called HK IT Solution an end to end IT Solution company providing that cutting edge advantage to our clients in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their application and budget. Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market research team who are in the process of continuously scanning the market and keeping us updated in the latest technologies available and also newer challenges our clients come up with. We share these developments with our clients by way of periodical news letter by e-mail. We have to our credit a very small client base both in India and overseas who are extremely appreciative to our perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in reassuring ourselves that this is what a client in need of. Above all as a policy we share our knowledge with the younger generation by giving them training programmes at the college levels so that they become better IT Professional having a holistic approach.
  • 4.
    IT Consultancy Services IT Managed Services Mailing Solutions Data Management Internet Bandwidth Solutions Network Design IT Inventory Management Data Center Design Application Support Firewall (Hardware/Software) IT Outsource ASC (Annual Service Contract) IT Road Map Help Desk and Ticketing Systems
  • 5.
    Information Security IT Policies Defining Information Security Strategies Group Policies Securing Servers and Clients Data from Removable Drive Policies Internal & External Threat Network Policies Conducting PEN Test. (Penetration Test) Do’s & Don’ts for IT Users IT Assessment & Audits BYOD (Bring Your Own Device) concept Application Audit for Security Vulnerabilities Defining BYOD Security Policies and Best IT Security Awareness Programs and Training Practices Security guidelines Patch management Network Audit Application Usage Definitions Implementation of Firewall & UTM Data Security Policies AV / IPS / IDS / DLP / DR / BCP / RSA Backup & Restoration Policies Data Encryption Vendor SLA’s & NDA’s Rights Management Services Data Centre Policies Mailing Policies
  • 6.
    ERP Business Promotions Finance/Accounting Internet Marketing Human Resources Tele Marketing Strategies & Applications Manufacturing SEO (Search Engine Optimization) Supply Chain Management Bulk Mailing & SMS Project Management Social Networking Site links Customer Relationship Event Management Management Web Design & hosting Mobility Applications Present Marketing Strategies Printing & Publishing Presentations
  • 7.
    Mailing Solutions Open Source or Paid Mailing Spam, Virus, Malware Control Solutions Mail Server Redundancy Mailing Policies Incorporation of multiple domains Cloud Based Mailing Solutions Log Tracking Security Policies Mail Encryptions Archive & Restore plan Security Certification
  • 8.
    Video & Audio Data Center Conferencing Solutions Video/Audio Conferencing Requirements for modern data centers Desktop Conferencing Design considerations Chat Fire protection Audio Conferencing with multi channel Environmental control Bandwidth Sizing Site Selections On demand Video/Audio Conferencing Security VOIP Solutions Power and cooling analysis Green datacenters
  • 9.
    Network Virtualization Network Designing Server virtualization (Vmware, Structure Cabling Design Citrix, Hyper-V) Wireless Network Design VDI (Virtual Desktop Interface) Design & Implementation of Storage VLAN (Virtual LAN) Failover Switches & Routers Network Documentation Snapshotting Cable Testing & Certifications Vendor Co ordination for Implementation OFC Network Audits
  • 10.
    Internet Services Cloud Computing RF Links Applications Leased Line Platforms MPLS , RF, and Leased Lines Communications Bandwidth Sizing Content Performance analysis Servers Best Practices and Guidelines Finance NOC (Network Operating Center) Database Coordination's
  • 11.
    Sales Services Servers Servers Desktops Desktops Laptops Laptops Network Components Storage Storage Printers Printers UPS Biometric Machines Printer Cartridges UPS
  • 13.
    CSR Initiative E-waste Collection Program for supporting Senior Citizens In partner with Dignity Foundation
  • 14.
  • 15.
  • 16.
  • 17.