INFRASTRUCTURE  MANAGEMENT
Network Management Routers, Switches, VoIP devices, Network Links Security Management Firewalls, Intrusion Protection Systems, VPNs, PKI, AAA Tools Data Center Management Servers, Databases, Middle Tier Apps, Messaging, Storage Systems Desktop Management Desktops, Laptops, File & Print Servers Process consulting, Audits & Reviews Availability management Asset management, Patch management Problem, change & Configuration management Pro-active monitoring & Incident management Implementation/Migration support ITIL compliant processes,  SLA driven engagements
Monitoring & Management Services
Facility Management Services
Understand Requirement Infrastructure study Business dependency Scope of work Assess Design Plan & Implement Performance Eng. Capacity Plng DR/BCP Data centre Networks Consulting Services ITIL Migration Audits Security Storage High Level design Detailed Technical  design Risk assessment Risk mitigation plan Project management Pilot testing Acceptance Implementation Infrastructure Processes
Maintain an Up-to-Date Network Diagram Maintain Switch and WAN Device Configuration and Backup Fix Problems Reported on Time  Provide Support with regards to WAN and Switch Management Port Configuration Policy Configuration on devices like Access Lists, VLANs etc. IOS / OS Upgrades and Fixes Routing configurations (Static and Dynamic Routing) QOS and Bandwidth/ Performance Optimization Design, Re-architecture and Recommendations
Operating System supported :  Windows / Linux / Solaris / HP-UX / AIX User management Patch management  Disk space management Log management Backup management Scheduled job management Performance management Problem and change management *
Database Management (MS SQL/  Oracle) User management Database server installation Log management Space management Object management DB privilege management Backup and recovery management Replication management Scheduled task management Patch management Performance management Automation and procedure optimization Mail Management (MS Exchange/ Lotus Notes)  Server configuration Space management Exchange queue management Junk e-mail filtering Anti-SPAM Management Proactive Monitoring  User Management Mailbox and Address book Management SMTP/ Delivery Log checks Message Queue Management Server installation Backup management Process management (Stop/ Start Services) Performance management
Firewall configuration management Conduit/ACL Firewall interfaces NAT / DMZ Failover Site-to-site IPSec VPN tunnels Roaming VPN clients Security policies IOS upgrade Configuration backups IDS configuration management Latest signature updates Filters Enable port mirroring and configure IDS for traffic capture  Log management Performance management Problem and Change management
Application Management  Directory Server installation and configuration Domain controller installation and configuration Internet Proxy Server installation and configuration Security Server installation and configuration Weblogic Server installation and configuration Web Server installation and configuration Log management Backup management Scheduled task management Problem and Change management
New Installation Manage storage environment Backup Monitor storage environment Capacity planning Storage evaluation
Configuration of desktops / laptops. Troubleshooting desktop – OS and applications. Coordinate with vendors to resolve hardware replacements. Antivirus management (Client Side) Support for installs, moves, adds and changes.
Set up Citrix Client WinFrame and MetaFrame administration Configure Policies for Servers, Users, and Groups Configure and Manage Web Interfaces Publish, Manage and Remove Applications
Study of existing  IT Architecture (Systems, Network and Application) and their Relationships Project and Change management process Data center procedures Backup, Archival and recovery process Location / operation of the primary and secondary data centers Identify the Threats and Impact to each of the IT Applications / Devices Conduct Comprehensive Vulnerability Assessment Key Deliverables  RTO/ RPO and BOM finalization based on Cost of Implementation and ROI Disaster Recovery Architecture including Technical architecture of the DR site Design Recommendations on Current Architecture Different Options for Recovery/Replication to the DR site. Activities/Tasks and Approximate Time Required to Recover the Systems in case of Disaster. Implementation Plan, with Timelines and Milestones.
 
PHASE I  : E-Ticketing Only
 
 
 
 
Compliment existing team with resources (offshore/on-site) Extended shift coverage Consulting engagements Audits Device monitoring & management Start only with network/systems monitoring Scale up to management gradually Dedicated support team (fully outsourced) Dedicated resources available on-site Remote support for 24x7 skills Combination of on-site/off-site to provide cost effective services Dedicated customer port Separate operations center for a requirement (offshore) Pilot and Phased Approach Manage the defined pilot infrastructure Stabilize and replicate across the entire infrastructure
Transition Management
Pro-active Performance Monitoring, Threshold Alerts, Dashboard Reporting Incident Management, Service Desk for escalations, knowledge repository  Problem mgt, Change mgt, Capacity mgt, Performance mgt Onsite & Offshore combination ITIL best practices  Risk mitigated transition  Seamless integration  of client processes Ongoing Risk Management Level 2 & 3 Support Level 1 Support Onsite  Co-ordination Scoping, Knowledge Acquisition,  Project Co-ordination, On-Site Support Remote Monitoring
Thank you.

Remote Infrastructure Management

  • 1.
  • 2.
    Network Management Routers,Switches, VoIP devices, Network Links Security Management Firewalls, Intrusion Protection Systems, VPNs, PKI, AAA Tools Data Center Management Servers, Databases, Middle Tier Apps, Messaging, Storage Systems Desktop Management Desktops, Laptops, File & Print Servers Process consulting, Audits & Reviews Availability management Asset management, Patch management Problem, change & Configuration management Pro-active monitoring & Incident management Implementation/Migration support ITIL compliant processes, SLA driven engagements
  • 3.
  • 4.
  • 5.
    Understand Requirement Infrastructurestudy Business dependency Scope of work Assess Design Plan & Implement Performance Eng. Capacity Plng DR/BCP Data centre Networks Consulting Services ITIL Migration Audits Security Storage High Level design Detailed Technical design Risk assessment Risk mitigation plan Project management Pilot testing Acceptance Implementation Infrastructure Processes
  • 6.
    Maintain an Up-to-DateNetwork Diagram Maintain Switch and WAN Device Configuration and Backup Fix Problems Reported on Time Provide Support with regards to WAN and Switch Management Port Configuration Policy Configuration on devices like Access Lists, VLANs etc. IOS / OS Upgrades and Fixes Routing configurations (Static and Dynamic Routing) QOS and Bandwidth/ Performance Optimization Design, Re-architecture and Recommendations
  • 7.
    Operating System supported: Windows / Linux / Solaris / HP-UX / AIX User management Patch management Disk space management Log management Backup management Scheduled job management Performance management Problem and change management *
  • 8.
    Database Management (MSSQL/ Oracle) User management Database server installation Log management Space management Object management DB privilege management Backup and recovery management Replication management Scheduled task management Patch management Performance management Automation and procedure optimization Mail Management (MS Exchange/ Lotus Notes) Server configuration Space management Exchange queue management Junk e-mail filtering Anti-SPAM Management Proactive Monitoring User Management Mailbox and Address book Management SMTP/ Delivery Log checks Message Queue Management Server installation Backup management Process management (Stop/ Start Services) Performance management
  • 9.
    Firewall configuration managementConduit/ACL Firewall interfaces NAT / DMZ Failover Site-to-site IPSec VPN tunnels Roaming VPN clients Security policies IOS upgrade Configuration backups IDS configuration management Latest signature updates Filters Enable port mirroring and configure IDS for traffic capture Log management Performance management Problem and Change management
  • 10.
    Application Management Directory Server installation and configuration Domain controller installation and configuration Internet Proxy Server installation and configuration Security Server installation and configuration Weblogic Server installation and configuration Web Server installation and configuration Log management Backup management Scheduled task management Problem and Change management
  • 11.
    New Installation Managestorage environment Backup Monitor storage environment Capacity planning Storage evaluation
  • 12.
    Configuration of desktops/ laptops. Troubleshooting desktop – OS and applications. Coordinate with vendors to resolve hardware replacements. Antivirus management (Client Side) Support for installs, moves, adds and changes.
  • 13.
    Set up CitrixClient WinFrame and MetaFrame administration Configure Policies for Servers, Users, and Groups Configure and Manage Web Interfaces Publish, Manage and Remove Applications
  • 14.
    Study of existing IT Architecture (Systems, Network and Application) and their Relationships Project and Change management process Data center procedures Backup, Archival and recovery process Location / operation of the primary and secondary data centers Identify the Threats and Impact to each of the IT Applications / Devices Conduct Comprehensive Vulnerability Assessment Key Deliverables RTO/ RPO and BOM finalization based on Cost of Implementation and ROI Disaster Recovery Architecture including Technical architecture of the DR site Design Recommendations on Current Architecture Different Options for Recovery/Replication to the DR site. Activities/Tasks and Approximate Time Required to Recover the Systems in case of Disaster. Implementation Plan, with Timelines and Milestones.
  • 15.
  • 16.
    PHASE I : E-Ticketing Only
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
    Compliment existing teamwith resources (offshore/on-site) Extended shift coverage Consulting engagements Audits Device monitoring & management Start only with network/systems monitoring Scale up to management gradually Dedicated support team (fully outsourced) Dedicated resources available on-site Remote support for 24x7 skills Combination of on-site/off-site to provide cost effective services Dedicated customer port Separate operations center for a requirement (offshore) Pilot and Phased Approach Manage the defined pilot infrastructure Stabilize and replicate across the entire infrastructure
  • 22.
  • 23.
    Pro-active Performance Monitoring,Threshold Alerts, Dashboard Reporting Incident Management, Service Desk for escalations, knowledge repository Problem mgt, Change mgt, Capacity mgt, Performance mgt Onsite & Offshore combination ITIL best practices Risk mitigated transition Seamless integration of client processes Ongoing Risk Management Level 2 & 3 Support Level 1 Support Onsite Co-ordination Scoping, Knowledge Acquisition, Project Co-ordination, On-Site Support Remote Monitoring
  • 24.