Asset Management
Establishing and maintaining an accurate, comprehensive and
complete hardware asset registry forms the basis of business
technology management and serves as the enabler for
infrastructure, security and service-delivery management. |
Licensing Compliance
Getting the most value from your software investment requires more
than simply purchasing the right number of licenses and requires a
deep understanding of different licensing models, upgrade and
downgrade rights, as well as software assurance to ensure that one
always has access to the latest versions, patches and updates. |
User Lifecycle Management
The importance of managing the full user lifecycle from employment
to termination, as well as movements within various teams and
departments is critical to ensuring that all users always have the
appropriate access and authorisation to perform their specific
roles and responsibilities. |
Datacentre Management
With considerations ranging from physical access and video
surveillance to fire suppression, air quality and clean power
provisioning, we manage your datacentre environment to ensure that
your mission-critical servers and networking systems operate under
optimal conditions. |
Server Management
Stable, efficient, hardened and fault-tolerant systems are
achieved by implementing business-aligned policies and best
practice methodologies, all enforced and monitored by our
automated real-time technical controls, across your entire server
infrastructure, from stand-alone servers to high-density blade
environments. |
Network Management
Network traffic is the life-blood of any information technology
infrastructure and needs to be carefully managed and monitored to
ensure that it flows freely without bottlenecks or interruption,
but also needs to have the required control over the network to
ensure that the confidentiality and integrity of the information
being transmitted is protected and that only authorised devices
have access to the network. |
Endpoint Management
Desktops and laptops need to be carefully selected and managed to
ensure that they are in line with company policy and the standard
operating environment and that the appropriate equipment is used
by appropriate user groups, depending on the classification of
information to be processed, and that appropriate safeguards are
in place to protect such data. |
Mobile Device Management
Mobile devices bring new opportunities and risks to your company's
infrastructure and need to be leverged in a way that enables and
protects your organisation without jeopardising the privacy of the
individual. By implementing a container-based approach, one can
separate business data from personal data, allowing your
organisation's policies to be enforced on the business data,
thereby enabling features such as password complexity, two-factor
authentication, data encryption and remote wipe. |
Monitoring & Alerting
With systems and devices generating thousands of log events per
month and with the volume of performance metric data available, a
centralised and intelligent monitoring and event logging solution
is the only way to achieve system-wide operational visibility and
serves as the pulse of your organisation's information technology
infrastructure. The ability to search and correlate monitoring
data not only provides previously unattainable operational
insight, but also drastically reduces the time required to isolate
anomalies and provides a critical audit trail for assurance
purposes. |
Capacity Management
By evaluating the steady stream of monitoring data received, we
can determine which systems are reaching either their storage or
processing capacity and pro-actively replace or upgrade them
before it becomes a problem, ultimately reducing unforeseen
downtime. |
Performance Management
By monitoring key performance metrics such as cpu and memory usage
across all mission-critical systems, as well as network
utilisation data such as packets per second and throughput per
second, we are able to confirm and ensure that systems are
performing within their designed operating parameters and are able
to pro-actively investigate any anomalies, whilst correlating data
with our monitoring and event logging systems, to determine the
root cause of the problem. |
Patch Management
Whether systems need to be updated to fix bugs or vulnerabilites,
or whether performance or stability enhanchements are distributed,
we provide a centralised platform that notifies us of available
patches, to assess which systems are eligible or require updating
and the ability to test, authorise and automate the rollout of
such patches. |
Business Continuity Planning
Every aspect of an organisation's people, processes and technology
needs to be assessed to establish a level of tolerance or
acceptable risk in the event of failure or disaster and needs to
be aligned with the organisation's risk management program to
reflect the overall risk posture. BCP is a strategic,
policy-driven approach that results in the documentation of the
Disaster Recovery Plan. |
Disaster Recovery
When disaster does strike, a well-documented and thought-through
plan will help reduce the technology risk to an acceptable level,
which would have been discussed and formally approved by
management as part of their Business Continuity Planning
excercise. The Disaster Recovery Plan makes provisions for
Restore-time objectives, Restore-point objectives, as well as for
alternative sites, depending on the scope and impact of the
disaster. |