Services

Data Governance

__

  • Dark Data Assessment: assessment of file sharing, provides the client with complete visibility of the quantity, distribution, type, length of the files, as well as of the frequency and type of user access to the same, at different levels of detail.
  • GDPR compliance: status analysis and definition of adjustment paths.

Data Loss Prevention​

__

  • Sensitive Data Risk Assessment: assessment of corporate file sharing, provides the customer with full visibility of the quantity, distribution, type, length of file, as well as the frequency and type of user access to the same, at different levels of detail.
  • Design, implementation and management of Data Loss Prevention solutions.

Email Solutions & Migrations

__

  • Design, implementation and management of Microsoft Exchange and Exchange Online mail solutions (on-premises e/o O365 hybrid-cloud/full-cloud).
  • Update on-premises Microsoft Exchange e-mail systems.
  • Migration routing, accounts and data between different Exchange Organization and/or O365 (hybrid-cloud/full-cloud).
  • Migration services and e-mail data from Domino/Google Mail to Exchange. (on-premises e/o O365).
  • Design, implementation and management of Email Security solutions (AntiVirus and AntiSpam), in Cloud and on-premises.

Core Infrastructure Services

__

  • Design, implementation and management of Microsoft Active Directory Directory Services infrastructures (multi-site, multi-country, multi-domain).
  • Active Directory Directory Services Upgrade.
  • Active Directory Directory Services Health Check Analysis and Optimization (inactive account elimination, OU reorganization, GPO analysis and standardization, …).
  • Inter-Forest Active Directory Migrations (Users, Computers, Resources).
  • Directory Services Synchronization tra diversi Directory Service (Active Directory, Domino Directory, Office 365).
  • Active Directory Auditing and Alerting. (tracking and roll-back changes to GPO, AD permissions, membership of administrative groups, …).

ICT Assessment & GAP Analysis

__

  • Analysis of the technological environment (network, hardware, storage, software, change procedures and ordinary management) and identification of Safety or Process Gap.
  • Risk Security Assessment based on the ITIL standard

Access Monitoring and Auditing

__

  • File Sharing Access Auditing and Alerting.
  • Exchange Mailbox Access Auditing and Alerting.
  • SharePoint Access Auditing and Alerting.
  • VMWare Auditing and Alerting.
  • SQL Server Auditing and Alerting.

Data Protection

__

  • Design, implementation and management of Backup and Restore solutions (Datacenter, Server, Client).
  • Design, implementation and management of Disaster Recovery solutions and procedures.

Learning and Certification​

__

  • Provision of customized training courses on all technologies and products in the sphere of the solutions and services provided.
  • We are a Pearson VUE Authorized Test Centre.

Cloud Solutions Readiness Check & Enablement​

__

  • O365 Health check for verification of email migration requirements.
  • Azure Health check for calculation and analysis of performance and cost projection.
  • Server and services migration on Azure datacenters.

Network, Server and Endpoint Security

__

  • Design, implementation and management of Anti-Malware solutions (server & endpoint).
  • Design, implementation and management of Web Protection solutions.
  • Data Encryption.
  • SIEM design, implementation and management.
  • Design, implementation and management of Advanced Persistent Threat Protection solutions.
  • Design, implementation and management of Software Update solutions (OS, applications, …).
  • Vulnerability assessment and Penetration testing.

Unstructured Data Archiving

__

  • Archiving Exchange email systems.
  • Archiving Domino email systems.
  • File Sharing Archiving (Windows, NetApp, Celerra, …).
  • SharePoint Portal Archiving.
  • Design, implementation and management of Veritas Enterprise Vault solutions.
  • Email Archiving data migration between competing storage solutions (EV, O365, SourceOne, …).

Forensics & eDiscovery​

__

  • Analysis and data recovery on damaged drives.
  • Crystallization of disks.
  • Design, implementation, management and training of users of eDiscovery solutions conforming to the EDRM model, to accelerate the processes of studies and legal offices regarding collection, research, analysis, editing and production of relevant survey documents.

Tele / Video Conferencing

__

  • Design, implementation, management of Carrier Class telephony systems.
  • Replacement of traditional speech systems (Enterprise Class).
  • Integrated communication solutions for instant messaging, audio and video conferencing.