VMWare Server Virtualisation

Growing demand for resources? Insufficient hosting for physical servers? Hardware reaching the end of its maximum lifespan? Looking to consolidate the applications used in fewer physical servers? Looking for more flexibility, but smaller operational costs?

vSphere Essential Plus Kit – Virtualisation Bundle

  • Encompasses a range of preconfigured modular solutions, scalable and validated from a technical point of view.
  • Enables migration of servers in production from physical to virtual state, with no interruption of activity.
  • Cluster architecture, with all the hardware resources of the physical servers presented in a shared portfolio.
  • Easy to use management interface. Improves operational flexibility.
  • Ensures maximum use of the available resources. The management module consolidates up to 3 physical servers into one entity.
  • Reduces operational and maintenance costs, and energy consumption.
  • Compatible with most hardware and storage manufacturers and with most operating systems (Windows, Linux, Unix). Optimal integration with all types of mail, file sharing, active directory, document management services. No risks at implementation.

Architecture

arhitectura1arhitectura2

Integration

  • Uses standard protocols to communicate with servers and with network equipment.
  • Implies a “Layer 2” virtual network area that integrates with all network equipment manufacturers, with no differences in communication compared to a physical server.

Recommendation for:

  •  SMB business segments that need to increase resources or replace pieces of hardware.

Portfolio Categories:

Infrastructure Solutions 


VMware Client Virtualisation
Are you looking for flexibility and easier management of hardware resources? Are you looking for stricter control of the software used and licenses? Are you looking for centralised, safe storage of data, in a shared location, on a server with easy back-up that prevents loss of information or documents?

VDI – Scalable Virtualisation Solution

  • Separates users’ working environments (Windows operating systems/Applications/Data) from the physical environments, by running the desktop units as virtual machines on the servers in the datacenter
  • Enables IT managers to manage all desktops in the organisation centrally, significantly reducing the management efforts. Creates a flexible, comfortable working environment.
  • Prevents information leaks and strengthens information security.
  • Reduces energy consumption.
  • Extremely scalable and customizable solution. Sizing is done based on the specifics of the business, the number of users, and the information capacity that each user needs (enables for memory extension, processing power extension, working posts extension).
  • Adaptable for business and industrial production environments, with no restrictions.

Architecture

arhitectura3

Integration

  • Preliminary requirements:
    Can be integrated with traditional working environments. Does not require additional configurations.

Solution recommended for:

  • Government agencies.
  • Financial institutions.
  • Office areas.
  • Companies that work intensively with a small number of applications.
  • Call centres.
  • Education institutions.
  • Factories, industrial production environments.

 

Portfolio Categories:

Infrastructure Solutions 


Fortinet Network Security

Do you store important information in digital form? Do you need real-time scanning of messages and attachments received via email? Do you wish to secure your access channels from outside the organisation and the networks spread geographically from one single management console?

FortiGate – The Complete Firewall Solution

  • Ensures protection in all areas without impacting on the performance of critical applications or the reliability of the network.
  • Security solution with multiple features, flexible for all business segments.
  • Scalable with the diversity of the system: server mail; application servers; database servers; web portals.
  • Allows for secure VPN communication between geographically spread headquarters.
  • FortiGuard® services provide continuous, automatic updating of antivirus/antimalware, IPS, web filtering and antispam features, and protect applications from the new types of attacks.
  • FortiGate® equipment filters all data traffic at protocol and application level.
  • No special requirements at installation. Intuitive graphic configuration interfaces. Reduced time and effort with installing the equipment in remote locations
  • Simplified licensing per device, not per user. Easy and cheap to manage.

Architecture

secur-retea

Integration

  • With no major impact on the IT topology existing in the organisation

Portfolio Categories:

Security Solutions 


Fortinet Email Security
Too much spam? Do you receive a significant amount of unsollicited email? Are recipients receiving email with delays? Is the email server frequently blocked on spam lists? Do you experience difficulties with employees’ activity and with the operation of the mail server?

FortiMail – The Antispam, Antivirus, Antimalware Solution

  • Adaptable for all business segments, from small to enterprise.
  • Quick installation and configuration (appliance solution). No special requirements for network installation.
  • Flexible operation with intuitive web-based interface, accessible from mobile devices.
  • Enterprise antispam and antivirus features.
  • Efficient storage system on RAID technology.
  • Automatic updates of antivirus signatures and of the detection engine, for non stop protection against spam, viruses, worms and trojans.
  • Email agent (MTA). Support for most email clients via traditional protocols.
  • Extended set of reporting tools.
  • Backup support for remote storage of archived emails and optimal long-term operation. Enables migration of messages of certain age on external, cheaper storage devices.

Architecture

arhitectura8

Integration

Network, in 3 possible ways:

  • Email server (manages the entire email flow of the company)
  • Gateway (receives email, then forwards it to the server)
  • Transparent (implemented in front of an existing email server, only scans the traffic with no redirecting).

With other solutions:

  • With Active Directory solutions for users and groups of users
  • With VMware virtualisation solutions for virtual FortiMail appliances.
  • With equipment of the FortiGate or FortiGuard family to offer a multi-layer antivirus, antispam solution for enterprises with several FortiMail devices in place.
  • With mail clients from mobile devices, for cases where mobility is a fundamental requirement.

 

Portfolio Categories:

Security Solutions 


ObserveIT Security

Do you look to achieve more independence from your suppliers? Do you wish to ensure security of the organisation in full confidentiality, identification of human error and of users that can pose the greatest risks?

ObserveIT – User Monitoring Solution

  • Monitors suppliers remotely, checks completion of their obligations and establishes their risk level.
  • Monitors, records and audits user actions. Generates a prioritised list of users that pose the highest risk to the organisation. Enables keyword searching through records.
  • Enables instant access to video records and real-time viewing of activity flows.
  • Real-time signalling of negative action and human error. Customized warnings integrated with the SIEM/NMS systems. Identifies the reason why the error occurred and collects irrefutable evidence.
  • Checks conformity for PCI, HIPAA, SOX and ISO 270001.
  • Native support for multi-tenant use with information sharing within a safe environment.
  • Simplified infrastructure, one console. Consolidates data from multiple monitoring systems.
  • Highly scalable. Enables the same features according to the licensing.
  • Low overall ownership cost, professional implementation services.

Architecture

arhitectura7

  • Multi-level enterprise solution with secure multi-organisation access.
  • Implementation relying on agents that can be installed on various platforms.
  • Runs on Windows and Linux, local or remote sessions – Vmware, ICA, SSH, Telnet, VNC RDP
  • Records and plays any Windows and Unix session, including mouse movements, interaction with graphic interfaces, text entries and command line

 

Portfolio Categories:

Security Solutions 


CA Technologies Infrastructure Monitoring
Size your IT infrastructure correctly and increase performance. Automate the monitoring, analysis and diagnosis process for traffic that impacts on applications. Optimise time and resources assigned for management.

Integrated Solution

  • Based on the reliable, robust, highly scalable CA Technologies products.
  • Automatically monitors and shapes the infrastructure following a predictive performance assessment that enables continuous, correct adaptation to internal changes.
  • Proactively identifies degradations, infrastructure flaws and possible SLA violations. Issues predictive warnings to the targeted persons, thus substantially lowering non-operational time and average intervention time. Performs root cause analysis. Allows for management of warnings.
  • Consolidates the aspects of the IT infrastructure in one central console. Integrates data delivered by multiple monitoring systems. Enables quick, easy access to data.
  • Homogenises management procedures for hybrid media (physical, virtual, public or private cloud).
  • Supplies native support for multi-tenant use with information sharing within a safe environment.
  • Has a low overall ownership cost.

Architecture

  • Multi-level enterprise solution with secure multi-organisation access.
  • Scalable for medium-size and large infrastructures. Enables the same features acording to the bundles licensed.
  • Is built on CA Unified Infrastructure Management (CA UIM), CA Spectrum and CA Network Flow Analysis (CA NFA) products. The components can be implemented individually, as needed.

Portfolio Categories:

Management and Monitoring Solutions 


CA Technologies Application Performance Management

Assess the real level of the services offered and the impact of incidents on the users’ experience. Formulate response actions based on an impartial view on IT and business requirements. Optimise applications and the support infrastructure to support ensuring SLAs.

CA Application Performance Management

  • Can monitor Java and .Net applications up to code level, to detect changes and sources of performance issues.
  • Measures response time between the components involved in the architecture of an application.
  • Quick response to incidents that impact the performance of applications. Sorts the events, identifies the sources of problems and analyses their main causes; measures the impact and priority of performance incidents. Formulates proactive action to ensure a quality experience for the end user.
  • Correlates information on transactions to the support infrastructure and sorts the applications by infrastructure.
  • Enables testing, reporting and accurate warning on the performance of web-based applications.
  • Supplies real-time information on the services provided and the SLA

Architecture

The solution includes several functional components that comply with the requirements of enterprise applications. The most frequently used components are:

  • Fig.1: Introscope; architecture for a minima CA APM configuration.
  • Fig.2: display elements on the CA APM console.

arhitectura13arhitectura14

Integration

CA APM is compatible with all key technologies and platforms:

  • Oracle, Sun One, Tomcat, Oracle Weblogic Server, Oracle WebLogic Portal, IBM Websphere Application Server, IBM WebSphere Portal, IBM WebSphere Application Server for Distributed Environments, IBM WebSphere MQ Connectors & Messaging System, SAP NetWeaver, BEA Weblogic server, IBM CICS Transaction Gateway, Microsoft SharePoint Portal.

 

Portfolio Categories:

Management and Monitoring Solutions 


SolarWinds Log & Event Management
Monitor operating systems, identify unauthorised intrusions, and reduce troubleshooting time with a solution recognised internationally for its easy implementation, complex gathering abilities and quick accessing of information on security incidents.

SolarWinds Log & Event Manager

  • Robust solution, compliant to international standards.
  • Enables centralised collection and management of security information from multiple sources in the organisation.
  • Monitors and issues warnings for any suspicious or malintended activity on a registry, folder or file.
  • Enables quick, automatic action against threat through the Powerful Active Response technology.
  • Prevents data loss and leaks of information through USB devices.
  • Reduces intervention time by efficient identification and correlation of specific rules, reports and quick-implementation response (~ 1h). Enables high data compression.
  • Enables advanced search in the log database. Enables scheduling of searches and receiving answers automatically via email.
  • Provides support for creating customised email templates and generating reports.
  • Web interface with quick access to basic information regarding the status of services and of the IT infrastructure.

arhitectura5arhitectura6

Integration

  • The SolarWinds Log & Event Manager solution enables process monitoring and control through reports according to PCI DSS, GLBA, SOX, NERC CIP, HIPAA standards etc.
  • No integration incompatibilities.

 

Portfolio Categories:

Security Solutions 


CA Technologies Incident Management
Do you manage a large number of repetitive events? Is predictive warning necessary for possible SLA violations? Do you aim to optimise support activities and lower the pertaining costs? Do users ask for more mobility and data sharing on collaborative platforms?

Integrated CA Service Management Solution

  • Based on reliable, robust CA Technologies products, highly scalable, with social media and mobility features (access from desktop, tablets and mobile devices).
  • Multi-organisation collaborative platform. Self-service for technical staff and end users.
  • Ensures efficient request and incident management, with integration of a robust CMDB, authorisation flows, and signalling of corrective policies. Enables maximal control and process automation.
  • Proactively and automatically identifies degradation. Shortens the intervention time, with viewing of the impact.
  • Generates relevant diagnostics and reports for the business.
  • Has analysis capabilities for key users, decision makers and non-technical staff.
  • Has native support for multi-tenant use with information sharing within a safe environment.
  • Integrated good practice pack and out-of-the-box ITIL compliance (request, incident, problem, change, knowledge, asset and configuration management). Low overall ownership costs.

Architecture

The solution

  • Multi-level, enterprise solution
  • Can be implemented with all components or only with a Service Desk Manager component and the ones needed for the features requested

Main components:

  • Service Desk Manager
  • Unified Self-Service
  • CMDB
  • Portfolio of Services
  • Body of Knowledge
  • Process Automation
  • Service Automation
  • Business Intelligence
  • LDAP for integration with various folders