We implement and provide
All our services are offered based on the on-premise, cloud, or hybrid model.
We cooperate with other integration and implementation companies, we are subcontractors or we can directly provide a team of our engineers.
Directory service solutions
which include consolidation, migration, and optimization of services based on Active Directory. We help you optimize your domain policies and reorganize the structure of organizational units.
we help you manage and access your files, creating developed environments for organizations with distributed locations.
Virtualization and consolidation of hardware and system environments.
Environment standardization, management and remote access systems.
- We build platforms dedicated to the implementation of operating systems and software based on Microsoft SCCM (System Center Configuration Manager).
- We create processes enabling environment standardization and automation of workstation migration both to the standardized environment and to newer operating systems.
- We manage mobile devices and implement MDM (Mobile Device Management) solutions. We are using smartphones or tablets more and more often, so we help manage them, maintain their configuration standard, and secure data made available by them.
Environmental monitoring systems and preventive escalation.
We create systems for the monitoring of IT environment and application performance, which enable proactive response to performance malfunctions, increase the awareness of administrators about infrastructure threats, and are valuable source of information on server and environment scaling. For monitoring purposes, we mostly use Microsoft SCOM (System Center Operation Manager) and Quest software (detailed application performance analysis) or Nagios.
IT process automation
- We minimize the range of manual administrative tasks, and, with the use of tools, scripts, webservices or dedicated applications (VMWareOrhestrator, System Center Orchestrator and others), we are able to increase IT department productivity.
- We relieve the IT department from a large part of paperwork related to the management compliant with ITIL processes with the use of process automation support systems such as System Center Service Manager. SCSM comprehensively supports processes related to the faults recorded during monitoring: it assigns tasks to appropriate groups of administrators or solves them automatically based on the method developed by SCO (Orchestrator).
Assurance of business continuity (Disaster Recovery) and high availability (HA).
- We provide archiving, backup and data deduplication services.
- We create solutions which:
- withstand failure or unavailability of a single server with the use of Windows/Linux clustering service, Load Balancing (software and hardware), or dedicated solutions such as distributed Active Directory, Database Mirroring for SQL or Fault Tolerance VMWare clusters,
- provide protection against unavailability or single location failure, including those based on geographic clusters, DRS clusters, inter-departmental networks, #kontakt point redundancy, and replication of arrays and virtual machines,
- secure against total environment failure based on backup software (backup, archiving) such as IBM TSM, HP Data Protector, Symantec BackupExec, EMC Networker, Microsoft Data Protection Manager, or Veeam Backup & Replication.
- are archive solutions to recover historical data.
We help you get started with cloud services with such providers as Microsoft Azure, Google, AWS, Oracle Cloud.
DRaaS – Disaster Recovery as a Service
AaaS – Archive as a Service
IaaS – Infrastructure as a Service
BaaS – Backup as a Service
Security as a Service
Communication and document flow systems
Microsoft unified communications systems (Exchange, Lync/Skype, SharePoint), teleconference systems.
- We implement solutions based on Microsoft Lync/Skype, which integrate communication by way of instant messaging, voice and video communications, teleconferences, web conferences, desktop sharing, presentation streaming or videoconferences.
- We unify voicemails and fax based on Microsoft Exchange. As a result, it is possible to use typical Outlook to access voicemail, e-mail box to read correspondence, or calendar through telephone/instant messenger, or to send/receive fax by e-mail.
- We integrate Microsoft Lync/Skype/Exchange systems with VoIP and landline telephony.
- We design, migrate and consolidate solutions based on Microsoft Exchange.
- We provide migration from Linux and Lotus Notes to Exchange/Exchange Online solutions.
- We design and implement corner solutions (mail securing), which are based on Microsoft ForeFront, FortiMailFortinet, CheckPoint, Sonicwall, Barracuda.
Microsoft SharePoint and SharePoint Online (Office 365)
- We provide a team of developers (.NET) who go beyond framework capabilities of SharePoint.
- We help our clients run an internal communication system between employees (Intranet) and an external communication system with providers and business partners (Extranet).
- We provide migration services from and to SharePoint environments
- We automate any business processes with the use of workflow, PowerApps, Flow.
- We provide a team of developers (.NET) who go beyond framework capabilities of SharePoint and deliver solutions which are tailored to the Client’s individual needs.
- We help you personalize and customize the SH look to the corporate brand book.
- We even create the most unusual applications – just tell us what are your needs.
- Using the functionality offered by SharePoint (Performance Point) and Microsoft SQL, we deliver Business Intelligence (BI) platforms
- We perform multi-dimensional data analysis
- We issue reports and dashboards
Security and cyber-security
- We provide and configure firewall, UTM and LoadBalancing solutions.
- We provide AV protection.
- We monitor and escalate unusual situations in the network.
Identity management systems
such as Quest Active Roles and Microsoft ILM allow us to deliver tools that transfer responsibility for user account management to the HR department (through integration with HR software) and directly to managers providing access to relevant data or applications.
Sensitive data access control systems.
- We provide secure access to data within the organization when an employee works outside the organization. We offer a range of solutions in this area: from Microsoft Direct Access, to simple PPTP / L2TP / SSTP / IKEv2 tunnels, to SSLVPN based on Mirosoft UAG, CheckPoint Connectra, and Fortinet and SonicWall UTMs.
- We provide data protection:
- when not in operation, thanks to data loss protection solutions for personal computers and servers and with the use of Microsoft BitLocker, Checkpoint/Pointsec or Mcafee (full-disk encryption and encryption and control over removable storage media), and Microsoft Right Mangement (document encryption)
- when in transport: in the case of e-mail (digital signature, PGP and PKI), traffic between locations (IPSEC, SSL), Network Access Control (NAP, NAC) and full-domain network security with IPSEC.
- We provide PKI (public key infrastructure) and certificate secure storage equipment – tokens and HSM.
- We support our clients in preparing security policies compliant with the applicable standards.
Management outsourcing – IT environment management services
we guarantee fast response time and necessary knowledge that allows us to cope with even the most difficult problems.
We offer IT management outsourcing
from separation of management of individual servers, switches, arrays, to comprehensive management tasks such as:
- system, application and data backup,
- hardware platform (servers, arrays), storage space and memory management,
- monitoring and system performance settings,
- system environment management,
- application service (www, DHCP, DNS, etc.) management,
- network and network equipment (LAN, WLAN) management.
We provide hardware and software within the existing partnerships
Infrastructure / servers and arrays (HP, IBM, Netapp)
Operating systems (Microsoft, Linux)
Network (HP, Cisco, Aruba)
Virtualization (Vmware, Hyperv)
Backup (HP Data Protector, IBM TSM, Veeam Backup Enterplication, ArcServe)
Monitoring (Microsoft SCOM, Nagios, Veem monitoring)
Management (Microsoft SCCM)
Automation (VMwareOrchestrator, System Center Orechestrator)
MDM (Fancyfon, Airwatch)
and many others..