IT Consulting Services
Asset Tracking and Reporting / IT Asset Lifecycle Management
We can supply customers with a regular, detailed IT asset reports, also showing changes over time, either new assets appearing or previous assets disappearing.
Change Management Services
Change Management ensures that all changes to the client infrastructure follow our standardized methods and procedures for efficient handling of all changes, to ensure minimisation of impact on the client's operations and infrastructure.
Our skilled consultants can train employees in a variety of areas, including specific application usage, security concerns and best practices, optimizing their workflow, and training on a variety of other technology topics.
Vendor Relationship Management
We maintain direct relationships with hardware and software manufacturers and vendors, effectively communicating with them on behalf of our customers on support, research and upgrade issues.
Hardware and Software Procurement Assistance
We can research, analyze and evaluate possible solutions for clients. Technical advice is available to ensure equipment and applications will perform the tasks required. It is also important that equipment complies with our policy to ensure appropriate quality, reliability and supportability.
Hardware Service History
A detailed service history for all managed or serviced equipment is maintained. This ensures that trends in faults and in the reliability of equipment are more easily spotted, and we can move to ensure rectification to avoid the occurrence of high impact incidents.
License Compliance Reporting / Application Compliance Reporting
We supply a regular report showing actual licenses consumed of a specific application, compared to the number of installations of that application. This allows customers to stay within compliance of their vendor software licensing agreements.
Network Assessments and Auditing
Using a combination of industry-standard tools and procedures, we document and assess a customer's network, looking for areas of vulnerability, bottlenecks, service gaps and other concerns about the network in its ability to support the customer's business services and requirements. At the conclusion, we offer a report that categorizes and details the findings, with emphasis on areas that require change or improvement.
Network Security Audits & Analysis / Security Policy Planning
Using a combination of specialized tools and expertise, our security specialists discover and document the current security state of a customer network, taking into account current hardware, operating systems, applications, policies and configuration. We identify vulnerabilities and potential weaknesses that a customer may be exposed to, and offer a solution to remedy them.
Technical Usage, Analysis and Business Impact Reporting
We supply our clients with regular reports that have detailed technical usage metrics. They include: bandwidth, traffic, disk utilization, network incidents, memory usage, and CPU utilization.
We can supplement IT staff for clients who maintain their own IT support teams. We supply full-time, on-site IT technicians for our clients who have staff shortages due to vacation, illness or understaffing.