it consultancy presentation
DESCRIPTION
TRANSCRIPT
ProfileIn this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more
dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and
misuse. There are many software and hardware available in the market to protect our computers and its data but very
often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,
Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to
Data Pilferage and Abuse.
Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it
investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my
Phd. in Information security. And having worked for close to two decade in various large establishments I have gained a
fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises
be it Small Medium or Large.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solution an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market
research team who are in the process of continuously scanning the market and keeping us updated in the latest
technologies available and also newer challenges our clients come up with. We share these developments with our
clients by way of periodical news letter by e-mail.
We have to our credit a very small client base both in India and overseas who are extremely appreciative to our
perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in
reassuring ourselves that this is what a client in need of.
Above all as a policy we share our knowledge with the younger generation by giving them training programmes at
the college levels so that they become better IT Professional having a holistic approach.
IT Consultancy Services
� IT Managed Services
� Data Management
� Network Design
� Data Center Design
� Firewall (Hardware/Software)
� ASC (Annual Service Contract)
� Help Desk and Ticketing Systems
� Mailing Solutions
� Internet Bandwidth Solutions
� IT Inventory Management
� Application Support
� IT Outsource
� IT Road Map
Information Security
� Defining Information Security Strategies
� Securing Servers and Clients Data from
Internal & External Threat
� Conducting PEN Test. (Penetration Test)
� IT Assessment & Audits
� Application Audit for Security Vulnerabilities
� IT Security Awareness Programs and Training
� Security guidelines
� Network Audit
� Implementation of Firewall & UTM
� AV / IPS / IDS / DLP / DR / BCP / RSA
� Data Encryption
� Rights Management Services
� Group Policies
� Removable Drive Policies
� Network Policies
� Do’s & Don’ts for IT Users
� BYOD (Bring Your Own Device) concept
� Defining BYOD Security Policies and Best
Practices
� Patch management
� Application Usage Definitions
� Data Security Policies
� Backup & Restoration Policies
� Vendor SLA’s & NDA’s
� Data Centre Policies
� Mailing Policies
IT Policies
ERP
� Finance/Accounting
� Human Resources
� Manufacturing
� Supply Chain Management
� Project Management
� Customer Relationship
Management
Business Promotions
� Internet Marketing
� Tele Marketing Strategies & Applications
� SEO (Search Engine Optimization)
� Bulk Mailing & SMS
� Social Networking Site links
� Event Management
� Web Design & hosting
� Mobility Applications
� Present Marketing Strategies
� Printing & Publishing
� Presentations
Mailing Solutions
� Open Source or Paid Mailing
Solutions
� Mailing Policies
� Cloud Based Mailing Solutions
� Security Policies
� Archive & Restore plan
� Security Certification
� Spam, Virus, Malware Control
� Mail Server Redundancy
� Incorporation of multiple domains
� Log Tracking
� Mail Encryptions
Video & Audio
Conferencing
� Video/Audio Conferencing
� Desktop Conferencing
� Chat
� Audio Conferencing with multi channel
� Bandwidth Sizing
� On demand Video/Audio Conferencing
� VOIP Solutions
Data Center
Solutions
� Requirements for modern data centers
� Design considerations
� Fire protection
� Environmental control
� Site Selections
� Security
� Power and cooling analysis
� Green datacenters
Virtualization
� Server virtualization (Vmware,
Citrix, Hyper-V)
� VDI (Virtual Desktop Interface)
� Storage
� Failover
� Network
� Snapshotting
Network
� Network Designing
� Structure Cabling Design
� Wireless Network Design
� Design & Implementation of
VLAN (Virtual LAN)
� Switches & Routers
� Documentation
� Cable Testing & Certifications
� Vendor Co ordination
for Implementation
� OFC
� Network Audits
Internet Services
� RF Links
� Leased Line
� MPLS , RF, and Leased Lines
� Bandwidth Sizing
� Performance analysis
� Best Practices and Guidelines
� NOC (Network Operating Center)
Coordination's
Cloud Computing
� Applications
� Platforms
� Communications
� Content
� Servers
� Finance
� Database
Sales
� Servers
� Desktops
� Laptops
� Network Components
� Storage
� Printers
� Biometric Machines
� Printer Cartridges
� UPS
Services
� Servers
� Desktops
� Laptops
� Storage
� Printers
� UPS
E-waste Collection Program for
supporting
Senior Citizens
In partner with
Dignity Foundation
CSR Initiative
Articles – Head Consultant
Articles – Head Consultant
Clients
Partners
Thank you
IT Outsourcing
@
www.hkit.in