Quanam’s widely experienced professionals, who are fully acquainted with a range of infrastructure platforms, provide Data Centre Management services, ITIL best management practices and delivery.

Administration and Technical Support

These services apply to a Data Centre’s technological infrastructure, servers´ platforms/environment, networking, logic security and IP telephone services, which include, among others: operation systems, data bases, base software and other related services (email, application servers, proxy, activity/performance monitors/optimizers, protocols, antivirus, identity services, among others ).

It basically includes:

  • Professional hot-desk (assistance, management, and solution of queries and events).
  • Corrective and evolutive Maintenance
  • Component’s configuration management.
  • Installation and migration to new environments and/or components.
  • Infrastructure components’ monitoring centre.
  • Event analysis to implement corrective measures (continuous improvement process).
  • Analysis of vegetative or planned growth, and incorporation of new technology.
  • Service Agreement (SLA)
  • Full or part time coverage (7x24)
 
 

Data Centre Migration/Creation

This service refers to moving an existing Data Centre to a new site or creating a new one there.

A project includes the following phases:

  • Initial data gathering and diagnosis: Keeping record of an existing or new Data Centre’s technological infrastructure’s configuration, including all the environments (production, development, approval, contingency, among others) , and all kinds of platforms.
  • New Data Centre design: Data Centre’s configuration suggestions, and requirements.
  • Master Plan: Defined configuration implantation strategy.
  • Migration: Actual implantation of a new Data Centre, according to a Master Plan.
 

Automation of Operational Processes

All repetitive tasks executed by the Data Centre are included, for instance:

  • Process orchestration
  • Material and logical printing processes, including electronically delivered documents, such as emails, SMS, among others.
  • Information exchange.
  • Backup systems and information recuperation.
  • Moving applications’ versions among existing environments: development, testing/approval, training, production, contingency.
  • Contingency environment authorization process and return to production mode.

Our services include:

  • Advice on selection of automation tool, definition of policies, and rationalization of a Data Centre’s operation.
  • Processes’ implementation in a selected automation tool.
  • Administration, support and operation of automated processes.

Servers’ Virtualization/Consolidation

Our services include:

  • Diagnosis of existing configuration.
  • Consolidated configuration suggestion, consolidation plan included.
  • Consolidation/migration of services/applications to new servers’ configuration, according to a defined plan.
  • Support and administration of consolidated environments.
 

Data Base Consolidation

Our services include:

  • Diagnosis of existing configuration.
  • Consolidated configuration suggestion, consolidation plan included.
  • Database consolidation/migration to a new configuration according to a defined plan.
  • Support and administration of consolidated environments.
 

Information Management

This service refers to all Information management (either structured or not) kept in a Data Centre:

  • Backup and recuperation plan/policy:
    • Analysis and advice on best practices and tools.
    • Implantation of a defined policy.
    • Automation, management, support and operation.
  • Historic information safeguarding, and recuperation policy, idem previous item
  • Exchange/transfer
  • Data cleansing
  • Analytics, Big Data
 

Information Security

We offer a range of services within a reasonable security level:

  • Telecommunications/Security component’s configuration.
  • Perimeter defence, and intruder detection
  • Cryptographic solutions (including digital signature), PKI (Public Key Infraestructure) design and implementation.
  • Ethical hacking, internal and external penetrating testing (IPI and IPE)
  • Advice on secure communication solutions.
  • Security strategies’ planning and design.
  • Security level diagnosis (gap analysis) and risk analysis.
  • Advice and implementation of security standards, and good practices (ISO 27000, Cobit, etc.).
  • Implementation of Information Security Management Systems (ISMS) according to ISO 27000.
  • Drawing security policies and standards.
  • CyberSecurity Strategies.
 

Operational continuity

Design, implementation and maintenance of operational continuity solutions (also known as contingency solutions):

  • Analysis/revision of existing plans, and suggestions to improve recuperation plans of IT support, business processes, and potential crisis plans.
  • Design and implementation of operational continuity solutions according to ISO 22301:
    • Design a solution’s detection and activation processes (call tree implementation).
    • Design and implementation of potential crisis management plans to recuperate business and IT support.
    • Definition of response equipment structure to support the previously describe plans.
    • Identification of all kinds of resources required to cater for the plans mentioned in the previous item.
  • Design of a management system for an operational continuity solution, according to ISO 22313.
  • Design, administration, support and operation of contingency environments.
  • Operational processes’ automation to trigger contingency plans or return to normal.
 

IT Governance

This service includes tasks such as design, implementation, analysis and evaluation.

  • Design and implementation of:
    • Design and implementation methodological guidelines for business/IT strategic planning.
    • IT strategic planning.
    • IT cost systems.
    • Planes de sistemas.
    • Systems’ plans. IT monitoring systems (from a business and IT point of view). 
    •  
    • Methodology for service agreement management (SLAs) and their negotiation.
    • IT outsourcing.
  • Design and implementation of support systems to help decision-making.
  • Gap analysis and Cobit implementation.
  • A methodology’s design and implementation for operational and IT risks management (according to COSO II).
  • IT environment evaluation at complex installations.