1 / 8

Small Business IT Solutions for Federal and State Agencies

Serving Federal and State Agencies since 1997, we are a certified small disadvantaged business providing IT consulting and solutions. Our core competencies include infrastructure services, IT service management, application development, security services, and more.

chasteen
Download Presentation

Small Business IT Solutions for Federal and State Agencies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Serving Federal and State Agencies since 1997 Small Business IT Showcase Internal Revenue Services Date- March 24th, 2011 Presented by:Ramanjit Singh Principal– Government Solutions 8(a) Certified Small Disadvantaged Business (SDB) Certified

  2. Introduction IT Consulting & Solution Provider Since 1997 SBA certified 8(a)/SDB CMMI Level -2 certified 70 plus Federal & State Contract Vehicles D&B Rating Financial Score – 80 Open Rating - 95 Ranked 17th - CRN 100 fast growing companies Inc. 5000 fastest growing company Software Magazine fastest growing company Our Core Competency About us Partners

  3. Infrastructure Services

  4. Infrastructure Services IT Service Management ITIL Maturity Assessment ITIL Process Consulting & Implementation (Service Desk, Change Management, CMDB, etc.) IT Strategy, Analysis & Design Application Management Database Management (Oracle, DB2, SQL) Middleware Support (BEA Weblogic, Tuxedo, IBM WebSphere products) Performance Tuning (J2EE Apps, Databases, Unix Systems, Storage and network) SOA/EAI Support (Web Services, ESB, SAML, Federation Services) Business Continuity Management 24x7 Solution Design & Development Backup, Recovering & Archiving Disaster Recovery Process Design & Development Managed Services Total Management of Infrastructure (outsource & insource) Remote, Oncall, Onsite 24 X 7 Support • Microsoft Consulting • Install, configure and support of Microsoft Technologies • Exchange Migrations • Sharepoint administration and migration • SCCM & SCOM consulting and implementation • Infrastructure Optimization • Infrastructure Sizing and Capacity Planning • Server Consolidation • IT Services (Middleware, J2EE Apps, Batch Processes) Consolidation • Virtualization • Infrastructure Management • Data Center Services • Systems and Server Management • Storage Management • Network Services • Desktop Services • Desktop Management • Accelerated Deployment • OS (Windows, Unix) Administration

  5. SharePoint Experience

  6. Security services

  7. Security services Application and Enterprise security Infrastructure security • Our range of Information Security services includes: • Integrated Enterprise Security Solutions • Enterprise Security Assessment/Security Maturity Assessment at Infrastructure level • Security Architecture & Design • Security Strategy & Planning • Security Policy Development & Deployment • BS7799/ISO17799 Consulting & Implementation • Contingency Planning • Disaster Recovery Planning • Physical Access Control Solutions • Network Security Audits & Assessment • Network Security Hardening Services • Firewall Services & Consulting • Wireless LAN Security Consulting • Mobile Network Security Audits & Consulting • IP-VPN Consulting • Intrusion Detection/Prevention Services • Scanning and Hardening • Centralized Audit Logging • Vulnerability Management • Logical Access Control Solutions • Host Security Assessment • OS level security implementations for both Unix and Windows platforms • Host-based Penetration Testing • TSCTI has its own COTS for Identity and Access Management named SecureOne • User Provisioning • Delegated provisioning model • Password Management • Audit and Compliance reporting • User Self Service • Role Based Access Control • Large scale implementation of Identity and Access Management projects with multivendor installations with following complexities: • Single and federated Sign on • Course & fine grain entitlement • Enterprise Identity and Access Management architecture design • Phased implementations to applications • Internal employee security • Partner user security • Public user enrollment and security • Provisioning system • Delegated provisioning model • Password management • Compliance experience • Identity and Access management compliance • SOX compliance • GLB compliance

  8. Application Development & Maintenance

More Related