focus on services
TRANSCRIPT
Our Company
For over14 years Focus On Services - US have delivered Technology Solutions to address business challenges with innovative IP and best practices.
Focus on Services – US consists of a passionate team of seasoned technology practitioners with hands-on experience delivery results for Fortune 500 clients. We are committed to unlocking client growth and innovation with our proven Technology Solutions.
Why FOCUS?
We have been helping businesses like yours for more than 14 years. Providing scalable, cost-effective solutions along with maintenance and support services that has helped other companies protect their investment.
Because of our wide range of services for IT infrastructure, we can offer innovative and taylor made solutions that will truly deliver value to your company
Windows Server MIGRATION SERVICES
ASSESSMENT • Review Contract and Cost
Model • Stakeholder
Analysis/Communication • Form a Migration Team • Establish Roles &
Responsibilities • Identify Business
Requirements
INVENTORY • Hardware • Applications (ADDAT) • Network • Resources • Other Impacted Users • Existing Vendor Contracts • Facilities Assessment
Gap Analysis (OPNET WAN Analysis) • Project Constraints
(Dates, etc.) • Move Packages
Composition • Re-IP/Move Event Dates • Project Planning
Document (PPD)
PREPARATION • Migration Workbook
Development • Receiving DC Site
Configuration • Planned Outage
Notifications • Mock Simulated) Move
Exercises • Vendor Involvement
DEPLOY • Event Scheduling • Package Turnover
Documentation • CMDB Final Update • Final Physical Walk-Thru • Re-IP and Move Events • Data
Migration/Replication
HAND OFF • Project Turnover
• Post-Project Review
• Customer Sign Off
5/8/2015 9
• 19 people a minute become new victims of identity theft due to data breaches.
• During a 3-year period, more than 217 million Americans were victims of identity theft or exposure.
• Each data breach costs an average of $6.6 million. • A typical Fortune 1000 company cannot locate 5% of their PCs. • A typical Fortune 1000 financial institution loses 1 laptop a day.
SECURITY ASSESSMENT
• External penetration testing − External intrusion testing identifies security weaknesses and strengths as they
appear from outside the security perimeter; usually, from the Internet
− Demonstrate the existence of known vulnerabilities
• Internal penetration testing − Identifies internal vulnerabilities that could be used by internal users
− mimics an attack on the internal network by a disgruntled employee or an authorized visitor having standard access
• Password auditing − Utilizing an offline method for verifying password strength
Benefits
• Internal intrusion testing identifies security weaknesses and strengths of systems and networks as they appear within the security perimeter
• Helps safeguard your organization against failure, through: • Preventing financial loss through fraud (hackers, extortionists and disgruntled
employees) or through lost revenue due to unreliable business systems and processes
• Proving due diligence and compliance to your industry regulators, customers, and shareholders. Non-compliance can result in your organization losing business, receiving heavy fines, gathering bad PR ,or ultimately failing
• Protecting your brand by avoiding loss of consumer confidence and business reputation
• Satisfy industry audit requirements
SECURITY ASSESSMENT
FIREWALL LOG MONITORING
Features
• Monitors firewall logs for malicious activity
• Monitors host logs for malicious activity
• Generates tickets for log security incidents
• Facilitates and assists in the remediation processes of security incidents
• Security alerts and responses for service outages
• Monthly reports
Benefits
• Total collection of all raw logs for use in real-time monitoring, proving compliance, and forensic analysis.
• Broader event source support for better visibility into the IT infrastructure.
• Significant log data compression (up to 75%), minimizing storage costs and maximizing access and analysis
NETWORKING SECURITY (DESIGN)
• Strategy and Direction
• Technology and Direction
• Vendor Management
• Capability Development
• Architecture
• Design
• EngineerinG
NETWORK SECURITY (Implementation)
• System security architecture, design, test, and evaluation
• Network and system assurance certification and accreditation
• Annual workforce security certification training
• Management-level security training and education
• Executive-level security awareness
CUSTOM BUILT INFRSTRUCTURE
• Storage infrastructure
• Backup/Recovery
• Management tools & process
• Data Centre
• Server, Network, DC Facilities
• DR/BC
• Applications & Applications Operations
• Systems Management
• Security
• Cloud
• Governance
IT INFRASTRUCTURE ASSESSMENT
• Strategic Vision
• Architectural Principles
• AS-IS situation
• TO-BE Architecture
• Quick Wins
• Initiative Roadmap to take client from AS-IS to the TO-BE
• High-level AS-IS / TO-BE business case
Next Steps
• Assessment
• AS IS – TO BE Presentation
• SOW delivered
• Kick Off Meeting
• Enable your business
• Wrap up
5/8/2015 26
SUCCESS STORY
Justice department of mexican federal government
• Tech Refresh for 30,000 Dell client devices
• 457 cities and towns in México
• Differentiators:
• Project started with CS services at Dell Warehouse enabling customer plug and play
• FOS delivered all products to final end user location
• FOS provides complete nationwide coverage under the terms and conditions DASP warranty program
5/8/2015 27
SUCCESS STORY
AB INVEB MÉXICO
• Largest beer bottler in Mexico with distribution and marketing in 180 countries.
• 13,000 Dell client devices
• 376 offices and bottling plants in Mexico
• Differentiators: • FOS provides complete nationwide coverage under the terms and conditions
DASP warranty program
• SLAs range from 8hrs to 16hrs restore time.
• Focus averages 97% SLA compliance which significantly exceeds contracted agreement.
• New multi-brand contract recently won with Dell for 5 years and 40,000 devices.
5/8/2015 28
SUCCESS STORY
MARSH & MCLENNAN
Global Insurance company.
• Tech Refresh/Migration project for 2,000 Lenovo devices in 8 countries in Latin America and the Caribbean
• Night shift 5PM to 7AM
• Differentiators • 100% SLA service delivery compliance
• Multiple countries migrated in parallel
• Standard quality compliance in all countries
5/8/2015 29
SUCCESS STORY
AMAZON COSTA RICA
The largest global on line retailer
• 450 devices installed in the new Amazon facility in Costa Rica
• Image, PC Installation and cable termination in accordance of Amazon specifications
• Differentiators
• Migrated CS procedures and training from MX to CR
• Project finished one week aged of schedule
• Satisfy customer
5/8/2015 30
SUCCESS STORY
AMERICAN / UNITED LATINAMIERCA
Contract awarded in 2011
Service started midnight Dec 31st
FOS supports 9000 devices including servers and cisco equipment
16 Countries
Full desktop support
7 x 24 x 365 coverage hours
Mission critical service
5/8/2015 31
SUCCESS STORY
SKY/DIRECTV BRAZIL
Contract awarded in 2006
Service started june 2006
supports 300 devices including servers, Storages, and networks equipments
Providing especialized services full time through 20 analysts in application Software to quality assurance in all the devices from main vendors, like samsung, motorola, pace, technicolor, etc.
Full desktop support
7 x 24 x 365 coverage hours
Mission critical service