Virtualization is the process of developing one or more virtual servers (with imitated /emulated/ hardware) on the physical server. The objective is to separate the OS and the application from hardware and make them independent. Virtualization enables unobstructed work of partitioned virtual servers, whereby multiple OS environments can co-exist in strong isolation from each other on the same physical platform. That concept has been realized with the help of a series of technologies, but they all have the same set of advantages in relation to the classical serving farm:
- Reduced administration,
- Reduced operating costs,
- Increased standardization,
- Increased reliability and availability,
- Increased efficiency,
- Increased security.
Virtual resource is actually a file encapsulating an entire environment comprised of virtual hardware, bios, and operating system within which a fully configured application is run. This enables fast storage, copying the existing and creating new virtual resources, but also fast migration from one physical resource to the other without interruption.
We can differentiate between:
- Server virtualization,
- Desktop virtualization,
- Applications virtualization,
- Data storage system virtualization.
Even if it had been possible to launch a successful business story without the crucial influence of IT, it is today surely not possible to maintain successfulness, let alone growth, without employing it extensively. One of the important preconditions for the successfulness of a company is its level of IT services available to employees, customers and partners. The quality of the provided services directly depends on the quality, reliability and availability of the IT infrastructure that must support the services. ECS has accordingly developed and keeps developing a portfolio of solutions that can provide our clients with the necessary IT service infrastructure level. Our portfolio offers:
- Active Directory service, electronic mail and collaboration,
- Active Directory design and implementation,
- Electronic mail design and implementation,
- Collaboration design and implementation (SharePoint),
- CRM design and implementation,
- MS Project server design and implementation.
Network infrastructure was traditionally protected from unauthorized access by the firewall system and common communication devices – routers and switches. However, as modern means of communication have spread and as employee mobility has become a widespread normality, traditional protection was no longer satisfying. Overcoming laptops, PDAs, memory sticks and other portable memory devices made the assumption that internally generated networking is friendly and benign invalid. Out of our security solutions portfolio, we would like to draw special attention to:
- Firewall, Content filtering,
- VPN solutions,
- Antivirus solutions,
- PKI (Public Key Infrastructure),
- System log management,
- Monitoring the integrity of systems and other databases,
- End point security solutions.
IT System Consolidation
Analysing the user’s IT system brings us to conclusions frequently made also by the user, but still surprising posterior to the presentation of numerical data indicating that the system operates significantly away from the optimum – regardless of whether the problem is disk space occupation or the efficiency of networking, processor-related or human resources. In fact, it is no secret today that most IT systems, particularly the ones in exploitation for a longer period of time, are in need of some kind of consolidation. The point of consolidation is to bring the IT system back to the optimum (because it is reasonable to assume it was in optimum after the initial design), in order to:
- Increase availability,
- Improve performance,
- Increase efficiency,
- Reduce complexity,
- Facilitate control,
- Increase energy and space savings.
The protection of data is crucial in every professionally implemented IT system and without it no system can be considered secure or reliable. It is thus necessary to start from two key pieces of information in data storage subsystem design: firstly, the time needed to recover the data and bring IT service back to function or RTO (Recovery Time Objective) and, secondly, the amount of data loss tolerated after the last successful data storage or RPO (Recovery Point Objective). Choosing the optimal solution includes also the selection of backup software and the dimensioning of hardware elements (communication and storage devices) that comprise it. Regulated procedures for back upping and restoring critical data comprise the crucial part of the solution, as does a detailed backup strategy.
As far as data backup solutions are concerned, there are various possibilities for backing OS, user data, databases, configurations etc. up. Quality data backup solutions may control external data backup units like tape drives, robot devices controlling several simultaneous recording heads and storage cassette library etc.
Uninterrupted service availability has become imperative in the globalised business of today. BCP (Business Continuity Planning) is the development and setting up of the plans and procedures that enable the organization to protect the functioning of its crucial business processes even in conditions out of the ordinary control, such as natural disasters, possible terrorist diversions etc. Disaster Recovery (DR) is a series of technological solutions and procedures enabling the data and services using them remain available to customers even in extremely problematic situations. This most frequently implies creating at least one but preferably two alternative locations, in addition to the primary one. In this way the secondary location can take over IST services and service provision in general in case of primary location breakdown.
BCP (Business Continuity Planning) and DR (Disaster Recovery) realization within it present complex activities that demand professional and methodical approach, project management, and specialized competence.