Development Alghorythm design Big data solutions Relational, No-SQL and Graph databases Information Architect Unix Virtualization Cloud solutions Cybersecurity Strategy Realtime analysis Penetration testing Data integrity Business Application ERP - SAP CRM Workflow automation Marketing integration
Information Architecture
ASSES, DESIGN AND DEPLOY We offer a robust multi-pronged approach to align technical solutions to business objectives: Assess and define solutions around business and technical requirements Assist clients in solving infrastructure bottleneck whilst planning for the future Design solutions to build a foundation to face industry challenges related to Mobility, including BYOD and Security Provide a vendor-neutral approach to deliver the right solution for your organization Assist, support and train your employees and IT department Offer expertise in latest technology in Virtualization, Data Center, Cloud Readiness Offer an independent Network Architecture review
Cybersecurity Strategy
HOLISTIC APPROACH TO CYBERSECURITY AND OPERATIONAL RISK MANAGEMENT We will examine all risk areas of your business both internal and external that can impact your organization s value. Our holistic approach to risk management is designed to keep your entire company safe and secure. PROTECT YOUR ASSETS Although many companies offer cybersecurity assessment services, few have the experience or the resources we can offer you. Due to our expertise, we ve partnered with world s leading companies in industries as diverse as: Financial services Government Real estate Oil & Gas Retail Building management Private offices
Projects
UNIFIED MULTI-SITE AUTHENTICATION AND FILE REPLICATION The client has offices around the world with no common information system and relies entirely on unprotected system of data exchange to share information. The project included creating a centralized authentication and real-time shared folder replications across all offices. This foundation became the pillar of their information infrastructure. Once every office was connected and relying on a singular structure of Windows based servers, we created replicas of servers (master-slave) to offer redundancy as a part of the business continuity plan. NETWORK EDGE WEB FILTERING FLOW BASED ANTIVIRUS We redesigned the firewall strategy to follow the management s direction. The client was looking for a way to create a distraction-free work environment where employees wouldn t have access to non-productive websites during working hours. Using enterprise firewall at network edges we: Deployed a monthly automated internal network vulnerability scan on both end-user and servers Introduced web filtering to ensure distraction-free work environment and maximizing internet bandwidth (i.e. by limiting access to social networks, media streaming and other non-productive sites) Decreased malware by using an antivirus on the edge router to analyze the data flow
PROJECT HIGHLIGHTS Technologies Microsoft Windows Server 2013 Active Directory authentication & DFSR multi-master replication engine Fortigate Web Filtering & SFlow Proprietary solution for automated vulnerability assessment Key numbers and benefits 3.7 TB of active data replicated across offices 3 data centers 20%+ increased uptime due to business continuity strategy and disaster recovery procedures Increase in detection of malware on network Increased hourly employee productivity
VIRTUAL DESKTOP INFRASTRUCTURE The project had multiple goals. The client s priorities focused on: Reducing IT help desk manpower Reducing the energy footprint of offices Increasing overall uptime of employees workstations Providing an itinerant workstation for mobile users Integrating any existent software including several ancient in-house financial projection solutions Using existing hardware to reduce overall investment VIRTUAL DESKTOP WORKSPACES Deploying thin clients for every employee with a ratio of 1 virtual machine for 20+ thin clients. Microsoft Hyper-V combined with Fusion-IO data acceleration card gave us the necessary edge in I/O performances that opened up the possibilities to proceed to maintenance tasks and snapshots of the virtual machine during working hours without affecting the end-user experience. In addition, Fusion IO allowed to: Remove I/O constraints faced on similar projects Maintain high performance workloads while maximizing server density Achieve extreme performance with Fusion IO
PROJECT HIGHLIGHTS Technologies Microsoft Windows Server 2012 r2 Hyper-V Fusion IO Ncomputing Other components for the Virtual Desktop Infrastructure Key numbers and benefits 20% reduction of end-user machine IT supervision Over 90% power saving 50% reduction of deployment cost for new workstations Increase in end-user workstation uptime Increased end-user satisfaction note: Due to non disclosure agreements with our clients, all security based projects and some of our core business projects are not in our showcase.
Testimonials
Romain was an asset to the company from the 1st day he started working for us. Over the years he developed a thorough understanding of our processes and was quick to look for improvements in the technology we used to run the company, thus making it more efficient. NICHOLAS WATSON - MANAGING DIRECTOR, NASEBA GROUP Romain is a very dynamic, hard working person. He s one of those managers that would stay up late if you have to stay up late. He knew how to motivate a team. RODRIGUE HAJJAR - FOUNDER AND CEO, KWIXER Romain quickly became leader of our technical team. In addition to his clear architect leadership, his diagnosis were always very thorough, thanks to a sound methodical approach. LOUIS ENAUX - DIRECTOR, ENERGY UTILITIES AND MINING AT PRICE WATERHOUSE MANAGEMENT CONSULTANTS (PWC) Romain has been instrumental in many other aspects of our business and proven to be a valuable member of the executive team. SOPHIE LE RAY - CEO, NASEBA & NARU CAPITAL