Specialized
Professional services
Transactional Projects
Network Strategy and Analysis
Migration Assessment
Solutions Requirement Developed
Solution Design
Site readiness
Development of Migration Plan
Using the High-Level Design (HLD), we develop a phased schedule for introducing new hardware and protocols into the network. Our experts also identify network dependencies, potential impacts, and provide steps for risk mitigation during the migration process.
| Services | Activities/Scope | Deliverables |
|---|---|---|
| Advisory | • Developing high-level architecture and design • Assessing technical controls, architecture, and infrastructure • Validating solution requirements | • Solution Validation Document |
| Architecture and Design | • Comprehensive design development & review • Planning for solution migration • Deployment execution methodologies | • Comprehensive Design document • Migration Plan Document |
| Implementation | • Implement the solution using industry best practices • Facilitate the adoption of the deployed solution • Streamline the migration process • Conduct acceptance testing of the solution | • Adherence to customer timelines with timely execution • User acceptance test plan • Documentation of the As-Built solution |
| Optimization | • Deliver pre and post-completion support to ensure customer satisfaction • Continuously fine-tune the solution to meet evolving needs and exceed expectations • Leverage innovative expertise to accelerate customer business outcomes | • Lesson learned document |
TESTING AND ACCEPTANCE
We develop a comprehensive test plan that covers the system's functionality and performance based on the agreed-upon criteria. We collaborate with you to conduct the testing and resolve any issues to ensure the system is ready for acceptance.
EXECUTION OF MIGRATION
Our consultative support services that can include pre-stage configuration changes and assistance during cutover to ensure a smooth migration process.
TRANSFER OF KNOWLEDGE
We provide knowledge transfer to equip your team with the necessary information about your migration and upgraded solution. This includes relevant training, collateral, and handoff procedures as required.
POST-MIGRATION SUPPORT
Upon completion of the installation, OB Tech will assign a subject matter expert to provide post-migration support to your organization.
PROJECT MANAGEMENT
We ensure project success by creating a comprehensive Project Management Plan that includes identifying dependencies and risks, developing and approving the project schedule, and participating in regular meetings. We also provide weekly progress reports to keep stakeholders informed and create a thorough project close-out report.
MANAGED SERVICES
Our Managed Services provide a comprehensive approach to managing your IT infrastructure that goes beyond reactive maintenance. We take a proactive approach, offering a holistic view of your entire IT strategy, including implementation and ongoing management.
Vendor Offering
Vendor Hardware and Software
Security
- Anti-Virus Firewall
- Access Control Management Systems
- Data Los Prevention (OLP)
- Data Recovery
- Database and Application Security
- Desktop Monitoring and Management
- End-Point Protection
- Intrusion Detection Prevention
- Identity Management
- Network Security
- Security Information and Event Management
- Vulnerability Assessment
- Web, Data and Email Security
Hardware
- Access Points
- Access Card Readers
- Blade Servers
- Desktops
- Efficient Cloud Servers
- Firewalls
- Green & Energy Efficiency Server
- Laptops
- Mobile Rack Servers
- Printers
- Routers
- Switches
- Notebooks
- Thin Clients
- Tablets
- WAN Accelerators
Virtualization (VMWARE)
- Data Centre and Cloud Infrastructure
- Desktop and End User Computing
- Cloud Application Platforms
- Infrastructure and Operations Management
- IT Service Manager
- Security Products
- Third Party Components and Third Party Software
- Upgrades and Conversions
- VMWare Suits
- VMWare IT business Management
- VMWare Internet of Things (IOT) Solutions
- VMWare Data Collection
Vendor Offering
Vendor Specializations
Secure Intelligent Platform: Enterprise and Service Provider Networking. At OB Tech we have extensive experience in ASR’s, GSR’s, ISR’s CSR’s Catalyst, CRS, L4-L7 devices 7600, 7500, 6500, 7200, NCS 2000, 4000, 4200 Series Including SD-WAN
Extensive experience in Cisco Security Products such as: ASA +Firepower, CWS, ESA, SMA, AMP, OpenDNS, Lancope, Cisco ISE, Cisco Stealth watch and WSA
OB Tech’s resources have experience in Cisco Collaboration technologies as follows: Cisco Unified Cisco Call Manager (up to 12.x. Cisco Unity (up to 11.x), Cisco Communications Unity Connection (up to 12.x) Cisco UCC (Express, Enterprise), Call Manager Express, Cisco Unity Express, Cisco Mobility Manager, Cisco Emergency Responder, Cisco Unified Presence, TMS, SPARK (Meet, message, call), Cisco Meeting Place Express, Cisco WebEx Teams, Expressway, HCS, Voice analog and digital Gateways, CUBE Contact Center Cisco Hosted UC and Contact
Center, UCCE ICM (11.x) CVP, VXMLGWCTIOS/ CTI server Exony and Verint Recording. ICM CUIC, Customer reporting CRM Sales Force, SAP, workforce mgmt. system
Assessment & Discovery, Self-Service Catalog, CMDB & IP Management, Unified Infrastructure, FlexPod, Vblock Versastack, NWInfra Management, Cisco UCS, UCS Central, Install & Config ACI & NSX, DevOps integration with SDN, UCS Director (Express), Cisco HyperFlex, Nexus 9K/7K/5K/2K
We have extensive experience in designing and implementing cisco enterprise wireless.
technologies
Cloud Assessment & Discovery, Cloud Migrations: Hybrid Cloud Enablement, Custom Integrations, Cisco One ECS, Cisco Cloud Center, Openstack Cloud,AWS, Azure, Softlayer, Google
Our WLAN Assessment Service evaluates the existing wireless infrastructure, including architecture, performance, operational status, infrastructure, and client security posture. Based on best practices for Cisco, we provide recommendations for configuration changes to improve overall performance and security.
Our Network Optimization Service with Risk Assessment identifies areas for network performance improvement by analyzing the underlying infrastructure components of a customer’s network. This is done through a combination of data collection, inventory and configuration analysis, and interviews with network engineering and infrastructure groups. These evaluations enable us to assess the customer’s current network infrastructure, including hardware, software, network topology and design, protocol, and configuration resiliency.
Security Design Assessment offers a comprehensive, vendor-agnostic evaluation of a customer’s network infrastructure based on industry best practices and the Cisco Security Control Framework (Cisco SCF). This framework aligns with international standards such as the ISO 27000 series and NIST 800-53. Working with Cisco and the customer’s representatives, we scope the assessment based on the quote and the customer’s environment. The Security Design Assessment evaluates the network infrastructure’s capabilities to protect a business-critical asset and provides recommendations for remediation. These recommendations include improvements to topology, protocols, device configurations, and security controls.