Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar

ICE DELIVERABLES


🇬🇧
In Inglés
Creado:


Public
Creado por:
James Williams


0 / 5  (0 calificaciones)



» To start learning, click login

1 / 25

[Front]


Name the 7 Categories
[Back]


PROACTIVE IT MAINTENANCE SERVICES IT TECHNICAL SERVICES IT ADMINISTRATIVE SERVICES TRANSPARENT IT SERVICES CYBERSECURITY SERVICES REDUNDANCY & FAILOVER TESTING SERVICES IT AUDIT SERVICES

Practique preguntas conocidas

Manténgase al día con sus preguntas pendientes

Completa 5 preguntas para habilitar la práctica

Exámenes

Examen: pon a prueba tus habilidades

Pon a prueba tus habilidades en el modo de examen

Aprenda nuevas preguntas

Modos dinámicos

InteligenteMezcla inteligente de todos los modos
PersonalizadoUtilice la configuración para ponderar los modos dinámicos

Modo manual [beta]

Seleccione sus propios tipos de preguntas y respuestas
Modos específicos

Aprende con fichas
Completa la oración
Escuchar y deletrearOrtografía: escribe lo que escuchas
elección múltipleModo de elección múltiple
Expresión oralResponde con voz
Expresión oral y comprensión auditivaPractica la pronunciación
EscrituraModo de solo escritura

ICE DELIVERABLES - Marcador

0 usuarios han completado este curso. ¡sé el primero!

Ningún usuario ha jugado este curso todavía, sé el primero


ICE DELIVERABLES - Detalles

Niveles:

Preguntas:

78 preguntas
🇬🇧🇬🇧
Name the 7 Categories
PROACTIVE IT MAINTENANCE SERVICES IT TECHNICAL SERVICES IT ADMINISTRATIVE SERVICES TRANSPARENT IT SERVICES CYBERSECURITY SERVICES REDUNDANCY & FAILOVER TESTING SERVICES IT AUDIT SERVICES
PROACTIVE IT MAINTENANCE SERVICES
Proactive Network Services Proactive Systems Services Proactive Security Services Proactive Endpoint Security Services
IT TECHNICAL SERVICES
Unlimited Helpdesk Support Unlimited Monitoring Support Team of Experts Backups Patch Management Secured Access Management
IT ADMINISTRATIVE SERVICES
Ticketing & Trend Analysis Key Performance Index Quarterly IT Analysis
CYBERSECURITY SERVICES
Network Security Scanning Systems Security Scanning Simulated Phishing Security Testing Cybersecurity Training
REDUNDANCY & FAILOVER TESTING SERVICES
Backup Testing System & Network Redundancy Testing Wi-Fi Performance Analysis
Proactive Network Services
Proactive maintenance of Network Infrastructure. Review logs and performance, identify issues, and open tickets to resolve. Reporting by Network Engineer to keep you informed on network stability, performance, etc. (Weekly)
Proactive Systems Services
Proactive maintenance of Systems Infrastructure (servers, devices, etc.) Review logs, and performance, Identify issues, and open tickets to resolve. Reporting by Systems Engineer to keep you informed on systems infrastructure (Weekly)
Proactive Security Services
Proactive maintenance of Network Security Infrastructure. Review logs and performance, identify issues, open tickets to resolve. Reporting by Security Engineer to keep you informed on security measures (Weekly)
Proactive Endpoint Security Services
Proactive Endpoint (Device) Security Services. Check backups, OS and Application updates, Antivirus Software Updates, and open tickets to resolve (Weekly)
Unlimited Helpdesk Support
24x7x365 Unlimited remote helpdesk user support services to troubleshoot and resolve any IT issues
Unlimited Monitoring Support
24x7x365 Proactive monitoring, alerting, and response to detect, prevent, and mitigate IT incidents
Team of Experts
Specialized team of technical engineers assigned
Backups
Monitoring and maintain your data backups
Patch Management
Patch management services to address vulnerabilities, bugs, or security issues
Secured Access Management
Secured cutting-edge PAM (Privileged Access Management) solution from Delinea that protects access while allowing users to operate efficiently
Manage Licenses and Warranty
Hardware Warranty, Software Licensing & Subscription tracking to consolidate software/subscriptions, mitigate downtime risk, and ensure software use compliance
Ticketing Services
Ticket & trend analysis and reporting (Weekly & Monthly) to identify recurring issues and improve processes, systems, etc., thereby improving efficiency
IT Meeting
Weekly IT Meetings to discuss ongoing projects, resolve immediate issues or concerns, and plan for upcoming tasks or initiatives
Procurement
Assist with hardware, software & licensing procurement to negotiate cost savings, optimize hardware/software, and maintain consistency
Ticketing & Trend Analysis
Ticket & trend analysis and reporting (Weekly & Monthly)
Key Performance Index
Monthly Key Performance Index Report (KPI) to track trends and better tailor our services to your specific needs
Quarterly IT Analysis
Quarterly Business Report to evaluate your quarterly goals plan for any necessary adjustments, improvements, etc
Network Security Scanning
Internal and External Security Scanning, Analysis, and Remediation to prevent, identify, and mitigate network threats (Quarterly)
Systems Security Scanning
Systems Security Scanning, Analysis, and Remediation to prevent, identify, and mitigate Systems threats (Quarterly)
Simulated Phishing Security Testing
Check your organization's phishing awareness and see how many of your employees are Phish-prone. Train employees accordingly (Half-Yearly)
Cybersecurity Training
Conduct Cybersecurity and Infosec training that ensures users are up-to-date on best practices to prevent breaches and attacks (Half-Yearly)
Backup Testing
Backup Restoration Testing and Report to ensure data is recoverable in the event of a disaster, incident, or to comply with regulations (Quarterly)
System & Network Redundancy Testing
Systems & Network Redundancy Testing and Report that eliminates single points of failure and mitigates downtime risk (Half-Yearly)
Wi-Fi Performance Analysis
Wi-Fi Spectrum Analysis and Report to optimize the performance and reliability of your network (Half-Yearly)
IT Audit
IT Audit and Recommendations to help you plan for potential expansion, compliance, and explore new opportunities to further optimize IT (Yearly)
Additional Notes on 4 Weekly Reports
Performance issues, ISP bandwidth, Firewall, or systems performance and load then those recommendations are put into regular IT meetings with clients, so we can plan, it is more of an partnership than just a service provider.
Additional Notes Unlimited Help Desk Support
Can also check on existing tickets, not just new tickets. If you speak to one of our reps at 2 in the morning, you will have a live person assisting the user, not someone on-call. We have 3 working shifts running, people are working from office, not sleeping, our to an engagement, at their desk ready and waiting to assist.
Additional Notes on Secured Access Management
Cybersecurity is paramount to us, and most of our competitors do not have these sophisticated applications that they are running, even the network and system admins do not get to see the passwords they are only available to the managers. So if there is an engineer turnover they don't know passwords, in most cases, you would need to change the passwords, we don't need to do that because they don't see the passwords. With this advanced password management software it already rotates passwords, so there is a check-in and check-out. Since we are SOC 2 certified all of these actions from administrators are are recorded, so you can see everything they did and when they did it for audit purposes. There are multiple layers of security built into these tools.
Additional Notes on Procurement
We have a dedicated procurement depart that does nothing but procure hardware and software licenses. We managed licenses and warranties. We have an asset management system, that is already programmed so if is expires in 45 days, for example, it automatically opens a ticket for the procurement department to submit a quote to you for approval. We won't purchase any hardware or software without your approval. Everything is in our client's name. We are resellers who help secure a discounted price and pass it on to you. You do not have to purchase through us, but we will still track those assets.
Additional Notes on System & Network Redundancy Testing
As an IT company, they deploy architecture for redundancy but often they (internal or MSP) do not do those simulated tests, for example, if you have a dual ISP, if are doing dual fail-over testing you need to simulate and then switch off one of the ISPs and see if the traffic is going over if you ware running multiple virtual hosts you want to make sure failover is happening, network wise as well for example switches. Same with backups, how many times do companies restore backups to make sure they are recoverable? All of this testing takes a lot of time and with us, this is already built into our fixed pricing model. Wifi performance analysis we have very sophisticated tools that scan the entire building, to see what frequency you are using, where are the collusions happening, what microwaves or tools are affecting, are your neighbor's access points interfering with yours, that provides us with heatmaps which tell us which frequencies need to be adjusted. All of this is documented in reports and shared with the clients.
Additional Notes IT Audit
3 goals of the audit - give you the lay of the land and the 3 areas we look at are your security, performance, redundancy, and failover. These annual audits enable us to map out what changes to the infrastructure will need to be made to accommodate growth so you can better plan regarding budget allocation. We want to make sure we align with the client for example when you are starting we don't want to put in too much redundancy but as you scale you need to add to it.
Layer 2 vs Layer 3
Layer 2 and Layer 3 differ mainly in the routing function. A Layer 2 switch works with MAC addresses only and does not care about IP addresses or any items of higher layers. Layer 3 switch, or multilayer switch, can do all the job of a layer 2 switch and additional static and dynamic routing. That means, a Layer 3 switch has both a MAC address table and an IP routing table and handles intra-VLAN communication and packet routing between different VLANs.
Hypervisor Type 1
Native or bare-metal hypervisors These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare-metal hypervisors.
Hypervisor Type 2
These hypervisors run on a conventional operating system (OS) just as other computer programs do. A virtual machine monitor runs as a process on the host. Type-2 hypervisors abstract guest operating systems from the host operating system.
Hypervisor
A software that you can use to run multiple virtual machines on a single physical machine
Hypervisor Image
Hypervisor Image
Hyper-V Host
The physical computer that provides the resources, including processing power, memory and disc usage for your virtual machines
VMware
A computer software program that allows you to install a virtual operating system within any operating system
Virtual Server
A software-based representation of a physical server. The function that abstracts CPU, memory, storage and network resources from the underlying hardware and assigns them to VMs is called a hypervisor
Backup Software
A computer program that makes a copy of your files and folders or your complete system, including the operating system, applications and data. Advanced applications allow you to make multiple backups so that if one backup is damaged or unavailable, you have another with which to recover your data and/or systems.
SAN
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level network access to storage
Difference between SAN and Cloud storage
The difference between storage area networks and cloud storage is that SAN systems are hosted through a company's own servers, while the cloud stores it virtually via internet servers
SAN Image
SAN Image
NAS
Network-attached storage (NAS) devices store and share data for multiple computers, that can be accessed remotely.
DAS
Direct-attached storage (DAS) is a type of storage that is attached directly to a computer without going through a network.
SAN vs NAS vs DAS image
SAN vs NAS vs DAS image
NAS vs SAN image
NAS vs SAN image
NAS vs SAN setup image
NAS vs SAN setup image
What is a Tape Library
A collection of magnetic tape cartridges and tape drives
What does a Tape Library do?
Tape libraries and autoloaders automate backups and archives with multiple tapes. Tape libraries offer more capabilities than autoloaders, but are often far more expensive, as well as more complex because they have more tape drives. A tape autoloader is a step up from a single tape drive for backup and archiving.
Switch
A network switch forwards data packets between devices. Switches send packets directly to devices, rather than sending them to networks like a router does.
Layer-3 Switches/Routers
A Layer 3 switch functions as both a switch and a router.
VLAN
Virtual Local Network (VLAN) is a subnetwork that takes groups of devices on a larger network and creates a virtual LAN for those devices, effectively separating them from the other devices on the network. This achieves the same ends as WLANs are able to achieve naturally through the use of separate channels and lends a LAN much more flexibility.
WLAN
A wireless local area network can be considered a subcategory of regular local area networks. By definition, in order to be within range of a wireless access point, a device must be local to that access point. Wireless networks differ, though, in that they use the air as a shared hub through which they transmit data as opposed to discrete cabling. We know this, of course, as WiFi.
LAN
A Local Area Network (LAN) is a network of devices connected across short distances, all located within a single, defined area. For example, this could be the network within a household or a business, or even cover an area as diverse as a college campus.
WAN
Wide Area Network (WAN) connects multiple smaller networks over larger distances. This opens up a vast range of new opportunities for computers to share data and information.
VPN
Virtual Private Network (VPN) offers a unique combination of privacy and remote access. When you use a VPN, you can send and receive data as if you were a part of a private network, even though you are doing so from a different location.
2 VPN Principals
First, for businesses that need to provide secure access to their private network to staff working remotely. Second, users can effectively create a virtual network, ‘become’ a part of it and appear to the wider internet as part of that virtual network. This creates a method of masking your identity and true IP address/location when you’re interacting with public networks. This offers tremendous value in terms of privacy and internet security.
MAN
Metropolitan Area Network connects different organizations
LAN vs MAN vs WAN image
LAN vs MAN vs WAN image
Layer 2 switch
A traditional network switch port that operates in the network data link layer or the "layer 2" of the OSI model of network connection. Purely operating within the network's hardware layer, these switches forward data packets based on the MAC addresses specified.
Layer 2 vs Layer 3
Layer 2 and Layer 3 differ mainly in the routing function. A Layer 2 switch works with MAC addresses only and does not care about IP addresses or any items of higher layers. Layer 3 switch, or multilayer switch, can do all the job of a layer 2 switch and additional static and dynamic routing. That means, a Layer 3 switch has both a MAC address table and an IP routing table and handles intra-VLAN communication and packet routing between different VLANs.
Access Points
A device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.
Load Balancers
Acts as the “traffic cop” sitting in front of your servers and routing client requests across all servers capable of fulfilling those requests in a manner that maximizes speed and capacity utilization and ensures that no one server is overworked, which could degrade performance.
Point to Point connections
A private data connection securely connecting two or more locations for private data services. A point to point connection is a closed network data transport service which does not traverse the public Internet and is inherently secure with no data encryption needed.
UPS
Uninterruptible power supply, is equipped with battery backups that kick in during a power failure, keeping your network equipment running smoothly. This protects your equipment from damage and ensures you don't lose any unsaved work.
Startup
Designing, installing, configuring, and maintaining IT, Lab, and infrastructure. Implement IT processes and procedures based on best practices.
R&D
Assist with company’s rapid growth in terms of personnel and technology. Implement IT solutions to facilitate R&D endeavors. Implement, compute, and storage network on cloud and/or on-perm. Assist with office expansions.
Clinical Trials
Implement solutions to meet regulatory and compliance requirements during different phases of clinical trials. Work with CROs. Implement advanced cybersecurity solutions.
IPO
Work with investment bankers on IT due diligence. Ensure we meet SOX requirements
Commercialization
Implement IT solutions to meet manufacturing and sales requirements. Also work with different partners and vendors. Provide global support