IT Spring Cleaning!

With Spring here, it’s time for a little cleanup. At Roundbrix, we’re only too familiar with those items that seem to get left by the wayside, yet they  can cause significant harm. Consequently,  we thought we would share a few tidbits of what we have learned in the last ten years.

Are we backing up everything we should?  This is a big issue and we see it all the time. We all get busy and add file shares here and there, or maybe a new database and somehow get pulled away from finishing the job which means including it in the nightly backups. Oh, this could hurt!

Do the backups actually work? I once worked with an outfit and discovered for two and a half YEARS, a gal would rotate the backup tape and take it offsite. The only problem was the backup job never ran! Folks, doing a sample restore of a file that was created yesterday will give you a ton of confidence that what you believe is in place is working.

Do these people still work here? Often times, folks leave and there are leftover items. They may still be a user on your system including e-mail. They may also have been granted VPN or remote access which may greatly expose your company.  Some may even still have voice mail set up and changed the greeting to something not very nice!  Another area of weakness we have discovered is when a user actually has been given the wireless access point password. What this means is they can sit outside in the parking lot, sit on your network backbone and attempt to get into employee accounts especially if passwords and security is not rigorous.

Can we get rid of those old computers? Sure you can, but realize what you can use and what you need to destroy before handing that machine into another party’s hands. What you should keep is usually RAM, especially if you have a lot of the same model machines. There’s not a machine out there that won’t benefit from at least 4GB of RAM and if it’s a 64-bit machine, it can benefit from using even more! It’s also an inexpensive way to stretch that IT dollar on those remaining aging units. On laptops, saving a couple extra power supplies might prevent you having to throw good money after bad should one fail. What you need to destroy is the hard drive as you don’t want ANY company data going with the drive. We use the HAMMER method with a pair of safety goggles – it’s like a sport!

Who has access to what? Ok, this is a bit more of an exercise but reviewing who has access to what makes sense. We would start at the firewall and look at the VPN list and ensure that access is not granted without VPN IPSEC access. We would also look at Access Control Lists (ACL) in the firewall. Additionally, just changing user passwords and wireless and administrator passwords every six months just makes smart business sense to catch those straggling items that are often overlooked. In more sensitive environments, we recommend a quarterly review and changing of the passwords.  Here, having a documented password change procedure makes sense.

Are folks surfing on my time and my dime? The short answer is yes, but is it at a point of excess is really the question? The policy should be simply “if someone needs to get a hold of you, they can call”. Other than that, ask folks to respect that work time is not play time. If that policy doesn’t work, you can put in web monitoring and application control, which is available on many firewall platforms that can prevent excessive social media abuse on business time.

These are just a few simple steps to keep you safe, secure, well-protected and productive.  As a business, you need Spring to be a time of growth as the vacation times start coming up pretty quick in Summer!

Let us know if we can help you button things up!

Advertisements

WebSite Performance Monitor and Attack Preventer!

Having a well-designed web site is great, but there are a few questions worth asking to ensure it is not only doing the job for you, but it is also not creating a liability. Yes, you heard me right.

You see, web sites contain data –  and they must. There’s data you intended for your audience, and other data that are only for the eyes of others- or just a little at a time.  There is a process called SQL Injection Attack. What happens is that hackers find a way to retrieve all or important data illegally for their own purpose, which could include putting you out of business or ruining  the good name you may have spent a veritable lifetime to build!

At Roundbrix, after protecting your data, security comes in a close second. It’s so important to us, we are our own priority consumer. But instead of keeping this great process and anti-hacking weapons to ourselves, we want them available to other outfits as well. After all, it’s Good Guy or Gal against Bad, right? So here’s what we’ve done. We’ve created the following total toolset that not only protects your interests .

SQL Injection SmartStopper. We use logic here that not only identifies when someone is trying to steal your data, but we identify them and block them.  We can also collect forensics if a law suit is involved to provide expert testimony on the prosecution end. There is a small setup fee and a smaller monthly charge to receive automated notifications of what was identified and what was blocked – automatically!

Web Performance Monitor.  We are able to monitor many pages of code and give precise response times. Warnings are sent out when thresholds you establish are exceeded. We can let you know exactly where and when it is slow. And when it’s down, we’ll notify you immediately. We also allow you to monitor specific keywords on web pages. Testing database performance and ensuring all is up and running is also part of this toolset.

Heartbeat Functionality. Here’s just another area where we separate ourselves from the crowd. We NEVER assume that because you hear nothing, that all is well. Our tools report to us if they are not operational, so in our scenario,  no news is bad news. It’s like your kid calling you to check in. If they don’t call, you don’t automatically assume all is well. Same holds true with intrusion performance monitoring tools. They need to report in just like in the Civil War, when the first cries of “Two O’Clock and all is Well” rang out to ensure the individual monitoring the enemy had not been taken out.

Related services.  Roundbrix offers a full suite of services to help you answer a number of questions as well as provide quick remediation to these and many others.

Are the database and internet servers properly tied down to one another?

Are database indexes optimized for performance?

Is the Internet server as fast as it should be?

How do I maintain proper PCI compliance?

Are your firewall permissions excessively creating exposures?

Is important information like client credit cards stored?

Is there a more secure way to conduct web commerce?

Is data stored properly and not kept too long?

As we most proudly enter our 11th year in business, we have never been better equipped or more resolute to helping companies succeed while keeping those with a patch over an eye at bay!

Call us for a free evaluation and quote!

When Two is Greater than Three or Disaster Recovery for Free!

This title reminds me of a childhood cartoon of Rocky & Bullwinkle when announcing the next episode, there were always two names for it. Here are a few examples:

Boris Lends a Hand or Count your Fingers!
Rocky and the Rock or Taken for Granite
Landslide on the Rails or Bullwinkle Covers His Tracks
All in Fever Say Aye or The Emotion Is Carried
Claus and Effect or Yule…Be Sorry

If you’re feeling nostalgic and need a bit more of this Rocky & Bullwinkle, here’s the YouTube link on Rocky & Bullwinkle starring Robert DeNiro.

To move on, we’ve been working to share the great news of the recent advancements in VMWare, specifically VSphere 5. But the very nature of this technology is so awesome it warrants another look, especially for your Disaster Recovery Plan and Property Use Tax bill, especially if you’re in Orange County!

Disaster recovery with VMWare. You’ll be pleasantly surprised when you get more functionality for less money. Remember that CPU utilization on an average server is only 15% unless it’s a heavily used database or application server. In summary, there are fewer and fewer scenarios where a Virtual Machine is not the solution. We firmly believe at least 75% of all servers should be virtualized.
So getting back to the 3 > 2, here’s the scenario.

In the above scenario on the left, if one of the three physical machines fail, you’re basically down in that area with all that it does. Not a good place to be if you’re planning on running a business. You get to react and perform damage control because you have just become a firefighter!

In the above scenario on the right using a VM Cluster, when one machine crashes on VMHost 1, it can automatically failover to the VMHost2 and life goes one. In being consistent with best practices, distribute your risk between VM Host machines. As is the case in life, flexibility and adaptability is what this is all about.

Orange County Use Tax. One of the areas I take issue with the most. When calculating use tax, it is based onPurchase Price, not what it is worth. So I have a 5-year old server that cost me $8,000 when I bought it, and today it is worth $500. The use tax is based on the $8,000. Not fair, but that is government. How you get even is with less physical machines as it’s just plain less tax. Go from ten physical machines to four, and your property use tax is reduced by 60% on these items for years to come, not to mention the savings in electricity! At the end of the day, monies paid in taxes could be better used for other business purposes or maybe give someone a raise – like me!

The “Every Other Upgrade” Methodology

Keeping up with technology has to be one of the hardest things to do. There is a point of diminishing return, that is to say, when the cost of a project far outweighs both the benefit and the need. Here are a few cases in point, and how we work to keep your dollars working for you.

In reviewing this methodology, these are the components to consider:

Evaluate the useful life of the hardware platform. We see server hardware lasting from five to seven years on average. A little extra RAM. CPU and disk may make the difference between an ‘early retirement’ and a full life.

Look at the number of major software releases in the useful life of the hardware platform. What we mean by major is fairly intuitive to us, but not to all. Here are a few examples:

In employing the ‘Every Other Upgrade’ methodology, just follow either the Orange or Blue tracks, but not both.

Common Sense Factor. We now apply some serious common sense.
Reasons to upgrade are as follows:

  • I need the new version because it will help my business andit is worth the cost
  • I am replacing the hardware and it only makes sense to bite off the upgrade as the old hardware gives me a great fallback position for transition
  • IMPORTANT NOTE 1: If we are talking PC operating systems, you MUST make certain that ALL necessary applicationsare supported
  • IMPORTANT NOTE 2: If we are talking Server Operating systems or SQL versions, you need to ensure that the applications and databases will support the newer versions.

The ‘other’ costs to always consider are the business interruption time, new software relicensing costs, and the labor – both in house and outsourced. In other words, there may be a ‘better’ time to do this from the cash flow and business cycle (slower time) that may make more business sense.

If you need any help in your decision-making, give us a call!

 

Roundbrix – Disaster Recovery Site and Private Cloud Services!

As we have grown in size and in our abilities and skills, we have also increased our prowess to serve. Specifically with virtualization, complete managed hosting and high availability, we not only are able to host web site and database servers as we do currently, but we can also support real-time and offline database replication and private cloud services. Yep, more capability and functionality is the name of this game.

What this means to you is simply being able to do more and sleep better for less. More peace of mind is gained by knowing that folks that have been around more than ten years in the technology sphere with over 100 years of experience collectively have your back. At the end of the day, better value and data protection is what the advancing technology brings. This Plan B thinking also raises a few questions to you which you need to have the answers and be quite comfortable with those answers.

      • What would happen if a fire consumed your current location?
      • What would you wish you had access to, like e-mail, database, files, programs?
      • Where are your backups and how current are they?
      • What if you had to recover from backups – what’s your confidence level?
      • How long can you go without access to systems before losing clients?
      • Are you working with technology folks that are seasoned and will have your back?

Answering these questions will likely help you identify possible gaps in your business continuity plan. It’s also about ensuring that the business is well-protected, no matter what! Protecting the business also means to protect those loyal folks that you employ, and trust in me when I say; these folks are your best asset. Long ago, I used to think that getting customers was the hardest thing. It’s not easy, but it pales in comparison of finding great folks that will carry out business execution consistent with the vision that is laid out, as it’s the only way a business can scale.

Description: http://www.mytravelingstory.com/wp-content/uploads/2011/02/low-cost.jpgNow you’re probably wondering about what all this must cost. The good news is that it’s probably not as expensive as you might think. What’s key in any business enterprise is economy of scale and this is no different. At Roundbrix, we accomplish this by buying bandwidth in greater quantity and leveraging physical hardware using virtualization with all devices arranged in a high availability (HA) array. The true beauty of this solution is in the simplicity of mature technology. It couldn’t be more logical!

So whether you need to securely host an entire front and back end web solution, want to replicate a database or web presence to limit your data loss exposure, or are in need of a private managed cloud, we can be that solution for you!

Leverage newer proven technology. It’s just smart, plain smart.

 

 

Go Virtual! VMWare VSphere 5 Benefits.

We are excited at the prospects of 2012 being a year where we are able to bring a renewed value to IT.  The technologies upon us finally are making IT more accountable for more efficient use of resources. The world of virtual machines is really the most exciting of technologies as this has the greatest cost to benefit equation, with little if any additional risk. In fact, it can add more redundancy.

Make no mistake, it’s truly prime time here. We’re actually having fun moving numerous old physical machines to a single physical machine partitioned with VMWare. Look, virtual machines are not necessarily for every application, but the fact of the matter is, an average server only utilizes 15% of its CPU. Okay, that’s like an eight-hour-per-day employee working just over an hour a day. You wouldn’t put up with this in the world of people, why would you with the technology? This makes little sense. But exactly where are the savings you say? Ah, I was hoping you would ask!

Savings is where this technology excels. It’s about economy of scale as much as economy of smart. So where exactly would you save the money? Here’s the short list:

  1. SERVERS.      Buying less hardware is just plain smart. Less is the new more. So      you have three or four aging servers. Say they are $8k a piece to replace      including a 5-year maintenance contract, which is $2k of it. Buy one      slightly beefier box for $14k including the $2k maintenance. Using      three-server-to-one consolidation model, your savings on hardware alone      here is $10k! If you did four-to-one, assuming you kicked up the specs a      notch and spend another $1k for another processor and more RAM bring it up      to $15k total, your savings is $16k!
  2. ELECTRICITY.      If you have one machine instead of four, all things being equal, you would      only use one forth the energy in powering the machine.      Additionally, the larger savings may be in the COOLING aspect, as it’s one      fourth the BTU’s of generated heat.
  3. REDUNDANCY.      This always an important, no      critical, component when designing infrastructure. The “What      if’s” and “Plan B Scenarios ” need to be covered out of the gate. So      how does VMWare stack up? Welcome to RAID 6, that is RAID 5 with a second      parity stripe. Read performance is unaffected and write takes a wee bit      longer, but the plus side outweighs the overhead. You can lose not one      disk, but two and still be running. This extra level of redundancy is      important and should always be couple with redundant power supplies, one      going to a reliable UPS unit and the other going to the local power grid.
  4. MANAGING.      Yet another area where this technology excels. There is little easier than      managing the pool of resources. You give the resources to VMWare and it      manages it all. I suppose it might be easier, we just haven’t figured out      how that would even be possible. It’s all easy and on the fly with no      reboots. Meet the nirvana of management, VMWare.
  5. DOWNTIME      during MIGRATION. This has historically been both a painful and costly      thing. But if you’re simply moving an old server to new hardware, you do      it all without incurring downtime and switch over when ready. Likely your      only change will be the static IPV4 address on the NICs as it will grab      from the DHCP pool during the migration. But remember also, that this is not      for every machine, but we can help you figure out what makes the most      sense here.

In summary, this technology makes sense for most servers, except heavily utilized database servers and other machines that truly require dedicated hardware, but in most cases, pooled resources are more than adequate if the virtual machine host is properly-sized.
Also, this video (hyperlink to below) from VMWare may help you better understand as a picture and a movie are easily worth a thousand words! http://www.vmware.com/virtualization/

Many to one, now we’re talking!

Group Policy – Scaling without Increasing Cost

It’s no secret that when a company grows, costs rise. One simple reason might be payroll. Another might be the need for more space or additional resources. In the Microsoft suite of tools there is something called Group Policy (GPO). Simply put, this is the ability to impose security and workflow disciplines in an environment. This can be done on both a machine and user basis, and can also be grouped. Here are a few examples:

Rerouting ‘My Documents’ to a Server: At the end of the day, if a PC crashes or a laptop is stolen, what happens to the documents on it? If they were not rerouted to the server, you had better hoped they were backed-up, although this is not the case. This tends to result in some angst and anxiety as folks grapple with data loss or worse yet, possible exposure of confidential company and customer data. Had ‘My Documents’ been rerouted to the server, no such exposure would have resulted.

Mapping a Share: This can be done on individual or global levels. It means that you can maintain uniformity in your outfit, so that “Drive K” on one computer actually refers to “Drive K” on anyone else’s computer that has permissions to this share. Additionally, you can have folks that can “view only” separate from those that can “Edit, Create or Delete”. The name of the game here is to give permissions as required, but not excessively as that creates exposures.

Assigning or Replacing a Printer: Say 50 people are individually mapped to an “All In One” machine that performs copying, printing and faxing. But alas, it’s at “End of Life” and they gave you a smoking deal on a new one that does twice as much in half the time! You have two choices here. You can visit 50 desktops or you can push out the new machine with a few clicks and voila, everyone has it nearly instantly.

Preventing Unauthorized USB Devices: These USB drives are great. But when trying to contain internal security and folks taking confidential data offsite, these are among the greatest of liabilities. You can lock it down so that no USB mass storage devices are allowed, perhaps except for a few authorized individuals. Again, it’s not looking for bad, it’s about protecting the mother ship.

Forcing Password Changes: We see more Post-It notes than you can imagine with passwords. Moreover, these passwords are rarely changed. These should be changed either every three to six months or when a security breach is encountered, especially if you have systems that are accessible remotely. Group Policy makes this automatic.

Forcing New devices to have Anti-virus Software before allowing Network Access: We love this one, as folks tend to accidentally bring in infected devices, including MACs, which sometimes are not affected, but are quite effective as ‘carriers’. Regardless, we have the ability to ‘force’ compliance to ensure that those new devices requesting access to your network are compliant before they are allowed to touch any data.

Distributing New Application Versions: A new version of a client/server application is released, but now comes the laborious task of loading on 30 PCs or so. Never fear. If there is an install package, often times referred to as a MSI (Microsoft Installer) package, it likely can be distributed automatically.

At the end of the day, there’s a reason you’re on a Microsoft Network. What is key is to leverage that the functionality so it earns its keep – like the rest of us!

Ed

GoDaddy versus Network Solutions

When trying to cut costs, no stone should be left unturned. Yet in doing so, we also should not be too hasty and pick a sub-par product or service provider. We need to do the research – so we did!

In reviewing our own credit card bills, I am finding myself getting annoyed with these monthly hits. I see them nearly every month and am left wondering “What is this one for?” These costs are adding up like HP ink cartridges – or worse!

So I turned to looking at a few items and asking myself a few questions so that I felt I was in control again.

  1. Do I need all the domains I have?
  2. Am I paying more for things than I should?
  3. Are auto-renew settings dinging my card without a notification?

To me, there are two major players out there. The incumbent, Network Solutions, also affectionately known as NetSol , was the safe choice in the early days. Now there’s GoDaddy and they offer up a plate of value and some friendlier busines practices, so I decided to share a comparison we performed this week.

As with any comparison, there’s got to be some text that fills in items that just won’t fit into the matrix. One item of extreme annoyance is that Network Solutions automatically renews 60 days ahead of time, whereas GoDaddy is only 30 days, which I believe to be a more reasonable business practice. Paying for something two months before you use it just seems plain wrong.

Also, domain management is far simpler with GoDaddy as well as shorter phone wait times. And always be on the lookout for those ‘Specials’. GoDaddy offers free private registration when registering five or more domains, whereas Network Solutions offers private registration using a ‘phone only’ special, which seems a bit backwards on the self-service model. Phones, really?

As with every service, the big ‘gotcha’ on either of these is to review domains that you want to drop periodically, to ensure they are not set to ‘auto renew’, otherwise, you’ll be chasing your own tail trying to get your money back. Good luck on that one as even if you do get your money back, you’ll lose on the time and frustration end of things.

At the end of the day, as I have many domains I own and forward, I’ll save a few hundred bucks a years, and get to hold on to my money another month.

For my money, it’s GoDaddy!

Ed

Network Solutions and GoDaddy are registered trademarks.

Basic, Managed and Complete Hosting Options – Choose Wisely!

You won’t get an argument from me when it comes to the cost-effectiveness of hosting. It’s a really good thing and a no-brainer in many cases. With the new “Cloud” word, which is defined differently by so many outfits, we’re going to take a closer look at the options here and the risk versus benefit equation. You need to ask yourself a few questions:

Do you want your server in house or hosted with true oversight?

Do you need dedicated hardware and bandwidth?

Do you want to manage your servers or do you want them managed?

Although there are many flavors of hosting out there, the two types of I think most often are Basic Hosting and Managed Hosting. But at the end of the day, we feel another option is necessary that significantly completes the entire picture, and that is Complete Hosting, which Roundbrix offers to its clients. You’ve heard the term you’re in good hands with Allstate. The same applies with Roundbrix Complete Hosting offering. Let’s review the options in more detail.

Basic Hosting is defined as providing air conditioning, electrical, Internet access and a secure space where you can place your equipment. You are responsible for all hardware, software, backups and network security issues. You’re also responsible for all failures and remediation. Think of it as an empty apartment with utilities. The biggest downside to Basic Hosting is that those very same resources that are shared to give you the most bang for buck can also swing the other way. An example might be that some hosting providers put too many customers on a single server in an effort to maximize their profit, but you may experience intermittent performance problems as a result. Another example is they may pool too many customers on a smaller internet connection, providing a lackluster experience for those trying to access your systems, whether it is an end client trying to access your website, or your employees trying to access a hosted application.

Managed Hosting is defined as looking after the hardware (if it is provided) and ensuring it’s up 24 x 7 x 365. It provides you with the same climate-controlled, clean power, internet circuit and physical security as Basic Hosting. The difference really comes into play by providing additional services of value, like providing dedicated hardware (at a cost), system backups and providing the option for dedicated bandwidth. If hardware is being leased or provided, it’s up to you to clearly understand when things break, who fixes it. Some outfits may monitor performance, but again, the name of the game here is no assumptions. When there’s an issue here, it may be that it’s not ‘their’ issue, leaving you with a bitter taste or scrambling to find a resource to help resolve the issue. Unfortunately, we see this a lot more than you might think. Your issues are important to us and we will always address them in a timely manner.

Complete Hosting includes the remaining pieces, many of which can hurt or cause unexpected stoppages or risks. This becomes a matter of total ownership. Additionally in my mind, Managed Hosting should also include managing the backups, disk space, looking at network and server performance including RAM and CPU, staying on top of maintenance contracts and other expirations and renewals, anti-virus, strategically planning for replacement of firewalls, switches, and servers at the core of your infrastructure. With complete hosting, you also have more flexibility at every level.

Due Diligence for Managed Hosting. At the end of the day, it’s important to weigh your options wisely and make the right choices. For the ultimate peace of mind, Complete Hosting is the best way to go, but know who you’re dealing with and where your data is, including backups. Remember, your customer lists and financials are likely very sacred and need to be held close to the chest. Ensure you know the answers to these five questions before moving forward with anyone:

1. Where are my servers and systems and are they shared, if not customer provided?

2. Where exactly is the actual call center and what are the hours of operation?

3. If they perform backups, where are the backup stored? And for how far back?

4. Is the bandwidth dedicated or shared? How much dedicated or bursting up/down speed?

5. Am I notified promptly when there is an issue?

With computing infrastructures, much like life itself, nothing is perfect, but stacking the cards in your favor clearly lessens your risk. At Roundbrix, we are unique in that we will manage the entire enchilada and work with you to stay on the correct strategic path, allowing you to focus on your business. From our shop to yours, you’re in good hands!

Ed

Allstate and “Good Hands” are a registered trademark of Allstate Insurance Company.

Six Keys to Avoiding Data Loss

At Roundbrix, we take data very seriously. After all, it’s the only thing we really cannot replace. Given that, there’s a few safeguards that we recommend so your data sleeps as well as you do!

1. Know Where Your Data Lives. This may sound silly, but what if you had nightly backups running, lost something, and went to restore the data only to find out you weren’t backing it up? Folks, this happens more than you would ever want to know. Often times data is on desktops when it should really be on a server where it gets backed up. Good company policy and procedures with occasional QA here is best practice.

And remember, if you install a new program on the server, create a new volume on a server or a new database, know that it has to be selected to be backed up. Just because it’s on the server doesn’t mean it’s backed up!

2. Backup Nightly with a Verify Pass. This is key to ensure that your data is restorable from the media. We used to call this “read after write” as it simply verifies that what is believed it wrote is indeed what can be read back. A simple check box verifies that all is well come ‘restore‘ time!

3. Take a Backup Offsite at Least Weekly. This is where you have to think through your pain threshold for data loss. In other words, if you’re building burned down, would losing a week’s worth of data make it even more painful? If the answer is an emphatic ‘YES’, then that means you need to take a tape offsite more frequently than weekly. Do remember a couple of things about taking tapes offsite. First rule is they don’t survive well in heat or moisture so get a proper transport and storage container. Second rule is ensure it is secure as the tape includes all your company information and if misplaced, creates a liability. You’ll want to account for your tapes periodically to ensure one didn’t ‘fly the coup’. If you’re a Roundbrix client, you can use our secure biometric-secured facility to store your backup data as frequently as you would like.

4. Periodic Reviews of What is Being Backed Up. This little step that we like to do every quarter to catch new areas created. Face it, we get busy and things fall through the cracks as we’re only human. Also, we occasionally find new databases that not only aren’t being backed up, but not set up properly for maintenance, safety and controlling growth. To know how to set up a database maintenance plan, see the article we previously wrote here.

5. Redirect My Document Folder to Server using Group Policy. Desktops and laptops will fail, but what’s important is that it does not take sensitive company data with it. Also, if it gets stolen or misplaced, has this just put your entire company at risk? Folks, keeping autonomy between the company data and the desktop/laptop device any more than absolutely required is simply good business. One of these failing should not send dangerous ripples through an organization like “Oh, Ed had all the company financials and client lists on his computer and now they are gone!”

6. Know How You Would Restore From Scratch. In a crisis situation, this is not the time to “figure things out”. We have “been there and done that” so rest assured we can get you back to where you need to be is short time. After all, the name of the game is first prevention, and secondly restoration. If the restorations took a month, what would be the point?

Current Projects

  • Access to SQL Database Conversion
  • Server upgrades
  • High Availability Firewall upgrades
  • Network Engineering and Performance Monitoring
  • – MAS Migrations