Have an account? Sign In or Sign up

agility @ a glance

Services

Services (17)

How effectively an organisation can respond to a disaster is critical in ensuring the continuation of its core business activities and revenue making potential. Business Continuity planning is an essential part of an organisation's Risk Management strategy. It provides insight into how the core business operates and an understanding of what processes must be put in place to manage unexpected downtime and minimise the cost to the business. A number of industry standards and processes are in place to assist with the development of an effective Business Continuity plan.

agility works with our clients to develop effective Business Continuity Processes tailored to specific requirements and will draw attention to areas such as:

  • Specific business requirements;
  • Analysis and understanding of core business practices;
  • Analysis and identification of core ICT infrastructure;
  • Architecture of BCP processes and ICT systems; and
  • Minimising the cost associated with the recovery from disaster.

 

An audit is management tool to ensure corporate governance. The results of IT Audit need not be restricted to IT governance activity; regular external IT Audit projects ensure that executive supervision of technology activities are taken seriously and that IT service contracts are delivered as agreed and in accordance to industry standards. External reviews consider efficiency, costs, service levels, risk profile and business alignment and control best usage of available funds.

agility consultants focus on providing the required oversight to the organisations executive, but also provide truly actionable advice to the ICT departments on how to improve their provided services.

Our audits provide management reports which identify areas of concern, consider industry standards and make recommendations on how measurable improvements can be achieved. The focus of each audit is tailored to our clients individual concerns or requirements. Output of audits can be leveraged to define a infrastructure and service baseline and can support the definition of an ICT strategy.

agility services can range from a short review and planning exercise though to the development, planning and execution of a multi-year audit plan or the permanent placement of a gatekeeper between the organisation and a chosen ICT service provider.

 

With qualifications in the ITIL and TOGAF space as well as significant experience from the Technical engineer to the Solutions architect roles allows agility to advise the business in the direction of IM investment as well as Architecting solutions that has immediate deliverables as well as long term value, Supportability and return on investment.
 
Strategic value can be realized at the business level by designing to business process which are both current as well as long term supportable. On the other end of the project the solution needs to be both supportable and easily managed and aligned with the overall IM skillsets and technologies.
 
With the rapidly changing  and dynamic nature of IM any and all Solutions, Business Data and infrastructure needs to be scalable, supportable, integratable and migratable to support a life not just in the 1-3 year normal cycle but more critically from the 3-10 year life of the solution. The use of Standard data models, industry standard interfaces, Virtualisation and shared RDBMS solutions ensure business data is quickly and easily accessible to all business units for the future.
 
Often over looked is the utilisation of forensic IT to identify past business impact and outages and ensuring these are captured as use cases to ensure future designs can mitigate these. History often repeats itself.
 
 
With extensive experience architecting solutions to a high standard and the subsequent success of numerous multi-million dollar deliveries has earned agility an excellent reputation at the enterprise level. This success can be attributed to the following skills:
  • Architecting of a Business solution versus an IT Service. Ensuring alignment with the people who will use the solution;
  • Documentation is language specific for the relative target audience, Business, Project Managers and Engineers;
  • Qualification of all components and data;
  • Adherence to Best practice and industry trends;
  • Factoring in long term supportability, manageability and flexibility;
  • Effective identification of in-house skills and capabilities;
  • Thorough investigation of existing infrastructure to identify risks;
  • Definition of development and release management requirements; and.
  • Owning the responsibility of the final solution.

 

agility through the utilisation of industry standard frameworks and significant experience in the enterprise space has an excellent history of successful delivery of both infrastructure and software solutions. Our significant end to end engagement capabilities ensure both delivery to a high standard as well as being able to recover a project which is slipping on targets. This success is attributed to the implementation of the following skills to a high level.
 
·         Combining both a very high standard of documentation as well as effective communication across a wide range of business units and levels ensure solution delivery begins correctly from day one.
 
·         This combined with regular catch-ups and progress reporting ensure quick identification of delays and pain points to all project members and the ability to bring the solution back on track quickly.
 
·         Ongoing it is essential for all delivery members have clear visibility of all the necessary components as well as final solution configuration and understanding of scope and destination of the solution. This can only effectively be done by high standards of documentation, communication and team management.
 
 

Designing a monitoring and alerting solution typically starts with the identification of the right set of details to monitor. This begins with monitoring a broad set of events and performance counters produced by devices or an application, and the giving indicators of the health of the component. Without broad monitoring of the basic health indicators, significant, preemptive warnings about component problems are unlikely, leaving the ICT infrastructure to be managed in a reactive mode.

A monitoring solution based primarily on the exposed health indicators, such as events and performance counters, is a great start, but there is also a significant benefit to moving beyond this and monitoring critical functionality.

agility consultants a familarised with the available solutions on the market however our approach is vendor agnostic and always the clients requirements into account to find, design and implement the solution best fitting the requirements. We design end-to-end processes, starting from infrastructure and application monitoring, to the storage of historical data and the presentation and interpretation of obtained data. Dashboard and reports will be tailored to the unique client requirements and will, in doing so, support the translation of raw monitoring data into meaningful interpretations.

 

Backup / Recovery
Backup and recovery systems tend to be a neglected and unloved component of the of the ICT environment and are often an afterthought of projects implementing new systems and business solutions.  However this capability is like an insurance if something goes wrong, data gets corrupted or wrongfully deleted - it provides a roll back function to ensure that in the case of a failure only an acceptable amount of change is lost.

An effective and efficient backup and recovery system requires only minimal management and should not interfere with day to day tasks or decrease the performance of available IT equipment - all this whilst providing maximum peace of mind to the organisation.
 
The market provides a multitude of Backup solutions - all with pros and cons. agility consultants will architect the perfect solution tailored to our clients requirements and will draw their attention to areas like:

  • Specific business requirements;
  • Optimised infrastructure utilising suitable hardware and software;
  • Total Cost of Ownership (TCO) - taking initial setup and ongoing maintenance cost into account;
  • Backup topology (onsite, replicated or offsite);
  • Capacity planning; and
  • Backup scheduling to ensure operation is not impacted.

Archiving
Data archiving is known as the process of moving data that is no longer actively used to a separate data storage device for long-term retention.  Archiving can free up much needed high-performance/high-cost storage capacity where infrastructure upgrades for increased storage are not possible. Archives are typically replicated between site or are stored off site to provide availability in the case of a disaster.

When designing archival systems agility consultants will consider topics like:

  • Storage media - depending on the type used they may degrade over time or become obsolete;
  • Storage device - It is important to retain working devices that was used to archive the data to complete the restores;
  • Data usability - ensure to include the programs as well for data archived in formats that may become obsolete; and
  • Redundancy - include multiple copies especially for critical data.

Due to an increasing reliance on communications technology, each organisation's network is expected to maintain fast and reliable connections between people and computers, sometimes across harsh or challenging environments.

A successful implemented network provides the ability for remote data sharing, email and internet access, automation, security, management and support services whilst actively minimising downtime, effectively managing bandwidth and reducing performance bottlenecks. In addition the network should be scalable and adaptable to meet the ever changing needs of an organisation without incurring excessive additional cost.

In order to achieve success, a network must be well designed with the specific business requirements in mind. Network architects must be able to leverage and combine the capabilities of both, mature and current technologies to provide a reliable and scalable network design that contributes to the ongoing success of the client.

agility consultants have proven experience in working with our clients to deliver successful network design and consulting services to support the implementation requirement tailored WAN & LAN networks. Defendant on the need, designs can include the integration of Wireless, Microwave and Satellite technologies into existing networks and the provision of WAN optimisation and QoS services. We design and deliver VoIP communications utilising standard SIP based infrastructure which can be integrated with traditional ISDN and E1 Telco communications services.

A secure organisation should know where their data is and who has access to it. ICT Security is concerned with safeguarding the confidentiality, integrity and availability of an organisations assets - namely its people, information, operations and systems. Securing an organisations assets is essential to maintaining profitability, compliance, corporate image, and a competitive edge.

A successful ICT security strategy will incorporate a number of technologies in order to deliver a unified line of defence against malicious software or inappropriate use of resources that could threaten the integrity of assets, will also raise security awareness within an organisation and protect assets without significantly impacting or disrupting business operations.

The market provides a large number of security solutions - all with pros and cons. agility consultants will architect the perfect solution tailored to our clients requirements and will draw attention to areas like:

  •     Specific business requirements;
  •     Network perimeter defence - Firewall & IDS;
  •     VPN & secure remote access;
  •     Wireless networks;
  •     LAN access controls;
  •     Domain & application security;
  •     Email, Internet access, proxy;
  •     External ICT services; or
  •     Auditing, monitoring, log analysis and management.

 

Page 1 of 2