Overview
Infrastructure Management Services
atom’s IT Infrastructure Management Services (IMS) offers a suite of reliable, responsive, flexible and proven infrastructure services and solutions that deliver differentiated value to our customer’s business.
Our rich portfolio of service offerings span across the infrastructure lifecycle of Plan-Build-Run-Monitor and includes infra Consultancy, data center, end user computing, enterprise networking, enterprise security, IT infrastructure operation management and transformation services.
The IMS team with experts in 36 countries, an ecosystem of strong alliances and a Delivery & Data Center footprint across continents helps us provide true 24X7 services to over 190 customers in multiple industries such as Telecom, Banking, Manufacturing, Insurance, Retail and Healthcare. We continue to invest in multiple proprietary initiatives such as atom’s USOP (Unified Service Operations Platform), IMS Academy and IMS NWS (New World Solutions) that help us constantly innovate and deliver differentiated and incremental value to our customers.
Experience
Unique Scale
Investments in Innovation
Differentiated offerings
Overview
With a comprehensive Infrastructure Management Services portfolio we help you achieve newer levels of business performance and enable you to derive more from your IT investments. Working with leading global alliances, atom brings in agility, efficiency and experience in managing critical IT infrastructure..
Snapshot of global IMS engagements :
Data Center
atom recognizes the importance of Data Centers in an organization’s ability to succeed and regards it as a ‘Value Center’ where the blue print of the business resides.
Organizations are looking at ways to meet the IT demands of business while providing innovative services that give them business agility and competitive advantage. One of the key focuses of atom’s DC Transformation and Operation services is the dynamic alignment of business requirements and IT systems that deliver efficiencies that drive down costs, optimize resources, and enable innovation.
Top Down Approach
atom realizes that there was a time when business decisions were limited if not dictated by the capabilities of the data center. This “Bottom-Up” approach is being rapidly replaced by the “Top-Down” approach.
This “Top Down Approach” for transformation that atom has embraced and imbibed in its approach aligns business and IT by embracing a real-time infrastructure and enabling executives to make strategic business decisions knowing they are supported by IT.
Plan & Consult
DC Consultancy & Assessment
Managed Services
Database Services
atom’s Database Administration (DBA) Service is a comprehensive offering with cradle to grave data support, skilled database administration and meticulous capacity planning. atom uses unique RightSourcing and global delivery models to deliver holistic database management services of the highest quality, meeting extremely tight service level agreements.
atom’s portfolio cuts across the entire spectrum of DBA services and phases of database life cycle:
DBA competency Highlights:
Benefits
atom Hosting Services
atom has over 7 years of delivering ‘availability experience’ and ‘managed hosting services’ leveraging its highly reliable and scalable Datacenters across the globe.
Managed Hosting Services allows companies to slash their investments in IT infrastructure, facilitate quicker deployments and implement a streamlined SLA driven infrastructure. It enables companies move from a Capex to an Opex business model, giving them business agility and flexibility.
Virtualization of application through a private cloud deployment yields Opex savings between 40-50%. It also gives companies turnkey infrastructure, reducing deployment times from months to days
atom’s Managed Hosting Services comprise of:
End-User Computing
atom EUC capabilities and offerings focus on enabling enterprises to achieve their business objectives through the effective management of their end user computing resources. Our comprehensive & robust services focus on key desktop management functions that can be delivered remotely to support a customer’s complex desktop and mobile computing environment. The services address the most common management and support tasks in an automated, centralized manner.
Our End-User Computing services includes Transformation solutions, Desktop Management, Service deck, Device Management, UCC and last-mile support. With significant investments in voice infrastructure, we deliver cost-effective Service Desk through our Global Delivery Centers.
Our End-User Computing portfolio includes:
End User Transformation
Transforming to a futuristic infrastructure
Today IT is expensive, unresponsive and consumes vast amount of capital, delivering resources which eventually are grossly underutilized. Leverage the power of atom end user transformational solutions while retaining the flexibility and open standards to support your existing IT infrastructure to be more efficient, flexible and cost –effective. The transformation solutions help you in seamless migration from the current (legacy) infrastructure into which is now called as ‘Next Generation Infrastructure’
Access your workspace securely … anywhere, anytime, any device!
End User Computing or Workspace Computing is in the process of being redefined. Traditional client computing devices such as desktops and laptops have had their share of cost and management challenges. The new world demands of device independence, anywhere anytime access and data security, are forcing enterprises to evaluate alternate solutions.
atom Workspace-as-a-Service (WaaS) offers a unique way for customers to embark on the virtual workspace computing journey allowing dedicated, pooled or shared virtual desktops or applications to be accessed any time from anywhere using any device.
Key Business drivers
Solution Insights
Go Mobile….fast & secure
Managing and securing multiple mobile devices in a corporate environment has been a huge challenge. The challenge is compounded with newer and more capable mobile devices being launched in the market very often. This growing adoption of smart mobile devices is leading to an expectation from IT to support them seamlessly.
Tech Mahindra’s Mobile management service offers a unique way of managing the corporate mobile devices using a single unified management console, a suite of plug and play ITIL-based software modules and enhanced mobility experience while solving your most pressing mobility challenges.
MDM Offering includes :
Smartest way to upgrade your Messaging infrastructure
As the business is growing there is continued demand for the highly reliable messaging platform. There is continuous demand to reduce cost, reduce IT management cost and optimize user productivity. The users can’t afford a downtime for the Messaging platform, even during Migration. atom’s provides an end to end solution for Messaging Platform Migration which can help in addressing business challenges.
Messaging Platform Services
Windows XP support is ending in April 2014. Seek “WIN7/8-MigR8” support from atom now and migrate all your desktops to Win7/8 in a hassle free manner! WIN7/8 is atom one stop migration service spread over 5 phases of namely 1) Assessment 2) Testing and Remediation 3) Packaging 4) Image management 5) Deployment. It consists of an array of service offerings
Consultancy:
Global Packaging Factory services:
Organizations Concerns:
At atom we have optimum solutions for all your concerns.
Move and Save advantage of WIN7/8-MigR8 :
Application packaging services
We deliver Application Packaging and deployment services to clients from our Global Packaging Factories located in Chennai and Hyderabad, India. Global Packaging Factory (GPF) is a unique centre, which aims at supporting the packaging needs of multiple clients. Our Global Packaging Factory has the right People, Infrastructure and Processes in place to perform packaging for high volume of applications at low costs. In GPF, We employ a “factory” approach that includes highly repeatable and standardized processes to package the applications. A factory approach provides not only higher success rate but also enables packages to be processed more rapidly at very competitive costs.
We designed Global Baseline Standards for Application Packaging Environment which can be used for all enterprise customers globally. Thus our Global Packaging Factories (GPFs) provide:
Salient Features:
Overview
NTSS offers end-to-end network lifecycle services and solutions, enabling Telecom Services Providers (Telcos) and Managed Services Providers (MSPS) build and manage their wireless and wire-line network infrastructure.
NTSS solutions enable the infrastructure to interact with internal and external information technology systems such as Operations Support System (OSS) and Business Support System (BSS) to provide full lifecycle management solutions to Communication Service Providers (CSPs). NTSS services span across the entire network ecosystem for telecom companies and enterprises ranging from network build, operate and maintain in an optimized and cost effective way. It also facilitates integration with Value Added Service platforms thereby achieving business efficiency and excellent customer experience.
NTSS offers full network lifecycle services such as network design, planning, deployment and network operations (maintaining and optimizing communication networks), which help deliver voice, video and data services. Our portfolio of network solutions and services offered by NTSS, can be broadly classified as:
Overview
The Carrier Network Services group provides network build, deployment, service fulfillment and management of the customers’ networks. We have extensive experience in providing optimized services to Greenfield and Brownfield telecom operators through managed network operations.
NTSS aids Telecom Equipment Vendors (TEMs) help their customers achieve quicker launch of products and faster rollouts through our innovative business models to ensure more stable, secure and compliant networks. Our proven benchmarking and optimization expertise improves customer experience and reduces the total cost of ownership.
The Key Portfolios of the Carrier Network Services Group are:
Overview
The Next Generation Network group is focused on delivering cutting edge technology solutions in the telecommunications domain. Our technology focus is in the Convergence market with Frameworks and Services in Digital Television, Internet Protocol Television (IPTV), Over-The-Top (OTT), Service Delivery Platform, IP Multimedia Systems and Converged Networks. The group has significant expertise in both legacy and next generation environments in terms of network technology, customer services and business processes.
Our wide-ranging innovative portfolio of integrated solutions and services, expertise in software covering development, integration, testing and maintenance or sustenance services, enables service providers to successfully manage Next Generation Networks. It allows Service Providers, Equipment Vendors and Independent Software Vendors take full advantage of market opportunities to address current and future challenges in the marketplace.
We have successfully designed solutions aimed at major transformation programs for Tier 1, 2 and 3 service providers from legacy to commercial-off-the-shelf (COTS) application for next generation services using our structured approach and robust execution methodology. Our in-house ready-to-deploy components and plug and play of best-of-breed COTS products help reduce the timelines for implementation.
Our Offerings include:
The Service Delivery Platform (SDP) solution provides pre-integrated products such as Communication Middleware Platform, Content Management Platform (CMS), Digital Rights Management (DRM) and Transcoding solution. SDP solution enables Communication Service Providers to quickly monetize network through convergence, by bringing 3rd Party applications and content partners and ease information technology integration.
The Commercial-off-the-shelf (COTS)-based SDP and CMS solution enable the following during the audit of existing network:
Next Generation Service Delivery Solution Architecture
Key Differentiator
Internet Protocol Multimedia Subsystem E2E Solution
Internet Protocol Multimedia Subsystem (IMS) is a standardized Next Generation Networking (NGN) architecture for telecommunication service providers. It enables transformation of their carrier networks and services to Internet Protocol (IP). With partnership with vendors, we will assist service providers achieve this goal of end-to-end transformation to IP using IMS.
End-to-end network transformation journey undertaken by service providers would enable us to position the Multimedia Testing and Managed Services capabilities.
IMS Architecture
Key Differentiator
Video Delivery Solution
Internet Protocol Television (IPTV) enables service providers to fulfill the video aspect (Live and On-Demand) of Triple Play services while providing interactivity (two-way communication) and high quality content for enhanced user experience.
Over the Top (OTT) leverages adaptive streaming technologies such as Apple HLS and Microsoft Smooth Streaming to deliver Live TV and On-Demand content to 3-Screens such as Set Top Boxes (STBs), personal computers (PCs) and mobiles or tablets over the internet (unmanaged network). This enables Service Providers to bring in additional revenue by offering the content that they own as well as external content to any device connected to broadband.
Our offerings include turn-key deployment of Microsoft Mediaroom or commercial off-the-shelf (COTS) based IPTV and OTT solutions. It includes architecture, design, information technology integration, supplier management, application development, managed services and support.
Key Differentiator
Offering description
Key Differentiator
Services
Our value-based partnership approach has been designed to provide our customers with reputation protection, asset protection and compliance. This is achieved through services across the following four categories.
Individual services under these categories are listed in the table below.
Additional detail on key services is available from the links below
Preparing for the future
Security has to constantly keep pace with advancements in technology. As our customers adopt newer technologies to do their business, we invest in developing new solutions or extending existing solutions to provide them with continued security cover for their business activities. Some of the areas where we are exploring new solutions include:
Security Governance Compliance
With the exponential increase in digitization of information, regulators have opted for stringent data privacy and fraud prevention measures. Customers have become increasingly conscious of data security, and direct the organizations to include Information Security (IS) as cost of doing business.
Most large organizations have security and business continuity systems and process in place. These systems have grown over time and have been influenced by the perception of security among different function owners. New regulations have built another layer of patchwork for risk compliance
Since security systems have become expensive to maintain, they are inconsistent across the organizations and are not fully compliant to best practices. Alignment of existing security processes with broader organizational initiatives such as Control Objectives for Information and Related Technology (COBIT) and Information Technology Infrastructure Library (ITIL) requires more effort and investment.
We have comprehensive suite of Security Governance, and Risk and Compliance services that assist organizations to review the security framework and the operational controls and to continuously assess and manage the security level.
Our Security Governance and Compliance Services ensure that your organizations security framework is aligned to the business objectives. Our services will help organizations to achieve:
Unified assessment for security, business continuity and information technology service management
Smooth integration of Security framework with the information technology and business initiatives
Certification to international standards such as International Organization for Standardizations ISO 27001
System Integration
We know from our experience gained in several large-scale security system integration projects, that an optimal system integration strategy is crucial to the overall success of the business. We have the right tools, templates and industry best implementation methodologies to meet customers information and data security requirements. We offer a complete set of services in the following areas:
The telecom sector faces major challenges such as adopting complex technologies, ever changing business environments and reducing cost. Telecom companies often lack solutions to match the evolution of new technologies and changing business requirements.
We provide system integration expertise to ensure that the technology is strategically aligned to meet the business objectives regardless of the size and nature of the organization.
Our certified processes and service experience indicate the success achieved in executing large turnkey security system integration projects. Our strategic alliances with leading technology players enable us to deliver cost-effective integration services that are steady, scalable, effective, efficient and innovative.
Application Security Consultancy
Security of application assets is a prime concern for organizations. Lack of appropriate application security controls leads to regulatory non-compliance, business continuity failures and data compromise. An effective end-to-end set of services establishes a holistic application security baseline that mitigates risk.
Our services help enhance the security posture of application assets by systematic reviews and assessments. Our Application Security Services ensure a secure application estate by:
Our Application Security Consultancy Services include:
A high-level application estate security review covers the risk compliance and business security system requirements. As integral parts of the application lifecycle, the review secures the development best practices and operation security application frameworks for identity, access, business continuity and monitoring.
Application Security
Application Security review covers a detailed assessment of security requirements, architecture and design, implementation, testing plan and deployment and application infrastructure and components.
Threat Modeling
A Threat Model assesses an application or its components for potential threats to provide threat ratings based on the criticality of the threat and possible attack exposure. Our process comprehensively records all the application components such as entry points, exit points, dependencies, information and data flow, user roles, protected resources, attack path and mitigation objectives.
Secure Code Analysis
Security Code Analysis is a comprehensive security assessment and analysis of application code that focuses on application security considerations, such as secure programming, business-driven application security policies, information protection needs, authentication needs, access controls, authorization and trusted computing needs.
Application Security Testing
An application and its components are inspected for level of their resilience to possible application security threats. Application Vulnerability Assessment identifies the security issues that may expose the business to risk due to internal threats. Penetration Testing identifies vulnerabilities in the web applications that could be exploited through internet facing components.
Application Security Assurance Service
Application Security Assurance Service involves setting up of comprehensive security gate within our customer’s environment, which analyzes the application estate for vulnerabilities, threats and risks. Our service provides recommendations for risk mitigation using a combination of assessment service components. The assurance service provides a periodic assessment of the application estate security posture to maintain the business risks to minimum.
Network System Security
Large organizations use network security systems such as firewalls and intrusion detection systems, to defend internal assets from threats, in third party interconnected networks. Organizations use system security elements such as antivirus and content filtering to mitigate risks from viruses, spyware and trojans.
Network and system changes are generally prone to configuration changes, deviations from the industry best practices and incorrect patch levels. It is important to ensure that the network and system security framework is properly designed and tested regularly.
Our Network and System Security Services ensures:
Our Network and System Security Service suite includes:
Our Network and System Assessment and Data Center Assessment services assess the overall security posture of the Network and System infrastructure within an organization. We assess the information security management, business continuity framework, security design and security architecture. We use a defense in depth model and operations through a review of the adequacy and effectiveness of documented and implemented controls.
Our review covers all critical areas such as, Local Area Network (LAN), Wide Area Network (WAN), architecture and design, logical security of network components such as switches, routers firewalls, Virtual Private Networks (VPNs), backup and recovery, change, release, configuration, incident and problem management.
Additionally, we review technical controls such as patch management and anti-virus updates, device management and monitoring. Our reports compare the current security posture to best practices, identify the gaps in the security framework and implementation and suggest appropriate mitigation measures.
The IT infrastructure has various vulnerabilities arising due to configuration mismatch and insecure coding practices. Our Vulnerability Assessment service identifies vulnerabilities through use of a combination of vulnerability scanners. Our security analysts analyze the tool output in detail, align with threat scenarios relevant to the organization and provide a comprehensive report of vulnerable systems and mitigation measures.
Identity and Access Management (IAM) as a security solution enables customers, partners and employees to access business and enterprise applications in a secure and compliant manner. An IAM solution flexible enough to enable this access is a prerequisite for an IT transformation journey that allows employees to bring their own devices to work (BYOD), to reap the benefits of agility and reduced cost using cloud services (identity as a service) and to enhance user experience across all electronic channels. To support increasing e-commerce using internet, organizations must enhance the consumer experience and federate with partners in an efficient, secure and cost-effective manner. To manage users and comply with regulations, it is essential to automate user identity lifecycles processes User identity will soon be the cornerstone of all big data projects enabling organizations to personalize services across a mass customer base.
atom is an experienced IAM system integrator with an experience in deploying IAM solutions for some of the largest and most demanding customers across the world. We have devised solutions that scale, methodologies that facilitate rollouts in complex estates and out-of-the-box components for quicker implementations. Our goal is to help reduce implementation risks and advice our clients on the best method to implement and support the IAM program. The IAM Practice highlights are as follows:
The Service portfolio for IAM services is aligned with the overall objectives of the Security practice – it covers assessment, design, build and management of IAM solutions as follows:
IAM Consultancy – We provide IAM Consultancy services in the following areas:
• Analyzing identity-related business and technical requirements
• Architecting and designing a best-fit IAM solution covering the lifecycle of:
• Identity management factors such as identity provisioning and de-provisioning, registration, role change events, self-care and password management
• Access management factors such as authentication, authorization and federation
We architect, plan and support the implementation of IAM infrastructure to ensure enhanced return on investment to our customers.
IAM SI – We provide full lifecycle deployment of Identity and Access Management solutions that include transitioning from legacy IAM systems, developing workflows, connectors, data migration scripts, and integrating with Service-Oriented Architecture (SOA). Our integration methodology, rollout plans, comprehensive installation and configuration services help speed up deployment time and minimize disruption to existing systems.
We also develop add-on modules and single sign-on plug-ins for our customers and suppliers to speed up federation.
IAM Operations – We take total ownership of managed operations – 24X7 SLA based support services for large centralized IAM capabilities. Support services cover fault and change management, platform management, migration, upgrade, vendor management and policy administration. Additionally, the services cover ongoing small enhancements to the IAM infrastructure, such as the development or modification of connectors and workflows.
atom’s IAM propositions for our customers
Organizations need to simplify application estates through a centralized IAM framework. The framework will simplify user identity lifecycle process, improve user experience through single sign-on, enhance the audit process and facilitate quick application rollouts with lower operational and development costs.
Our Identity and Access Management Services ensure:
• Fully automated user provisioning, thus increasing the employee productivity
• Facilitate seamless access to all applications that improve user experience
• Reduce help-desk support costs and risk of identity theft
• Enhance the ability to comply with corporate security policies and regulation requirements
We have been working as system integration partner/alliance with all IAM product vendors as below
1. Computer Associates – GTM partnership globally
2. Oracle – Platinum partner globally
3. NetIQ – Gold Partnership globally
4. IBM – Alliance globally
Apart from this we have alliance partnership with Microsoft and have also implemented the OpenSource access management platform based on OpenAM (supported by ForgeRock)
We have built a Multi-product IAM lab, Cross Platform CoEs for all the products mentioned above.
Managed Security Services
Organizations are increasingly outsourcing information security operations to telecommunication companies and specialist Managed Security Service Providers (MSSP). Customers require cost-efficient pricing, stringent Service Level Agreement (SLA) based support, 24×7 specialized expertise and support for a heterogeneous product set.
The increasing competitiveness of the MSSP industry, shortage of skilled security analysts and high operational costs have limited the scaling and service expansion plans of most MSSPs. We provide a remote, fully-managed, white-labeled Security Operation Center (SOC) that enables MSSPs to rapidly set up an alternate SOC with reduced operations costs. The SOC will support on-demand scalability, expand the service set and enhance geographic footprint.
Our Managed Security Service assists you to run and globalize a successful MSSP business based on:
Our Managed Security Services offerings include:
A typical remote SOC setup, the connectivity with MSSP SOC and MSSP global customer base
A typical service portfolio and representative technology capability
IT Infrastructure Operation Management
We offer Consultancy, implementation and management for all infrastructure applications, including Enterprise Systems Management and Information Technology Service Management systems. These systems are critical for the day-to-day information technology operations of global customers and we have developed capabilities to support all the leading vendor solutions in this domain including, CA, BMC, HP, IBM and Microsoft.
We strongly believe the future of efficient information technology operations is dependent on a strong service automation platform and the ability to provide customers with an end-to-end service view. We have invested in a Service Automation Platform and a Service Performance Management Platform that enables our customers experience a new level of service efficiency and management.
atom Enterprise Systems Management (ESM) service focus on addressing critical needs of customer enterprise towards implementation and operations of ESM Tools.
atom collaborates with you to create an ESM tools service strategy that will ensure maximum infrastructure availability, data protection, business application performance. It will also provide visibility towards highly available infrastructure & towards increasing the responsiveness for better application performance with real time dashboards and reporting.
atom’s offers Consultancy, implementation and management for all infrastructure applications including Enterprise Systems Management and IT Service Management systems. These systems are critical for the day-to-day IT operations of Enterprise Customers and Atom’s has developed capabilities to support all the leading vendor solutions in this domain including, CA, BMC, HP, IBM and Microsoft.
We strongly believe the future of efficient IT operations is dependent on a strong service automation platform and the ability to provide customers with an end-to-end service view. We have invested in a Service Automation Platform and a Service Performance Management Platform to take our enterprise customers to a new level of service management.
Our services in Enterprise Management include:
Business Issues addressed:
atom recognizes the various potential challenges our customers face in their daily routine of managing complex IT functions to drive their core business services. Atom’s Business Service Management solutions reduces IT complexities, by breaking away technology focused silos to a business driven IT environment that address the challenges like
sIMS- Smart IT Management Services
In this digital era characterized by accelerating changes, enterprises are struggling with the following IT management challenges:
sIMS is a Unified and Flexible IT service and operations management platform, from traditional IT management to Intelligent Management Platform of Things. sIMS is a next generation management platform which:
Solution Benefits
atom Infrastructure Consultancy services helps you develop a roadmap for building a flexible, responsive IT infrastructure aligned with your business goals. We provide comprehensive and lifecycle – oriented IT Infrastructure Consultancy services to meet your unique business requirements leveraging 5IN FRAmework. Our Infrastructure assessment framework addresses optimization and transformation opportunities across your enterprise infrastructure ecosystem to delivers a holistic solution with the following –
5IN FRAmework of Atom’s divides the entire IT Infrastructure into 4 segments and our 5 Consultancy service offerings cover the entire life cycle of infrastructure management. Major Infra Challenges are addressed through this framework;
We offer managed transformation services leveraging platform that has been developed to meet the scalability, complexity and service performance requirements of enterprise IT services .