Projects

VMware and Cloud

VMware vSphere Virtual Infrastructure Design and Deploy

VMware vSphere Infrastructure Design and Deploy

Gallahad’s vSphere Virtualization Design and Deploy helps design and deploy a virtualization solution using vSphere according to a documented architecture that is implemented and validated.

Virtual Infrastructure Overview – Extend the benefits of existing deployment to other areas of the organization; Obtain cost savings and management improvements to reduce costs; Implement and validate a new virtualization instance.

Typical Outcomes – Optimize VMware technology for maximum business impact; Accelerate time to production; and Reduce potential for support issues.

Why Client’s Choose Us – Need a proven methodology; Ensure that the Virtual Infrastructure meets Business Requirements; Mission critical project cannot afford a mistake; Require an efficient  deployment; Flexibility of delivery components

Project Steps – Planning and Kickoff; Server Capacity Analysis (Optional); Overview – Assess & Design; Deploy & Validate; Knowledge Transfer & Conclusion

VMware Disaster Recovery/Data Protection Design and Deploy

VMware Site Recovery Manager Design and DeployGallahad’s BCDR Design and Deploy will bring your IT Business Continuity policy to life. High Availability, Data Protection, and Disaster Recovery solutions will ensure that your company’s business requirements will be met and provide the confidence to execute when required.

BCDR Overview – Find optimal balance between recovery costs, time, capabilities, and complexity; Automate and simplify your IT disaster response management; Improve BCDR management resourcing, and better align costs to risk levels.

Typical Outcomes – Optimize VMware technology for maximum business impact; Accelerate time to production; and Reduce potential for support issues.

Why Client’s Choose Us – Need a proven methodology; Mission critical project cannot afford a mistake; Training is essential for self sufficiency; Require an efficient deployment; Flexibility of delivery components

Project Steps – Planning and Kickoff; Assess & Design, Deploy & Validate; Knowledge Transfer & Conclusion

Cloud Connections

VMware Hybrid Cloud Design and DeployGallahad’s Cloud Connections Design and Deploy enables the hybrid cloud to make it possible for you to seamlessly extend your data center to the public cloud leveraging the same infrastructure, same network, and same management and skills that you use today. They enable you to deploy and run your applications onsite, offsite, or both without compromise, making it unnecessary to change APIs, rewrite applications, or be susceptible to vendor lock-in. VMware vCloud Air or via other third party Cloud Provider.

Five Cloud Connections Best Use Cases – Disaster Recovery; Extend Existing Applications; Development and Testing; Web and Mobile Apps; Cloud Hosted Desktops.

Typical Outcomes – Optimize VMware technology for maximum business impact; Accelerate time to production; and Reduce potential for support issues.

Why Client’s Choose Us – Need a proven methodology; Ensure that the Virtual Infrastructure meets Business Requirements; Require an efficient deployment; Flexibility of delivery components

Project Steps – Planning and Kickoff; Overview – Assess & Design; Deploy & Validate; Knowledge Transfer & Conclusion

Security Offerings

Security Policy

Security PolicyGallahad’s Security Policy document enables the business to make decisions from a business perspective based on business risk and perceived threat landscape and allows the business to direct the technical decisions in the process.  This should be your first step for security defence to provide accountability to business owners or shareholders.  A firewall policy is a document that should be created prior to the installation and configuration of a new firewall to allow the business to control the amount of risk they are willing to accept versus productivity requirements  in contrast to allowing the technical resource installing the device to make all those decisions for the business.  This type of policy provides a bridge between the business and the technology.

Is it a Policy, a Standard or a Guideline?

What’s in a name? We frequently hear people use the names “policy”, “standard”, and “guideline” to refer to documents that fall within the policy infrastructure.

A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area. For example, an “Acceptable Use” policy would cover the rules and regulations for appropriate use of the computing facilities.

A standard is typically a collection of system-specific or procedural-specific requirements that must be met by everyone. For example, you might have a standard that describes how to harden a server for placement on an external (DMZ) network. People must follow this standard exactly if they wish to install the server on an external network segment.  In addition, a standard can be a technology selection or preference.

A guideline is typically a collection of system specific or procedural specific “suggestions” for best practice.  They are not requirements to be met, but are strongly recommended.  Effective security policies make frequent references to standards and guidelines that exist within an organization.

Typical Outcomes – Business stakeholders are consulted by our technical specialists to allow alignment of business requirements and technology decisions.

Why Client’s Choose Us – Need a proven methodology; Ensure that the policy gets completed and that it meets Business Requirements; We are the technology partner configuring their security appliances.

Project Steps – Planning and Kickoff; Overview – Consult and Draft; Finalize & Review; Conclusion

Firewall Installation and Configuration

Firewall-Network-Infrastructure-Installation-ConfigurationGallahad’s Next Generation Firewall Installation and Configuration service blends defense preference with performance.   We acknowledge the importance of liaising with networking; security, business, IT, management and all layers to provide a smooth experience and a solution that meets all expectations.  Gallahad also believes that documentation will assist your staff to take over the day-to-day management of the solutions.

Typical Outcomes – Business stakeholders are satisfied with the level of security and the users are very happy with the network speed.

Why Client’s Choose Us – Recommendations on proven security solutions; Certified experts to install your equipment; Gallahad strikes a custom balance between defense and performance.

Project Steps – Planning and Kickoff; Discovery and Design; Installation and Configuration; Conclusion