IT infrastructure for a large enterprise. Building IT infrastructure. Organization of work on the implementation of the Concept


Basic concepts
Infrastructura (Lat.infra - below, under and lat.
Structura - Building, Location) -
Complex interrelated service
structures or objects constituting and / or
providing the basis providing
System functioning.
Information technologies (IT, from English.
Information Technology, IT) - wide class
disciplines and areas of activity
referring to management technologies and
data processing, including with
application of computing equipment.
IT \u003d CT.

Basic concepts
IT is a complex of interrelated scientific,
technological, engineering disciplines studying
Methods of effective labor organization of people
engaged in processing and storage of information;
computing equipment and methods of organization and
interactions with people and production
equipment, their practical applications, and
also associated with all this social,
Economic and cultural problems.
IT require complex training, big
Initial costs and high technology equipment. Them
Introduction should begin with creating
mathematical support, formation
Information flows in training systems
specialists. (UNESCO)

Basic concepts
Information Technology Infrastructure (Itinfrastructure) is an organizational and technical
Combining software, computing and
telecommunications, connections between them
and operational personnel providing
Providing information, computational
and telecommunication resources, opportunities and
services to employees (divisions) enterprises
(organizations) necessary for implementation
professional activity and decision
relevant business tasks.
Under the IT infrastructure of the organization
It is understood by the whole set of available in
her services and systems, networks, technical and
software, data,
automated processes.

IT infrastructure elements
-
Servers - computers (workstations);
-
printers and faxes;
-
software;
-
networks for data transmission;
-
telephone exchanges.

Types of IT infrastructure
-
base,
standardized
rational,
dynamic.

Base
- no coordination,
- Manual accompaniment.
- Scattered jobs.
Recommendations:
- construction of server infrastructure;
Introduction of the directory service for authentication;
Services for automatic
updates;
application of antivirus protection;
traffic protection;
Implementation of basic network technology scenarios
(DNS, DHCP).

Standardized
Centralized IT infrastructure management,
the presence of automated basic processes,
Directory service for authentication,
updates are automated,
In the workplace antivirus protection;
Backup System for Critically Important
servers;
central firewall;
Internal DNS, DHCP.
Recommendations:
Update on workplaces for recent versions
operating system (OS) and office application package;
Active application System Management Server;
Application of solutions for centralized backup
copying and recovery after failures;
organization of remote access VPN networks;
Isolation of critical servers through
Applications of the IPsec protocol (for Active Directory / Exchange).

Rational:
Centralized managed and consolidated itefrastructure,
Using catalogs and group policies for
centralized administration;
Automation of control / monitoring of the functioning of software and
hardware;
server monitoring;
Backup and restore for all servers and
workstations;
Remote access (VPN, Remote Desktop);
Isolation of servers using IPsec.
Recommendations:
implementation of identification management automation technologies;
Using System Management Server to manage servers;
verification of compatibility applications;
workstation images management;
Deploying / managing firewalls on workers
places;
Organization of protected wireless network access by service
Internet Authentication Service (IAS) and Active Directory directory service.

Dynamic:
fully automated IT infrastructure,
full provision of user needs in conditions
heterogeneous media;
automatic update management for servers;
Automatic application compatibility testing and
automatic design of workstation images;
Firewater screens - on servers and workplaces;
Wireless connections are protected.
Recommendations:
Solution for automatic distribution of images
servers;
solution to determine the level of load;
Support for quarantine jobs;
monitoring performance of jobs;
Readiness for the transition to the new version of the operating
systems;
Toolkit for an effective transition to new versions
BY;
Isolation of Active Directory domains using IPSec.

The scheme of the IT infrastructure of the enterprise (example_1)

Scheme of IT infrastructure of the enterprise (example_2)
DECT - radio communication
SCS - Structured Cable System
UPS - Uninterruptible Power Source
PBX-Automatic telephone station

Scheme of IT infrastructure of the enterprise (example_3)
ERP - resource planning
Enterprises
MES - Management System
manufacturing processes
Work Flow - Office
Business processes
CRM - control system
relationship with customers
PDM - Management System
Product data
SCM - Management Systems
supply chains
HRM - Personnel Management
Doc's Flow - Office
Documents

Scheme of IT infrastructure of the enterprise (example_4)

Implementation of IT strategy requires ownership of a variety of information
about her. This information is needed to all: the IT director and its subordinates,
leadership of the organization, business executives,
Users, external performers and consultants.
on improprastructure
Document
The audience
Content
IT strategy
- Management companies

- IT specialists
goals and objectives of the IT unit
The principles of its interaction with
Business units, approach to
Company informatization,
The main IT assets, plans
IT infrastructure development
in the medium term,
Budget and Personnel Policy
Corporate
thesaurus
All employees I.
Counterparties
Organizations
Used in the company
Terms (as in the IT region, so
and in affected subject
regions), their sources,
Transfers, examples of use

Composition of technical documentation

Document
Standards
Organizations
In the field of IT.
The audience
- IT specialists
- external
Performers
Content
Rules for maintaining regulatory information,
Data formats, protocols
data exchange
software interfaces
Requirements management
typical technical solutions
programming style,
version control
configuration management
Test order
and testing systems
Requirements
To Documenting

Composition of technical documentation
on IT infrastructure (continued)
Document
The audience
Content
Description
ITF processes,
SLA I.
Regulations
- IT specialists
- Chiefs of business sucks
- Users
IT Divisions Services
and rules for their provision
Business units,
Rules for receiving IT services
Business units
and individual users
Internal processes
and IT subdivision procedures
Scheme
Informatization
Companies
- Management companies
- Chiefs of business sucks
- IT specialists
- External performers
Who and for what uses:
availability of services and systems in
Different units
organizations
automated
and non-automatic sites
Work

Composition of technical documentation
on IT infrastructure (continued)
Document
Scheme
Information
Stream
The audience
- IT specialists
- external
Performers
Mutual scheme
- IT specialists
Dependencies
- external
Services and systems performers
Content
Data receipt points in
Systems, data storage,
exchange of data between
Systems, duplication
data and operations on their
in water
Using services
and data systems
and mechanisms
provided by others
Services and systems,
Critical and non-critical
Dependencies

Information flow diagram (example_1)

Information flow diagram (example_2)

Information flow diagram (example_3)

Information flow diagram (example_4)

Information flow diagram (example_5)

Information flow diagram (example_6)

Task for laboratory work number 5
1. Create an enterprise IT infrastructure schema
2. Develop a scheme of information flows
Enterprises (general and detailed)
3. Design the workplace of the employee

Not every successful manager can give an accurate definition. IT infrastructure. Simplistic speaking, we are talking about a complex of software, hardware and telecommunications resources that are necessary to ensure the functioning of the company and the personnel of the tasks delivered through various applications.

It can be said that the most simple IT infrastructure is at least one PC with the Internet installed and Internet access if it is necessary for the efficient work of the office or company. And now imagine how difficult it is to organize the uninterrupted functioning of a large and extensive company with representative offices not only in city Moscow, but also in other cities.

What is the IT infrastructure?

In modern realities, the success and profitability of the business, the efficiency of the company, its competitive advantages is largely determined by the level of development, stability and security of the IT infrastructure. In essence, this is one of the most important assets of the company. The priority aspect is the conformity of the IT structure needs and the peculiarities of a particular business.

Computer network is a tool that helps companies make money. It must be correctly selected, always in good and updated in a timely manner.

So, for a large retailer in Moscow, the ability to quickly integrate new warehouses and outlets into the system. The banking sector is more to security, protect personal data and information on the movement of financial flows.

Regardless of the specific activities of a particular company, a key task when working with a variety of clients (customers):

  • ensuring the uninterrupted business processes, risk assessment, timely definition and elimination of problems;
  • application of unified solutions for easy business scalability;
  • compliance with the high level of security and protection of key data;
  • the ability to promptly make changes to work;
  • transparency and convenience of the control system;
  • reducing the cost of creating and maintaining assets.

What are the options for creating an IT infrastructure

Among the main scenarios, the creation of IT infrastructure is worth highlighting the following options:

  • creating IT from scratch;
  • modernization of the existing infrastructure to optimize costs, improve safety parameters, risk reduction;
  • implementation of reorganization measures taking into account specific business tasks (introduction of new services for customers, identifying and adding new elements, improved service quality).
Who should build it and why it is so important
Pregnose long-term tasks?

Creating a full and effective infrastructure is a very complex process. It is associated with weighty material costs and requires the involvement of highly qualified and experienced professionals.

That is why the development of the project, its introduction (physical implementation), the choice of computer equipment and software, the creation of executive documentation entrusts a specialized company. Ideally, the company can also deal with.

So that there are no problems in the future, it is important to make information in the most detail about the organizational structure of the enterprise and its needs that occur business processes, development prospects. This will make the supply of resources, correctly distribute and control them.

One of the most common mistakes is the desire to save on costs and creating the most simple IT infrastructure, a violation of the sequence of processes. So, quite often the manager begins the introduction of the system in the company ERP, and only after that finds out that the company's IT infrastructure is categorically not ready for this.

Another bad solution is an attempt to work with server business applications at the entire company level (1C Enterprise and Other), neglecting the creation of a fault tolerant server IT infrastructure and / or the correct backup system.

With the "right" scenario of development, business processes proceed without failures. The problem of equipment failures is solved by either duplication or union of devices in the cluster.

To level software malfunctions and data damage, backup and recovery systems are created. Even at the design stage, it includes the possibility of introducing new users to the system and the implementation of changes in business processes in the shortest possible time. (For example, the quick release of banking products, monitoring prices for competitors and the operational change of price tags).

What do you need to know about IT risks?

Together with the advantages and new features of the IT infrastructure for business - these are certain risks. Under the definition of risks it is customary to be all the negative consequences caused by various threats. First of all, they include viral and hacker attacks, all kinds of theft and / or deliberate damage to equipment or data.

It should be noted that the more perfect IT infrastructure (errors at the design, implementation and maintenance phase) are excluded, the smaller the risks for the business. High-quality design, implementation and maintenance allows you to reduce business risks to almost "0".

SW-CMM - for software products, SE- CMM - for system engineering, Acquisition CMM - for procurement, People CMM - for human resource management, ICMM-for product integration. In 2002, SEI published a new CMMI model (Capability Maturity Model Integration), which unites previously released models and takes into account the requirements of international standards.
  • chaotic;
  • reactive;
  • proactive;
  • service;
  • benefit.

Chaotic The level is characterized by multiple support services, underdeveloped service.

  • commodity (product);
  • uTILITY (resource);
  • partner (partner);
  • enaBler.

In profile commodity. The company considers IT services as its main investments to automate fundamental administrative features with minimal costs. When optimizing IT infrastructure in organizations with such a profile, the focus is on reduction in costs.

For profile utility. Companies initially focused on expenses, but recognizing the importance of building relationships with customers. For these enterprises, IT infrastructure optimization serves as a means of executing service level agreements, reducing the response time, readiness and other parameters related to customer service.

Profile partner It intends to consider the IT infrastructure of the enterprise in terms of influence on the business. Although cost reduction is always relevant, the focus is on obtaining an economic effect on investment in information Technology. In these situations, the business unit together with the IT service work on improving the overall quality of IT service and the achievement of the final goals of activity Enterprises.

In the companies of this profile enabler. IT infrastructure serves as an important element of business development strategy. IT initiatives in them are the main driving force for business development and are considered as the necessary condition of competitiveness.

In Microsoft's methodologies to optimize IT infrastructure, the levels of maturity of the IT infrastructure of enterprises are highlighted. The IT infrastructure maturity model developed by Microsoft includes four levels [6.4]:

  • base;
  • standardized;
  • rationalized;
  • dynamic.

A basic level of The maturity of IT infrastructure is characterized by the presence of a large number of processes performed manually, the minimum control centralization, lack of standards and security policies, backup, system image management. The management of the enterprise and the IP services is poorly focused in the possibilities of the existing IT infrastructure and its potential opportunities to improve business efficiency. At the same time, the cost of management of IT infrastructure is high, just as high risks to ensure the quality of the provision of IT services.

Enterprises with basic level of maturity IT infrastructure can increase business efficiency when switching to a standardized level, by reducing costs by implementing the following directions:

  • development of standards and policies, as well as strategies for their use;
  • reduce security risks due to creating echelonized defense;
  • automation of many manual and long operations;
  • implementing best practices.

Standardized level IT infrastructure maturity implies the introduction of control points based on standards and administration policies of desktop computers and servers, determining the rules for connecting machines to the network, the maturity of the company's IT infrastructure costs for managing desktop computers, servers and network switching equipment are minimized, and support and support processes The provision of IT services begin to play an important role in supporting and expanding business. When providing information security, the focus is on preventive measures, and any threats of safety The company responds quickly and predictable.

The company uses fully automated deployment, with minimal participation of operators. The number of software systems (images) is minimal and management process Desktop computers minimized. The IP service supports the configuration position database in comprehensive information.

Dynamic level The maturity of the IT infrastructure of the enterprise involves an understanding of strategic value for efficient business and receiving competitive advantages. This level assumes that all the expenditures of the UE service are transparent and are under full control, the users are available to the data necessary in their work, it is organized effective joint work At the level of both employees and departments, and mobile users receive almost the same level of service as in offices.

Support and IT services are automated. This is implemented using specialized and built-in software, which allows you to manage information systems in accordance with the changing requirements of the business. Investment B. information Technology give fast and pre-paid returns for business.

For this level of maturity of the IT infrastructure of the enterprise is characteristic effective management Processes to support and provide IT services and constant optimization of service support levels.

Enterprises with dynamic level of maturity IT infrastructure have the opportunity to introduce new IT technologies necessary for progressive business development, the winnings of which significantly outweighs additional expenses.

Introduction

Currently, information technologies are one of the main tools for creating competitive advantages. Information technologies allow for a qualitatively new level to organize such processes such as project management, operating activities management, risk management, sales management, finance management and other business processes.

High-quality, timely and prompt execution of daily business functions by company employees is largely determined by the reliability and functionality of the enterprise systems used, and operating activities depends and fully built on the possibilities of information systems.

The development of information systems, in turn, can be carried out only within the framework of the relevant infrastructure support. This concept includes the entire complex of interrelated systems, equipment and communication channels, combining separately standing software and hardware complexes into a single interaction environment. It is the possibilities of infrastructure support that determine the ability of application information systems to process and transmit the required amount of information on the communication channels, uniting all participants in the unified information and technological space.

At the heart of the uninterrupted operation and development of existing corporate information systems, as well as for testing and implementing new business applications in accordance with development plans, a reliable, modern, adaptive, flexible, functional IT infrastructure should lie.

At the heart of the development of information systems of any organization, first of all, the needs of the business are. Business requirements are used in analyzing the information systems market and choosing the most suitable solutions.

1. Strategic goals of business development companies

There is no strategy, one for all companies, just as there is no single universal strategic management. Each company is unique in its kind, therefore the strategy generated by each individual is unique, as it depends on the position of the company in the market, the dynamics of its development, its potential, the behavior of competitors, the characteristics of the product produced by it or the services provided, the state of the economy, cultural environment And many more factors. And at the same time, there are some fundamental moments that allow us to talk about the generalized principles of strategies for the behavior and implementation of strategic management. As a rule, the main strategic goal of a commercial organization is to ensure profitability and growth in business capitalization.

2. Objectives of informatization strategy

The relationship of the strategic goals and objectives of the company and informatization strategies can be expressed as follows:

  • A business strategy determines the directions of development of the main area of \u200b\u200bthe company's activities and the causes of movement in this direction;
  • Informatization strategy identifies those information technologies that are required to support and optimize a business strategy and shows how these technologies and systems can be implemented in the company.

Thus, the informatization strategy is intended to determine a set of priority initiatives in the field of information technology, which will consistently and coordinated to develop the company's information and technological complex, with the participation of all units based on uniform requirements to achieve the company's strategic goals.

3. Analysis and evaluation of the current state of the company's IT

Objectives and tasks of diagnostics of the current state of IT

The purpose of the diagnostics is to determine the current state of IT for its further development in accordance with the IT strategy developed.

For diagnostics, the following main tasks must be performed:
Diagnostics of IT services of basic, functional business processes and management tools;
IT infrastructure analysis;
Characteristics of information security;
Characteristic of organizational support of information technologies;
Typology and characteristics of the cost of IT;

4. Formation of IT Development Concept

Basic principles of IT development

The development of information technology companies should rely on the following principles:

  • The development of information technologies should be in line with the company's strategic development, and the information technologies themselves are a strategic component of the company's business architecture;
  • In the architecture of information technology, both the structure of the Company's activities and the content of the key business processes of this activity must be enshrined and maintained.
  • Satisfying priority business tasks: cost reduction, improvement of the company's handling, financial transparency, single information space.
  • IT investment protection: the introduction of systems, the least affected by the risk of business strategy;
  • Comprehensive solution: Investments in IT should go to the creation of a "holistic asset".
  • Balance between current and strategic tasks: The implementation of long-term IT projects should not lead to blocking the current operation of functional units.

The real return on the company's automation can be obtained only by optimizing managerial processes in the company, management of operational processes and management of financial funds. Consequently, the development of IT companies should go on four main areas:

  • Consistent automation of all operating processes ensuring an increase in the cost reduction and improved key indicators of the company's business units;
  • Development of a corporate information system based on integrated solutions and effective procedures for collecting, processing and providing information;
  • Creation of information technology infrastructure satisfying modern requirements for reliability and safety;
  • Improving the efficiency of users and IT block staff.

5. Approach to the implementation of the concept of IT development

Projects Implementation of the IT Development Concept

The volume and deadlines for the implementation of projects are determined by the results of the assessment of the current state of the company's IT provision, a detailed analysis of the results and determining the direction of development of the company. The project implementation program begins with the implementation of a complex of work on preparing for implementation and detailed planning of work on individual tasks of automation of business functions as part of the IT development strategy.

6. Organization of work on the implementation of the Concept

Roles and functions of IT units

In the organizational structure of the Department of IT, units are allocated for the development of IT - this is the IT project management department.
The activity of this unit is based on a project basis. The boss of this department forms the required number of project teams (by the number of projects in their direction), in which specialists are collected by the relevant specialization. At the same time, project teams can be formed from specialists who are in administrative subordination from other branch offices depending on the specifics of each specific project.

Basic principles of management and control in the implementation of the concept

The implementation of the IT strategy implementation process and the monitoring and the results of each project are based on the following principles:
The objectives of the projects should be installed on the basis of S.L.R.T. technique.
The IT service must exist a group of specialists - auditors of projects.
Each project should have a quality controller.
The company should be clearly defined and approved the principles of project risk management.
The company should approve of uniform indicators of project processes.
The motivation of the project participants must be associated with the result of the project.
The procedure for monitoring the project on its completion is obligatory.
A single frequency of control processes must be installed.
After each project, internal "Project Lessons" should be formed.

Conclusion

The primary task facing any IT manager is to ensure the compliance of the IT infrastructure and information systems of the enterprise's requirements. The development of information technologies requires significant investments, which is why the most important for the IT department manager has a qualitative analysis of the needs of the business to select the information systems relevant to these needs.

The concept of the development of the IT infrastructure determines the rules for building the company's IT infrastructure, the main architectural solutions and standards, the infrastructure management model and the requirements for management processes. The concept of transition from the existing state of the IT infrastructure of the enterprise to the target is also determined by the concept.

When developing a concept, an analysis of the current state of IT support of the Company, which includes an assessment of the existing IT infrastructure, the level of information security, organizational support. After the analysis, various development options are estimated, the development of IT development is determined in the company, the target architecture of IT is being developed, the requirements for infrastructure services. Based on the data obtained, the level of compliance of the current state of the IT target is determined and the steps of achieving the required level are generated, the selection of software and hardware solutions. Preparation and implementation of selected solutions are made on a project basis.

Bibliography

1. Gurkov I.B. Strategy and structure of the Corporation, Moscow, 2008, 288 p.
2. Mikhailov A. "Strategic planning for the development of the information support system". Moscow, 2001, 134 p.
3. Danilin A. Slyusarenko. Architecture and strategy. "Yin" and "Yan" information technologies of the enterprise, Moscow 2005, 504 p.
4. White T. What does business want from IT. Minsk, 2007, 256 p.
5. Ermoshkin N., Tarasov A. Strategy of information technology enterprise. As Cisco Systems and leading world companies use Internet business solutions. Moscow, 2003, 360 c.
6. Marasco D. IT projects: front essays. Moscow, 2007, 384 p.
7. Sacacker S. Office IT project, or how to become a full CIO. Moscow, 2009, 616 p.
8. Thompson A, Strickland A. Strategic management. Moscow, 2000, 412 p.
9. Rumyantsev M. IT strategy: What is mine in the name. Moscow, CIO Magazine No. 9, 2002. [Electronic document] URL: http://www.cio-world.ru/offline/2002/8/22012/ Date of treatment 01/12/2009.
10. Mikhailov A. Consolidation of Holding IT resources. Moscow, CIO Magazine No. 5, 2003. [Electronic document] URL: http://www.cio-world.ru/offline/2003/15/26749/index.html. Date of handling 01/12/2009.
11. Mikhailov A. Seven approaches to the development of IT strategies. Moscow, Journal "Information Service" No. 02, 2004. [Electronic document] URL: http://www.info-strategy.ru/publications/it-strategy-2003/index.htm. Date of handling 01/12/2009.
12. Nekrasova E. Strategic document. Moscow, CIO Magazine No. 3, 2003. [Electronic Document] URL: http://www.cio-world.ru/nalytics/comments/25096/. Date of handling 01/12/2009.
13. Nekrasova E. Our slogan - "not IT for IT, and IT for business." Moscow, Magazine CIO №8, 2003. [Electronic document] URL: http://www.cio-world.ru/casestudy/28817/. Date of handling 01/12/2009.
14. Erkol E. CIO tasks are complicated. CNews | Analytics, 2003. [Electronic document] URL: http://www.cnews.ru/reviews/index.shtml?2003/05/29/144700. Date of handling 01/12/2009.
15. Rumyantsev M. Start from scratch. Moscow, CIO №11, 2003. [Electronic document] URL: http://www.cio-world.ru/offline/2002/10/23168/ Date of treatment 01/12/2009.

Copyright © 2010 Shhatsev A.O.

IT infrastructure is a complex of interrelated information systems and services that ensure the functioning and development of the information interaction of the enterprise.

IT infrastructure is not just a foundation for the existence of any modern company, IT is currently becoming a strategic asset that is the driving force of the business. Building a reliable IT infrastructure that satisfies the company's business processes is a difficult task, practically not solved by the company's own IT department. The most important thing is that the IT infrastructure must meet the needs of the company's business. In order to organize a truly reliable, high-performance and scalable IT infrastructure, you need to have a large number of highly qualified specialists, as well as considerable experience in building IT infrastructures.

Corporate information system (KIS) is an integral part of the IT infrastructure, which includes information centers, databases, communication systems and collaboration. When building a corporate information system (KIS), a number of important factors must be taken into account. For example, a common mistake of many companies is that the ERP system is introduced first, and then the company turn out to be the fact that the infrastructure is not ready for servicing this system. IT infrastructure is the core of all other information systems or business applications. And it is from how the IT infrastructure is built, as far as it is reliable and manufactured, the work of all other applications, ERP systems, databases, and as a result, and business in general are also.

Simplified corporate information system scheme (KIS)

Stages of creating an IT infrastructure of the company:

Development and approval of the technical task. The technical task (TK) is a document that includes all customer requirements to the information system being created.

    Project development. After approval of the technical task, a work project is being developed - a document containing a technical description of the implementation of the requirements specified in the technical task.

    Implementation. At the implementation phase, the physical implementation of the developed project occurs.

    Creating executive documentation. The final stage of creating an IT infrastructure is the creation of executive documentation. Executive documentation contains a detailed description of the IT infrastructure required to use and maintain the created corporate information system.

At the implementation stage of the IT infrastructure of the company, Lanci manufactures:

  • Creating engineering systems and SCS (structured cable system). SCS is a combination of low-current and power (electrical) networks. As part of the creation of engineering systems, the installation of cable tracks is made, installing sockets, crossbar crossing, wiring and connecting electrical networks, server room equipment, creation of ventilation and air conditioning systems, installation of central uninterrupted power systems (UPS).
  • Creating a network infrastructure. An active network equipment is set to create Wi-Fi wireless networks. For large rooms and buildings Wi-Fi networks are built based on Cisco or 3com WLAN controllers, which provide customer roaming and managing access points. In small rooms, Wi-Fi network is based on WDS technology.
  • Installing PBX (Automatic Telephone Station). Installation and configuration of the PBX, programming the logic of work, connection of urban telephone networks or service providers IP telephony is being connected.
  • Supply of equipment and software. In accordance with the work project, the equipment and software is delivered.
  • Installing server equipment. Installing and connecting server equipment, data storage systems, backup systems, start-up-setup works are performed.
  • Implementing server virtualization systems. Server virtualization implies simultaneous operation on one physical server of several virtual machines. Virtualization can significantly reduce the cost of equipment and software, simplify the information system, increase the flexibility and reliability of IT infrastructure, reduce electricity costs and maintenance. As virtualization systems, we are implemented by Microsoft Hyper-V and.
  • The implementation of the main network services based on the TCP / IP protocol. The DHCP, DNS, WINS services are installed. DHCP (Dynamic Host Configuration Protocol) is a protocol that allows you to automatically customize the network parameters of all devices connected to the network, assign an IP address, mask, gateway, DNS, etc. DNS (DOMAIN NAME SYSTEM) - server providing resolution of domain names in the organization. WINS (Windows Internet Name Service) - NetBIOS permissions server of computers.
  • Implementing Windows Domain and Active Directory directory service. The Active Directory directory service is the core of the information system. It provides storage and management of information about all users and devices. Active Directory is a single point of authentication and authorization of users and applications across the enterprise. The domain structure is based on business needs, security policy requirements planned for the introduction of applications, the number of departments and subsidiaries and many other things. Site structure creates, replication mechanisms are configured depending on the geographical location of the company's offices. In accordance with the administrative requirements, the structure of organizational units is built, users are combined into domain groups based on affiliation to one or another department of the company, etc. For all users and computers, group policies are assigned, with which the security policy is distributed, assigning printers, installation of applications, etc. Deploying the directory service is based on the Windows Server 2008 R2 operating system.
  • Deploy file servers. File servers provide storing of general documents of the company and provide access to all enterprise users. The tree structure of the folders is created, each of which meets certain departments of the company, and has unique permissions. Based on domain groups, it is delimited by access to folders. Access to Windows-based file servers is provided by SMB (CIFS) protocol. Deploying file servers is performed on the basis of Windows Server 2003 R2 or Windows Server 2008 operating systems.
  • Implement print servers. The print server provides management of all printers of the organization, and also provide access to printer to the company's users. Printers are grouped by departments, by placement, are grouped into the Pools for accessories to ensure the load distribution. Print server storage and management of print queues. Improving the print servers is based on Windows Server 2003 R2 or Windows Server 2008 operating systems.
  • Implementing database management systems (DBMS). DBMS provide storage, access and management of application databases. The main products in the market of database management systems are Microsoft SQL Server and Oracle. For applications such as 1C Enterprise, Microsoft Dynamics, Microsoft CRM implements SQL Server, optimization and configuration, taking into account the characteristics of a particular application. Taking into account the needs of the business, the replication of data between servers in the company's branches is adjusted accordingly.
  • Implement management servers and protect Internet traffic. Server data Provide corporate network protection from Internet attacks, ensure control and control of Internet access controls, provide access to the internal network resources through the Internet. Microsoft Forefront Threat Management Gateway (TMG) is being implemented as the main solution to protect and manage Internet traffic (in the past ISA Server). TMG, being the best application level firewall, provides the maximum level of protection of corporate resources. The access rules for user groups are configured, permitted and prohibited protocols (ICQ, POP3, FTP, etc.) are assigned (ICQ, POP3, FTP, etc.), certain sites are allowed or prohibited. Site-to-site VPN canals with remote offices and branches of the company are configured. For small business companies, alternative solutions are introduced, such as Kerio Winroute Firewall, Linux / FreeBSD and SQUID or SOHO class routers based on Cisco, 3Com, Dlink, Linksys, and so on.
  • Implement mail servers. Microsoft Exchange Server 2010 is being implemented as a basic solution for organizing email messaging on the enterprise. Exchange Server is a leader among corporate postal systems, in addition to wide mail options, Microsoft Exchange Server provides a set of collaboration tools such as: calendars, Contacts, tasks, diaries, address books and shared folders. Exchange Structure The server is constructed with the topology of sites and the hierarchy of domains. Settings are made anti-spam filters and mobile access capabilities. The Exchange Server service is secure on ISA Server, services: SMTP, OWA, ActiveSync, IMAP4, POP3 (depending on customer requirements). Additional anti-virus and anti-spam solutions such as GFI MailSecurity and MailSesentials, Kaspersky, Microsoft Forefront are installed. For small businesses, we offer Exchange 2013 cloud service.
  • Implementation of combined communications. The use of united communications expands the possibility of communication between employees of the company, providing users with the ability to share text messages, audio engines, video calls, audio conferences, and video conferencing. United communications make it possible to save significant funds by replacing the need for moving and business trips to the possibility of conducting web conferences, online seminars, savings on long-distance telephone communication. We offer leading market leaders solutions - Microsoft Lync Server 2013, and Cisco CallManager.
  • Implement terminal servers. Terminal servers provide remote access to the server's desktop, or to a specific application. In fact, the image from the server is transmitted to the user's computer screen, and the keys on the keyboard and the mouse module produced by the user are passed to the server. Scenarios for using terminal servers can be different: access to the desktop via the Internet, work with resource-intensive applications installed on the server, remote work with business applications. Often some of the company's departments use only terminal access for their daily work with thin customers. Installing and configuring terminals servers is made, the necessary business applications are deployed on them, access rights are assigned. Microsoft Terminal Server and Citrix are used as terminals servers.
  • Implementing backup servers. Backup Servers Provide the protection of the entire electronic information of the enterprise. The main backup solutions are Symantec Backup Exec and Microsoft SystemCenter Data Protection Manager. To back up virtual machines, we offer deployment of Veeam Backup & Replication. The backup servers are installed, and configure network storage, disk arrays and tape libraries. Installing backup agents to all reserved servers (domain controllers, file servers, server SQL, Exchange, etc.). Setting up schedules and backup methods to comply with backup policies. Testing backup and data recovery mechanisms are tested.
  • Implementation of anti-virus protection servers. Anti-virus protection servers provide deployment, control and update of antivirus software on the scale of the enterprise. Installation of anti-virus protection servers, deploying anti-virus protection agents, configure the rules of action when viruses are detected, the updates of antivirus signatures are configured. The main antivirus products are Kaspersky, Symantec, ESET NOD32 and Microsoft Forefront.
  • Installing client jobs. Installation and configuration of workstations, laptops, telephones and other equipment with which users will work are made. Installing all necessary applications is made, computers are inserted into the domain and setting up a user environment.
  • Installation of peripheral equipment. Installation, connection, and configuration of printers, copier, scanners, multifunctional devices, etc. The network settings of devices are configured, printers are installed on print servers, scanners and faxes are configured to store copies on file or mail servers. Installed monitoring and peripheral controls.

Advantages of working with Lanka Company:

    IT infrastructure is created in the complex and turnkey. Lanci, one of the few, performs all the work independently from the beginning to the end, from the installation of SCS and deploying clusters before connecting the mouse to the secretary's computer and the iPhone configuration to synchronize with Exchange at the director. All works are manufactured within one project, at the end of which the Customer receives a fully finished and functioning IT infrastructure. The customer will not have to control the execution of works with a one or another contractor and resolve conflicts between them. The customer will not be in the situation when something does not work, and the contractors will blame the blame on each other, refusing to solve the problem.

    Works are performed by professionals. All work perform certified engineers with extensive experience in implementing in large projects. Lanci's Microsoft Certified Engineers (McITP), GFI, Kaspersky, Symantec, Cisco, 3Com, Allied Telesis, D-Link, Panasonic, APC, EUROLAN NEXANS, Exalan +, Belconn, Molex are operating in the company. All work is made in accordance with state and world standards (GOST / ISO). The execution of all works are licenses and certificates.

    The highest level of quality and reliability. Lanci offers high-quality and proven solutions based on equipment and software leading manufacturers. Lanci is a partner of HP, Dell, IBM, Intel. Lanci is a gold partner of Microsoft.

    Further support of IT infrastructure. Lanka is always ready to ensure further support and development of the IT infrastructure created. The customer will not have to recruit a large number of highly paid specialists, the customer will not have to look for a company that provides IT outsourcing services that can serve the information system at the proper level. No one better than us to cope with this task.


Lanci has been engaged in building corporate information systems for several years. During this time, the specialists of our organization have created IT infrastructure of various complexities in many companies and enterprises, in various sectoral sectors of the market. Lanci offers solutions for both large and small and medium businesses, as well as for state enterprises. In addition, we offer a full range of services in the following areas:

  • IT Consulting
  • Comprehensive audit of information systems
  • Audit of information security
  • IT outsourcing services
  • Comprehensive services for building data centers
  • Cloud services. Rent virtual servers. Hosting Exchange, Microsoft Lync in the cloud.

Lanci company is leading equipment and software suppliers .