Hardware Maintenance
Our hardware maintenance service comprises basic installation, contractual maintenance and per-incident repair – both on-site support and at a centralized repair depot.
Hardware support also includes telephone support services for troubleshooting and installation assistance to ensure prompt solution upon customer enquiry.
Software Support
Our software support service consists of general technical support, service resumption and interruption for specific software products; for long-term technical-support contracts, per-incident support services will also be offered. We also provide remote troubleshooting support services, installation assistance and basic usability assistance.
Outsourcing Service
Concerning limited resources in highly reliable and competent I.T. support talent, we provide supporting services and temporary technicians for our customers’ I.T. department to reduce strain on manpower. We are willing to provide coaching course on IT application information to facilitate company’s business development.
Network Health Check
Network Health Check (or Network Wellness Check) identifies anomalies, inefficiencies and irregularities which lead to a less effective network.
We provide an independent health assessment on data network. Through analyzing local and wide area network facilities, which include routers, switches, hubs as well as other network components, our experienced team can pinpoint the source of anomalies impacting both systems and users.
We can identify and resolve the most difficult of problems whether the anomalies are associated with Ethernet, Token Ring, FDDI, ATM, IP, IPX, SNA, Vines or other issues.
Network Design and Infrastructure
We provide preliminary network planning and design service comprised of topological design, network-synthesis and network-realization. No matter adopting a new telecommunication network or service, or upgrading or modifying original network equipment, we customize perfect solution for every customer to fully satisfy his/her requirement.
Wireless Implementation
Our wireless networking solution is designed for families, small and medium enterprises, as well as large corporations. We provide both basic independent wireless receiver and large scale centralized wireless management system, which enables administrators to efficiently manage and execute all wireless devices settings / commands situated at different locations.
Network Cabling
We provide commonly-used CAT5E and CAT6 cables to fiber cables for long distances to cope with the needs of customers. Flexible design and implementation enable different settings of network cables, such as under the platform, inside the wall or above the false ceiling etc. We also provide inter-connect services among office equipment such as networking devices, printers, computer and servers.
IP Phone System
VoIP Phone / IP Phone makes use of IP telecommunication technology for audio phone calls via internet. Except original features from traditional landline phones, IP phone system provides advanced functions for business and centralized management features for administrators to comprehensively control the phone system via network.
A Server Room accommodates all I.T. and telecommunication components like servers, storage, routers, switches, etc., which is essential to every business. No matter it is named as a data centre, a server room or a computer rack, a server room is of utmost importance to every enterprise. Though it’s difficult to design a server room, our strength is to recommend the most appropriate design on cooling, air flow, power protection and distribution and fire protection based on the server room dimension, server equipment and cabinet requirements.
UPS
We offer an extensive range of UPS solutions. Targeting uptime and utter reliability as the most important criteria, we ensure continuity of service for essential applications such as networks, computer centers, intranet and internet servers, and prevent potential surge of business cost due to data loss, equipment damage and communication and internet downtime leaded by power failures, leaks, surges or drops.
CRAC Unit
Server room is always the hub of all I.T. and technical support equipment. To protect both business information and expensive system hardware, proper temperature adjustment in the server room not only able to ensure asset longevity and protection, but also safely prevent from equipment overheating which may lead to fire. A CRAC Unit can monitor and maintain constant temperature, air distribution and humidity in a server room while cool air can be delivered to the servers and exhaust air can be extracted from the server room.
Water Leakage Detection System
Water leakage detection system provides immediate warning alert and specific leakage location for repairmen, to avoid any damages to computers, wiring connections or other sensitive electronics in computer rooms, telecommunications centers and other facilities.
Monitoring System
Environmental factors, for example overheat, humidity, airflow, smoke and electricity, can be devastating to I.T. equipment, and thus to the daily operation of an enterprise. Customers may monitor network closets, server rooms and even enterprise level data centers anytime with fully scalable environmental monitoring solutions. Configured alert notifications through emails, SMS, SNMP or voice call alarms will also be available in case of any emergencies.
Fire Extinguishing System
We offer all-in-one fire protection infrastructure for both large and small server rooms such as FM-200, fire detector and smoke detector. Our fire extinguishing system design service allows selection and optimum adjustment to protected area. We also provide delivery and complete assembly of equipment for fire detection and extinguishing, as well as service and maintenance of the system.
Employees are allowed to use own mobile devices, such as smartphones and tablets, to receive latest corporate information, arrange meetings and handle group messages via Enterprise Messaging System.
Server virtualization shelters user information stored in servers, including number and identity of physical servers, processors and operating systems. Users are able to keep away from those complicated details of server resources, while increasing resource sharing and utilization to reserve capacity for future expansion.
Being a virtual workstation instead of a server, desktop virtualization is virtualized workstation to allow remote access to desktop and start working. Since the workstation requires operations in a data center server, desktop virtualization ensures a more secure and portable access to the workstation. Yet, cautious considerations have to be made upon operation system license and access authorization on various functions.
Network security solution consists of several technologies concerning hardware and software layers to provide corresponding measures and procedures to prevent and monitor unauthorized actions. We provide firewall, antivirus solutions, data leakage protection, VPN protection and point-to-point security to fully protect computers and mobile devices. We also have log system to save all records and fully protect and monitor server’s daily operation.
Firewall
Being the gate keeper of cyber-attack, we provide various world class firewalls, such as Cisco, Sonicwall, Juniper and Fortinet to prevent unwanted access from the public to internal network. Apart from general firewall features, the high-end firewall also comprises UTM feature to provide advanced protection, control internal usage and monitor network user behavior with an aim to control and improve interest usage pattern of internal users. A firewall can also act as a VPN and DHCP server as well.
Anti-virus
We provide all-rounded anti-virus solution with the installation, erection of general anti-virus software and the provision of a centralized management system allowing administrators to manage, install and review the computer status in a simple way. We adopt both hardware and software anti-virus approaches: being the front gate of the whole anti-virus system, hardware firewall is able to block virus from public before entering users’ computers and servers; special anti-virus gateway for email server on the other hand provides advanced functions and settings to intercept infected emails.
Virtual Private Network
Virtual Private Network (VPN) enables users to access company network from a remote location. Users can work freely in public and home by using different VPN connection technology such as SSLVPN and site to site VPN. We also provide double authentication setting and multi-level encryption services to ensure secure connections between users and company VPN gateways.
Intrusion Prevention System
Our Intrusion prevention systems can act as a controlling device to examine internet or user behaviour and to detect and prevent any malicious intrusions. The system makes use of both hardware and software to set up appropriate policies and log records to enhance network security.
Backup
Data protection solution safeguards important information from corruption or loss, including both operational data backup, disaster recovery and business continuity.
Data protection strategy is comprised of data lifecycle management and information lifecycle management. Data lifecycle management automates the movement of critical data to online and offline storage while information lifecycle management is a comprehensive strategy for valuing, cataloging and protecting information assets from application or user errors, malware or virus attacks, mechanical failure or facility outages / disruptions in order to protect all information assets.
Backup Solution
Backup refers to the copying of actual or virtual files or databases to a secondary site for preservation in case of equipment failure or other catastrophes, which is pivotal to a successful disaster recovery.
Data Availability
Data availability is jargon used among computer storage manufacturers and storage service providers, to describe products or services that ensure data continues to work at a required level of performance in situations ranging from normal to disastrous. Data availability generally considers redundancy as an indicator and is closely related to where the data is stored and how it can be reached.
Some service providers believe the market urge for storage-oriented data center, instead of server-focused logical thinking environment.
Redefining Enterprise Storage Maximum Efficiency
Data center and virtualization strategies can achieve faster response time and lower total cost of ownership with special design to cope with customers’ workloads.
From storage, networking, servers to software and beyond, a one-stop technology portfolio encourages effectiveness and flexibility to deliver distinct advantage compared with vendors focusing on any specific aspect.
Satisfy customers’ specific storage needs of our wide range of solutions:
– Modern hardware framework;
– Innovative software tools; and
– End-to-end service.
Storage
Whether our customer needs performance-optimized flash technologies, ultra-dense storage enclosures, traditional or software-defined storage (SDS) solutions, we are confident to recommend the perfect option concerning the requirements.
Traditional Storage
Traditional storage is a major part of disaster management by using LAN/WAN to connect computer and store data in computer itself or in servers. Such data disks can be reformatted in case of emergencies while the number of disks can be increased in order to scale up the storage limit.
Concerning the reach of storage limit, traditional storage requires secondary backup devices and even third party websites to store excess data. Besides, those data are usually stored in multiple locations to avoid complete loss of data in case of any disasters or equipment malfunction.
Software-defined Storage
Software storage customizes the storage limit in accordance with workload.
Many software-defined approaches in the market limit users to proprietary software or any single and compulsory solution for every situation.
Software-defined storage solution truly separates storage software and hardware thus customers can:
– Pick the suitable hardware or software under open approach of industry-standard;
– Add new I.T. capabilities from the latest software or hardware advancements; and
– Reduce risk and time saving with direct contact for services and technology support suppliers.
We have one of the broadest and most advanced storage portfolios and wide-ranging partner ecosystems in the industry. Our diverse selection of software-defined storage solutions provides room for workload-driven configuration and enhance flexibility for future development.