Capability Statement



Similar documents
Technology. Accenture Data Center Services

MANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING. CAPABILITY briefing

Innovation through Outsourcing

At the Heart of Connected Manufacturing

Accelerate Your Enterprise Private Cloud Initiative

Optimizing the Data Center for Today s Federal Government

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Securing the Microsoft Cloud

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Cisco Security Optimization Service

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

IBM Enterprise Content Management Product Strategy

Your Infrastructure. Our Responsibility.

Simplify Your Windows Server Migration

A Corporate Profile.

Business Intelligence

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

Information Security Management System for Microsoft s Cloud Infrastructure

Application Services Portfolio

Maximize potential with services Efficient managed reconciliation service

Data Center Solutions

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Achieve full value from your applications. Avanade Application Development Solutions

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Achieving Business Agility Through An Agile Data Center

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

WHITE PAPER. Building Blocks of the Modern Data Center

Transform your customer relationships. Avanade Enterprise CRM Solutions

Overview. FedRAMP CONOPS

Optimizing the Data Center for Today s State & Local Government

How To Protect Your Network From Attack From A Network Security Threat

AL RAFEE ENTERPRISES Solutions & Expertise.

IT-CNP, Inc. Capability Statement

Optimizing Application Management Outsourcing:

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance

White Paper: AlfaPeople ITSM This whitepaper discusses how ITIL 3.0 can benefit your business.

Physical Infrastructure Management Solutions

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

VMware Hybrid Cloud. Accelerate Your Time to Value

Reduce your data storage footprint and tame the information explosion

Cloud Computing in Banking

How to bridge the gap between business, IT and networks

POINT OF VIEW. The Critical Role of Networking in Enterprise Resource Planning. Introduction

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Designing and Implementing IT Infrastructure Standardization for a Large Energy Company

Strategies for assessing cloud security

Smart Data Center Solutions

Cisco Network Optimization Service

Health Care Solutions

CONSULTING SERVICES Managed IT services

Campus IT Strategic Plan

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

EMC IT S JOURNEY TO THE PRIVATE CLOUD: APPLICATIONS AND CLOUD EXPERIENCE

BUYER S GUIDE. flexible service delivery. Top 5 reasons for adopting SAP Managed Services. Remixing SLA s! Managing the post merger IT landscape

Contents. Introduction... 1

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

Remote Management Services Portfolio Overview

_experience the commitment TM. Seek service, not just servers

Technology Insight Series

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Fujitsu Managed Hosting Delivers your Cloud Infrastructure as a Service environment with confidence

Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to:

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Cisco Cloud Enablement Services for Education

Why a Server Infrastructure Refresh Now and Why Dell?

Knowledge Base Data Warehouse Methodology

Simply Sophisticated. Information Security and Compliance

Avanade Point of View. Getting it right with a project and portfolio management solution

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Sonata Managed Application Lifecycle Services

Simply deliver IT to increase Revenue improve Productivity and cut Cost

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

The IBM Cognos Platform

Technology. Accenture Infrastructure Outsourcing Services

INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES

Business Usage Monitoring for Teradata

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Software Defined Hybrid IT. Execute your 2020 plan

A new Breed of Managed Hosting for the Cloud Computing Age. A Neovise Vendor White Paper, Prepared for SoftLayer

Transform your customer relationships. Avanade Customer Relationship Management Services

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization

Successfully Deploying Globalized Applications Requires Application Delivery Controllers

Industry models for insurance. The IBM Insurance Application Architecture: A blueprint for success

Qlik UKI Consulting Services Catalogue

How To Consolidate A Data Center

Establishing a Private Cloud

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Driving Business Value. A closer look at ERP consolidations and upgrades

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL

2015 Strategic Business Plan Franklin County Data Center Ishreth Sameem, CIO

Transform your Business with VMware

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind

Application Outsourcing: The management challenge

HP Security Solutions for Microsoft

Transcription:

Capability Statement

Introduction Corporation, a CMMI Level II, SBA 8(a) Certified firm has achieved its fame in the Federal Agencies as agile, robust, efficient and cost effective small business. has been awarded by Inc.500 as one of the fastest growing firm in last few years. Since its inception in 1999, has been a trusted partner to its customers in achieving their mission successfully. With our years of experience in Building, Securing and Managing IT infrastructure has contributed significantly to its customer in strategic thought processes to define an IT road map to achieve their vision. By helping our customers keep their vision ahead of the technology curve but at the same time addressing their day to day technology challenges, has helped us cultivate a partnership that perfectly aligns to achieve similar goals. Our Mission Your mission is our mission. We always strive to achieve the ultimate vision that our customers possess for their organization. aims to be The First Choice Technology Partner to agencies across the board and corporations at large. Core Values Whenever we engage any customer our goal is to maximize the performance and lifetime value of complex assets and closely align them with our customer s overall business strategy. The fundamental of our engagements are: Decrease costs and risk Increase productivity Improve asset-related decision making Increase asset service delivery responsiveness and revenue Improve return on assets Facilitate regulatory compliance efforts Contract Vehicles SBA certified 8(A) SBA Certified Small Disadvantaged Business GSA Schedule 70 GS 35F 0059S Seaport e Contract No. N00178-11-D-6517 GSA 8(a) Stars GS 06F 0931Z Constellation/ Functional Area Awards: CIFA2, CIFA3, CIFA4 TIPPS 4 Customers Department of Labor Office of Inspector General Mine Safety and Health Administration Employment and Training Administration Job Corps Department of Homeland Security Office of Inspector General Customs and Border Protection United States Department of Agriculture Food Safety and Inspection Svs. CBSD United States Department of Interior Bureau of Indian Affairs Nuclear Regulatory Commission Division of Construction United States Department of Energy National Energy Technology Lab

Past Performance Past Performances Summary U.S. Department of Labor Mine Safety and Health Administration IT Support Services (2007 Present) Agile SLA Driven Methodology (mapped with the SDLC) Magic Service Desk Enterprise Suite Build IT Enterprise Application Development System Integration Network Design & Management IT Modernization Infrastructure Management U.S. Department of Labor Office of the Inspector General Certification & Accreditation (2008) Certification & Accreditation (2011) NIST FISMA Risk Framework CSAM Secure IT Cyber Security Assessment (C&A) including: - Risk Assessment & Analysis - System Security Plan - Security Control Assessment (SCT&E) U.S. Department of Interior Bureau of Indian Affairs U.S. Department of Labor Mine Safety and Health Administration Certification & Accreditation (2006-2009) NIST FISMA Risk Framework CSAM Information Security Office Support (2004- Present) NIST FISMA Risk Framework CSAM OMB OIG Audit Guidelines Manage IT Service/ Helpdesk Management System Administration Database Management Task Order Management Change & Configuration Management Build IT Cyber Security Assessment (C&A) including: - Risk Assessment & Analysis - System Security Plan - Security Control Assessment (SCT&E) Cyber Security Management & Support Build IT Enterprise Architecture Design Manage IT Incident Response management Program Management Secure IT Cyber Security Planning & Assessment Cyber Security Management & Support Committee for the purchase from the people who are Blind or Severely Disabled (CBSD) U.S. Department of Labor Mine Safety and Health Administration U.S. Department of Agriculture Food Safety and Inspection Services Information Technology Support Services (2008 - Present) Magic Service Desk Enterprise Suite LANDesk Management Suite CMMI ITIL Configuration Management Assessment (CMA) Microsoft Solution Framework LAN/WAN Management (2008 Present) Symantec Network Access Control Cisco Network Components Certification & Accreditation ( 2009 Present ) NIST FISMA Risk Framework Build IT System Integration/ Migration Network Design & Management IT Modernization Manage IT Service/ Helpdesk Management System Administration Program management Change & Configuration Management Infrastructure Management Build IT Network Design & Management Manage IT Service/ Helpdesk Management System Administration Program management Secure IT Cyber Security Assessment (C&A) including: - Risk Assessment & Analysis - System Security Plan - Security Control Assessment (SCT&E) Cyber Security Management & Support 4 5

Past Performance U.S. Department of Labor Employment and Training Administration Certification & Accreditation FLC (2010-2011) NIST FISMA Risk Framework CSAM Secure IT Cyber Security Assessment (C&A) including: - Risk Assessment & Analysis - System Security Plan - Security Control Assessment (SCT&E) Cyber Security Management & Support U.S. Department of Labor Office of the Inspector General Certification & Accreditation FLC (2011) NIST FISMA Risk Framework CSAM Secure IT Cyber Security Assessment (C&A) including: - Risk Assessment & Analysis - System Security Plan - Security Control Assessment (SCT&E) Cyber Security Management & Support U.S. Department of Labor Office of the Inspector General U.S. Department of Homeland Security Office of the Inspector General Database Migration ( 2010 Present) Oracle 11g Sun Servers Help Desk and Client Support Services (2010- Present) Heat Ticketing System 3 Tier Helpdesk Structure Technology Control and Maintenance Process (TCMP) IEEE and SEI-CMM Build IT Database Migration, Design & Management Manage IT Project Management Enterprise Content Management Risk Management Build IT System Integration/ Migration Network Design & Management IT Modernization Manage IT Service/ Helpdesk Management System Administration Program management Change & Configuration Management Infrastructure Management Secure IT Cyber Security Management & Support U.S. Department of Homeland Security Customs & Border Protection Nuclear Regulatory Commission Data Center Relocation Planning (2011- Present) Magic Service Desk Enterprise Suite LANDesk Management Suite CMMI ITIL Configuration Management Assessment (CMA) Microsoft Solution Framework Construction Oversight Program Support (2011 - Present) Microsoft Project Server 2007 Build IT Enterprise Architecture and Data Management Data Center Design/ Consolidation Manage IT Project Management Enterprise Content Management Risk Management Secure IT Independent Verification & Validation (IV&V) Build IT Enterprise Architecture and Data Management System Integration Manage IT Program/ Project Management 6 7

Build IT Table of Contents Enterprise Application Development Page 10 Enterprise Architecture and Data Management Page 12 Enterprise Resource Planning / Customer Relationship Management Page 13 Network Design and Management Page 14 Systems Integration Page 15 Datacenter Design/Consolidation Page 16 IT Modernization Page 18 9

Build IT Enterprise Application Development Applications are the lifeline of any business relying on IT solutions. They have evolved significantly over the past two decades from simple mail and 2-tier client-server applications to complex heterogeneous custom systems. Today, Applications not only support underlying business processes and back-end operations, but also drive customer-facing business opportunities. As such, CIOs are measuring the success of technology investments in terms of business outcomes-profitability, risk, growth, and cost. However with great leaps in advancement, today the challenges are even more pronounced. Point and near-term solutions fall short of meeting these challenges in growing business needs and managing applications from the beginning to end. This results in business risks, loss of business opportunities, and higher maintenance costs. IT organizations struggle due to lack of disciplined processes and technology-oriented approaches, thereby putting the business at risk. We have found that well documented and executed development processes and tools can help mitigate these risks. With an ever-increasing number of packaged applications, off-the-shelf products, and development frameworks, selecting the right technologies to architect solutions becomes increasingly challenging. Each vendor aggressively pushes their own software stack and the allure of low-cost locations brings its own set of problems due to distance and cultural differences. Application Development Solutions will allow you to: Capitalize on new business opportunities-pursuing new market segments, globalizing, or taking advantage of sudden socio-economic or geo-political climate changes. Extend your business capabilities-enhancing your existing feature sets, extending your presence into different media (web, mobile devices, GIS, and so on). Improve your business efficiency-automating and integrating business processes, simplifying, or fixing business logic. Reduce your costs and/or environmental impactmodernizing legacy systems Reduce complexity to lower maintenance and reduce your environmental impact Reduce technology disruptions and simplify evolutions-improving application agility and reducing re-engineering and maintenance costs through leveraging modern architectures and platforms Meet regulatory requirements-simplifying compliance with regulatory requirements or industry standards (for example, SOX, ISO, FDA compliance) Today, Applications not only support underlying business processes and back-end operations, but also drive customerfacing business opportunities. Complete end-to-end solutions partners with its customers to provide a complete end-to-end solution, from development and testing through deployment to maintenance. This supports our customer s near- and long-term goals while reducing the cost of managing applications. HP s large partner ecosystem enables to bring the necessary resources and skill-sets from partners to complement its service delivery and hence ensure success. Client-centric solution provider uses its diverse understanding of available and supported technologies, their use-cases, and strengths and weaknesses to architect a tailored, client-centric solution that aligns with your business needs. 10 11

Build IT Enterprise Architecture and Data Management Our employees are recognized industry experts in enterprise architecture (EA) and data management. Our deep and practical expertise spans research and analysis on the requirements process, architecture design, and ongoing maintenance for secure, high volume, critical systems across industries. We are experts in deploying progressive, strategic approaches for data modeling, database design, database performance tuning and developing enterprise information warehouses. is known for building and maintaining relational, hierarchical, and network database management systems. Our solutions support very large databases occupying terabytes of storage and containing billions of table rows. These are often critical decision support systems or transaction processing applications that serve large volumes of users in secure and remote environments. Oracle Solutions Oracle Solutions: Oracle practice specializes in helping clients install, upgrade, and maintain the Oracle application suite and Oracle RDBMS. We have helped Customs and Border Patrol and other government agencies and private sector organizations leverage their Oracle environment to improve business processes, reduce costs and provide better support for decision making. We provide expertise in project management, application and technical consulting, database administration and infrastructure support that allows clients to take maximum advantage of this growing technology. Our Oracle services include: Oracle Warehouse (Warehouse Builder, Express Server, Discoverer) Oracle E-Business Suite Custom design and programming Manufacturing, Financials, HRMS Requirements analysis Oracle Internet Developer Suite CRM service implementations Oracle 10g, 11i Enterprise Resource Planning / Customer Relationship Management Microsoft Solutions possesses deep operational and technical expertise in Microsoft development, network and security platforms. We support: Microsoft Windows Server Active Directory Microsoft SQL Server Microsoft SharePoint Portal Server Microsoft Visual Studio Microsoft Project Server Microsoft BizTalk Server Critical Microsoft security initiatives Our SQL Server solutions include: Supporting production applications Planning for installing/upgrading SQL Server Architectural, maintenance and tuning including databases of many terabytes with hundreds of users in 24 x 7 configuration Establishing security access in an enterprise environment Establishing backup and recovery strategy for enterprise networking Recovering large production databases Maintaining high availability systems delivers extensive experience in Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) for Oracle, SAP and Seibel platforms. We have helped our clients build countless business cases and determine the best-fit ERP and CRM solutions for their program goals. This is done by consistently leveraging our experience to meet each client s unique requirements through delivery of a single cohesive solution. To do this we: Assess existing technical infrastructure and define requirements. We develop technical configuration options, report on costs of each option, provide the vendor selection process and recommend the implementation plan Develop data matrix and dimensional data models Develop comprehensive models to facilitate ERP functionality across the organization Develop and implement the integrated data architecture containing industry specific software, call center applications, web front-end applications, integrated multiple solutions and more Provide ERP and CRM implementation project management, serving as the overall project driver. Our experts deliver direction and leadership to project teams and control resources, objectives and scope. Importantly, we ensure tasks and deliverables are completed within the specified time and budget 12 13

Build IT Network Design and Management network services team respects the value of your IT investment and provides a full range of network design and implementation services. Our highly-experienced, certified engineers are qualified to handle all aspects of enterprise network projects, from initial specification to implementation, testing and post project monitoring and review. Our network professionals have experience in a wide range of networking products, platforms, and protocols. Strategic alliances with the industry s leading manufacturers keep our engineers and salespeople on the forefront of technology, enabling them to deliver best of breed solutions. With certifications from HP, IBM, Microsoft, CISCO, 3Com, SUN, Symantec, Novell, Network Appliance, Veritas, etc., our team can design and implement the system that best fits your needs. The team provides a true end to end solution, ensuring that you gain full value from your network. We include comprehensive knowledge transfer and offer consultancy support services with every solution. By utilizing our network services, you can stay focused on your core business with complete confidence that your technology investment will support your short-term requirements as well as your long-term objectives. This is why leading organizations in a variety of market sectors trust to service, maintain, and upgrade their network. Assessment and Documentation Infrastructure Design and Build Network Management and Monitoring Incident Response Systems Integration Corporation offers a broad range of enhanced support services to augment your internal capabilities and increase your effectiveness. Our suite of integration services - including network and application integration, systems integration support, and validation and testing - ensures solid deployment of Corporation products within your total environment while reducing risks and introduction costs. With s integration services, you can reduce the time it takes to get your new products and systems working. You can lower introduction costs while minimizing risks and reducing time to market. Validation and Test: s validation and testing services ensure that your new products work smoothly with other third-party products. We perform user testing before roll out, to ensure quality and a solid deployment. Installation and Integration: We install and integrate your systems to work smoothly within your existing configuration. Our integration experts can: Streamline integration processes Identify potential performance and reliability issues Minimize likely interoperability problems Ensure consistency Enforce compliance Support that spans the Full Product Life Cycle: s comprehensive set of service offerings is designed to support you throughout the full product life cycle. Our highly qualified support staff is fully trained to address your needs from pre-installation through end-of-life. We offer detailed site assessments and preparation for a seamless startup. Our installation and upgrade services minimize your downtime. Our Network, applications, systems, and third-party integration services ensure that you are operational quickly and efficiently. Customized training is available to enhance your skills and capabilities as needed. Our onsite, web-based, and call center technical support keep your systems running smoothly. Long-term/ life-cycle support services ensure continuity and stability over the full life of your programs. With s integration services, you can reduce the time it takes to get your new products and systems working. 14 15

Build IT Datacenter Design/Consolidation The ongoing High Performance Business research initiative has revealed that top companies increasingly position IT as a strategic asset. They recognize that delivering discrete technology components is no longer the optimal way to generate business value. Instead, these leaders opt to manage their IT operations like an integrated, service-oriented business. In this paradigm, keeping costs low is an imperative. So is aligning IT investments with overarching business imperatives. The shift from IT delivery to IT service management has significant consequences for data center environments, which are at the heart of any IT capability. With the transition to service management comes the need for greater IT flexibility, server and storage utilization, and cost variability. Maturing technologies in the areas of virtualization, service provisioning and automation help address these new requirements and enable the development of data centers that are more agile than ever before. New sourcing models, as well as the emergence of cloud computing as a viable and secure platform for IT service delivery, promise even faster, more responsive and more cost-effective data center capabilities. Despite the advances in data center technologies and management approaches, many organizations struggle to create an optimized IT service environment. The proliferation of data to be managed makes the need for better storage, server and database solutions readily apparent. Yet, many organizations lack the necessary data center skills or resources to untangle and replace their complex and costly legacy infrastructures. Large organizations find it particularly daunting to centralize geographically dispersed data centers and effectively manage multiple sourcing providers. Most organizations understand the value of optimizing their data center environments. Yet, they often don t know where or how to begin. can help. s comprehensive range of data center services helps clients reduce their IT complexity, improve scalability, and achieve significant gains in data center performance. These services, outlined below, are business-led and service-oriented. This means they satisfy specific IT delivery needs and, at the same time, generate outcomes that align to defined business priorities. Data center optimization: helps clients reduce their data center footprints and improve operational efficiencies by consolidating distributed facilities and assets into centralized locations. We migrate servers, storage and networks, as needed, and with the Application Migration Factory transition clients critical applications to the new environment in a logical sequence and with minimal disruptions to the business. As part of this service, we can also help clients take advantage of private and public cloud opportunities to improve IT service provisioning and management. Optimizing the data center can generate a number of benefits, including enhanced asset utilization, improved availability and reliability, and better cost management. Clients can achieve a savings of up to 35 percent of total cost of ownership. Importantly, the consolidation of data center environments also reduces power usage, which helps companies achieve their Green IT objectives. Server optimization: standardizes and consolidates servers into highly efficient pools of virtualized computing resources that can be partitioned and assembled to maximize utilization. It is not uncommon for to virtualize more than 80 percent, standardize up to 95 percent and consolidate up to 50 percent of an organization s existing servers. By taking advantage of s server optimization services, clients typically can achieve a 30 to 50 percent reduction in total cost of server ownership, increase their servers reliability and availability, and reduce capital expenditures. Storage transformation: Clients often want to transition to networked storage and, in the process, eliminate duplicate storage environments. not only standardizes and consolidates storage into pools of virtualized capacity, but also deploys capabilities that allow clients to manage the information lifecycle across storage devices. As a result, clients improve their storage utilization, investment returns and the availability of the enterprise data that underpins their businesses. Large organizations can save tens of millions of dollars during the first year of the transition and ultimately reduce their total cost of ownership by 30 to 55 percent. Database optimization: An optimized database environment helps ensure that the information used to power the business is accessible, available, and easily and quickly retrievable. not only standardizes clients database landscape, but also configures databases for optimal performance and reliability. These services help clients improve their overall IT productivity, reduce the total cost of ownership associated with database technologies, drive more value from their information assets, and improve performance of mission critical database systems. Data Center Automation: Automated processes based on leading practices can make data center systems much more responsive to changing business requirements. uses automated technologies to help clients provision, modify, operate and retire their data center services in a precise and dynamic manner. In effect, automation supports the seamless integration of individual data center components from server and storage environments to applications. The result is an end-to-end data center capability that can reduce delivery costs by up to 15 percent and delivery times from days to minutes. 16 17

Build IT The value we bring Vendor independence: We have strong relationships with a number of technology providers who work with us to bring market-leading data center solutions to the marketplace. Our ability to work with all technologies eliminates the problem of vendor lock-in and enables us to suggest technology solutions that can best meet our clients specified needs A holistic approach: We focus on delivering the infrastructure technologies, as well as the supporting operational processes and tools, needed to enable high performance IT Modernization Chief Information Officers (CIO) and their IT teams have never been under greater pressure to do more with less. With 70 percent of the typical organization s global transactions running on legacy applications, the spotlight has shifted to how well the application portfolio can drive business results and support innovation while keeping costs under control. At many companies, the application portfolio exerts significant drag on overall operational effectiveness. The inflexibility of legacy applications makes it hard to provide the IT functionality demanded by rapid shifts in business needs and even harder to scale up to support business growth. Legacy applications can be difficult to integrate with newer, more agile systems. They are often poorly documented as well, making it even more difficult to operate and maintain when IT staff leave the organization. What s needed is a fresh approach A business focus: We are committed to delivering service-oriented solutions that generate measurable business results Fast results: Within just six to nine months, can help clients significantly reduce the cost and complexity of their data center infrastructures without compromising service quality and performance Scalable sourcing models: We recommend and then deploy diverse sourcing models to scale the data center infrastructure to keep up with business growth and the ever increasing demand for IT services that allows companies to extract much more value from their application portfolios. The ideal approach would significantly reduce the costs of managing and upgrading the portfolio while improving overall system performance and reliability. can help. Our Application Modernization and Optimization practice enables IT to strip out unnecessary operating costs while reducing capital spending and freeing IT staff to create value for the business. Our Application Modernization and Optimization specialists can help to answer the big questions about whether to renew, replace, consolidate, retire, enhance or build new. The outcome: More value from existing applications with reduced costs, more manageable application portfolios, limited business disruption, and decreased risk. Application Portfolio Optimization: Creates a strategy and roadmap to improve your application portfolio and reduce functionality overlaps, technical limitations and maintenance costs. Our experienced specialists use diagnostics and proven processes to probe for problem areas and quickly determine whether the applications are functionally adequate and technically healthy to support your organization s business strategy. The Application Portfolio Optimization analysis can include an assessment of a portfolio s economic efficiency, giving insights into whether application maintenance is benefiting from the low-cost sourcing models that minimize licensing and maintenance overhead. Our Application Portfolio Optimization specialists can also improve active portfolio management to keep the portfolio healthy. The result is an actionable roadmap and a strong business case for optimizing the portfolio. Performance Engineering: Allows IT leaders to better manage the overall performance of their applications so they can meet or beat users expectations and reduce unnecessary costs due to performance issues. Our experienced team works to confirm that high performance is built into applications and alleviates performance problems in existing applications. Specifically, performance engineering helps companies set clear system or application performance objectives, identify performance failures and isolate their root causes by helping to confirm that performance characteristics are factored in early in the development life cycle. Application Modernization: Helps companies get the most value from their existing applications over the long term as well as helping to reduce certain costs and risks. This offering can modernize your application technology while retaining much of the investment made in applications. Specifically, the solution can: Migrate an application to current technology that is vendor-supported Re platform to newer, less expensive and more efficient technology platforms Remediate to enhance your applications functionality, make them easier to maintain and make them part of a highly scalable framework getting the benefits of system replacement with far less risk, cost or disruption Mitigate the risks to critical business system availability of relying on obsolete technology or IT professionals who are nearing retirement The value we bring: Our Application Modernization and Optimization solutions allow organizations to quickly get more value from the most capital-intensive element of their IT investments: the application portfolio. Application Modernization and Optimization helps reduce IT costs by pinpointing applications that can be eliminated, consolidated or replaced with more cost-effective solutions. Additionally, we can help identify solutions that leverage existing application investments by modernizing existing applications. We provide dependable outcomes by listening well, working alongside clients teams to generate results using thoughtful plans and firm programmanagement disciplines. Clients benefit from the experience of our Application Modernization and Optimization practice. Our integrated teams of subject-matter specialists and strategy, technology and implementation professionals have helped hundreds of organizations get more from their application assets. Clients see fast results because our Application Modernization and Optimization professionals work in flexible teams that can be assembled and deployed rapidly anywhere in the world. We help clients free up IT development time to focus on business needs because our system integration and outsourcing capabilities expand the options for application development and maintenance. 18 19

Secure IT Secure IT Table of Contents Cyber Security Assessment and Planning (C&A) Page 22 Cloud Security Page 23 Cyber Security Management & Support Page 24 Risk Management Page 25 20 21

Secure IT Cyber Security Assessment and Planning (C&A) In today s connected world, fast and efficient access to critical information is a vital part of business operations. To IT administrators, the challenge is to secure this type of information with a minimum of disruption to the end user. knows and meets those challenges every day. We collectively bring a century of real-world experience to securing enterprises and their critical assets. Our Cyber Security Services offer solutions that address your unique need. Whether it is applying industry best practices or meeting regulatory requirements, can help. analyzes network and system vulnerabilities and provides actionable steps for rectifying them. Our consultants also combine thorough interviews, advanced scanning technologies, and documentation review to identify and resolve areas of exposure within the IT environment. It is through our holistic approach to Cyber Security that our teams have been so successful in the Government and Private Sectors. The following provides a high-level list of Cyber Security Services that offers today. Cyber Security & Privacy Assessment and Testing Certification & Accreditation (C&A)/Risk Management Framework (RMF) (DIACAP and NIST) Security Test & Evaluation (ST&E)/Security Control Asessment (SCA) DoDI 8500.2 and NIST SP 800-53 Independent Verification & Validation (IV&V) Vulnerability Assessments Penetration Testing External/Internal Risk Assessment & Analysis FISMA Tool Utilization (e.g., emass, CyberScope, CSAM, etc.) Privacy Threshold Analysis (PTA)/Privacy Impact Assessment (PIA) Continuous Monitoring (NIST SP 800-37) Application Code Review Certification and Accreditation (C&A) Methodology: The Corporation C&A methodology is based on National Institute of Standards and Technology (NIST) Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems, and is easily adapted to meet agencies own internal C&A process. The Corporation methodology incorporates activities, general tasks, and a defined management structure to help agencies obtain and maintain enterprise-based C&A for their information system infrastructure and applications. The methodology is sufficiently flexible to evaluate systems in various lifecycle stages, systems under evolutionary development, and singlepurpose or legacy systems, for as long as they exist. Standardized assessment methods and procedures promote more consistent, comparable, and repeatable security assessments of federal information systems. Cloud Security T he ability to embrace cloud computing capabilities for federal departments and agencies brings advantages and opportunities for increased efficiencies, cost savings, and green computing technologies. However, cloud computing also brings new risks and challenges to securely use cloud computing capabilities as good stewards of government data. The Federal Risk and Authorization Management Program or FedRAMP has been established to provide a standard approach to Assessing and Authorizing (A&A) cloud computing services and products. FedRAMP allows joint authorizations and continuous security monitoring services for Government and Commercial cloud computing systems intended for multi-agency use. Joint authorization of cloud providers results in a common security risk model that can be leveraged across the Federal Government. was among the first Cyber Security professionals to perform a Security Assessment on a Cloud Computing service provider for the Federal Government (Certification and Accreditation (C&A)). What we learned from this exercise, is that having a public knowledge of Cyber Security is crucial in securing individuals and our Nation. is working with leading industry Cloud Computing providers to assist in meeting the new Federal Requirements. was among the first Cyber Security professionals to perform a Security Assessment on a Cloud Computing service provider for the Federal Government. 22 23

Secure IT Cyber Security Management & Support Modern businesses face many challenges and opportunities. Competitive advantage and sustained profitability are essential for survival and development in the marketplace. Standards and performance in the public sector are also under constant and ever closer scrutiny. A critical area that is too often overlooked is that of Cyber Security management. This is a process that must be embedded within an organization from the top down, underpinned by a culture of support and cooperation. When it is done correctly, tangible business benefits can be realized, including increased efficiency, greater clarity and visibility of business processes, awareness of critical assets, risk reduction, and ultimately a direct improvement on the bottom line. Customers can also be assured that Cyber Security is taken seriously, including such key aspects as data protection and freedom of information. The challenge for business leaders is to understand the extent to which Cyber Security management already exists within their organization and to mobilize market leading Cyber Security management services to provide the specialist support that will guarantee compliance with industry best practice and national and international standards. Corporation offers a portfolio of professional Cyber Security management services that can be tailored to meet your specific needs. Whether it is a one-off gap analysis or a full cycle of implementation and certification, we guarantee to identify your critical and other business assets and to deliver appropriate management reports and recommendations. Our consultants have extensive experience across public and private sectors and are uniquely equipped to provide the market leading Cyber Security management service. solutions prepare you and your staff to respond quickly and effectively to security incidents by equipping you with the knowledge and skills required, as well as supplemental personnel expertise as required. Provide on-going management and maintenance of your security infrastructure Perform remediation services in response to suspicious traffic or possible intrusions Manage infrastructure vulnerabilities and assist with security patch and update management Provide intrusion analysis and compliance reporting on your system infrastructure The value we bring: A short process that will benchmark performance and compliance against the standard. Provides a quick and effective view of strengths and weaknesses. Identification of critical assets, threats and vulnerabilities. Effective Cyber Security risk management via implementation of our recommendations. Thorough and rigorous process to develop and embed core Cyber Security management processes, policies and procedures. Protection of key assets and no waste of resources on noncritical areas. Business process improvement. Improved efficiency Compliance with the standard. Formal acknowledgement from a recognized certification body of compliance with the standard 24 25

Secure IT Risk Management s Risk Management services help organizations elevate risk discussions to a strategic level and embrace two critical facets: 1. A preventative, control-based aspect focusing on negative events, loss prevention and risk mitigation. 2. A strategic, entrepreneurial aspect focusing on aligning risk and reward in pursuit of business advantage. Since the publication of NIST SP 800-37 Revision 1, has been following the Risk Management Framework (RMF) for all security assessment activities. Utilizing the RMF as a framework, as intended by NIST, has customized a comprehensive security categorization, selection, implementation, assessment, authorization, and monitoring process that are tailor-able for each Federal Agency. The Risk Management Process (DRMP) is structured as depicted in Figure below. While the DRMP has been in use for a few years now, it has not yet been implemented in a cloud environment. The processes, however, are still the same. The DRMP, similar to NIST SP 800-37 Revision 1, utilizes 6 steps. These 6 steps, which are outlined below, apply to cloud environments, thereby reducing any hurdles to cloud security assessments. In fact, the FedRAMP requirements and associated procedures/ templates are incorporated nicely into the 6 DRMP steps. The subsections below outline these 6 steps and the process as defined in the DRMP, which will employ for all cloud-based information system security assessments. The DRMP is also heavily focused on quality. Similar to ISO 17020 requirements, the DRMP quality system is focused on designating individuals responsible for enforcing the quality requirements in our Quality System Manual (QSM). Through the support we have provided our clients over the years, we have been able to streamline our processes and procedures to ensure the implementation of our QSM is standardized and effective. This standardization has been used to support our implementation of Capability Maturity Model Integration (CMMI) Level 2 processes. In today s challenging global economy, companies face environment risks, process risks and risks involving incomplete or biased information for decision making. There is a need for identifying, assessing, managing and monitoring the organization s business opportunities and risks in an integrated and transparent way. Risk management has been a function within the finance departments of some organizations for many years. However, Enterprise Risk Management as a strategic, tactical and operational instrument to enhance and protect shareholder value while fulfilling regulatory obligations is a recent development in leading businesses according to s recent High Performance Business research. Enterprise Risk Management is a process, or framework, an organization can implement to come to a reasonable certainty that it s strategic and derived operational (efficacy and efficiency of processes), reporting (reliability) and compliance (laws and regulations, codes of conduct) goals are achieved. s Enterprise Risk Management enables an organization to change from a fragmented and compartmentalized risk management solution to one that is strategic in overall scope, viewing controls and risk initiatives in a coherent framework, thereby enhancing decision making and analysis to support growth and high performance. 26 27

Manage IT Manage IT Table of Contents Business Process Management Page 30 Change and Configuration Management Page 31 Data Center Management and Operations Page 32 Enterprise Content Management (ECM) Page 33 Infrastructure Management Services Page 34 Program Management Page 35 Service/Help Desk Management Page 36 28 29

Manage IT Business Process Management Change and Configuration Management Business managers and CIOs alike are increasingly balancing requirements to increase their organization s level of service and process performance while holding the line on costs and ensuring the reuse of existing core technological assets. There is also increasing pressure to think holistically about how to redesign business processes and support systems. No longer is it acceptable to put in place stove pipe solutions that provide process improvement for one group of employees while creating barriers to other stakeholders. Today s business processes often need to be exposed as Web services and used to orchestrate activities that occur within existing business systems. Further, to comply with initiatives such as Sarbanes- Oxley (A-123 Circular), business processes and business systems need to provide process auditing and reporting capabilities. We apply domain knowledge, established process improvement methodologies, and an in-depth understanding of process and technology to deliver the vision, tactics, and tools that organizations need to build systems focused on human-to-human, humanto-system, and system-to-system interaction. brings experience and best practices in the following service areas: Developing business cases, gap analysis, and strategic/operational vision documents. These documents outline how BPM-based solutions will address current challenges and opportunities while supporting the organization`s long term enterprise architecture. Selecting the best-fit BPM software platform based upon an organization s specific requirements based on cost, complexity, technical capability, inclusion on the GSA schedule, and need for integration with legacy systems. Developing As-Is and To-Be process maps to support process redesign, business rule identification, and setting of performance targets. Corporation provides a configuration management team skilled in superior maintenance, verification, auditing and monitoring of your product s performance to ensure the security and functionality of your product throughout its life cycle. Given the complexities of Service-Oriented Architecture (SOA) technologies, configuration issues are vital to a project s success. Our experienced professionals are trained to evaluate, determine and monitor the impact of changes, providing cutting edge solutions that best fit your configuration needs. Changes in versioning, requirements, design and operational information can have a great impact on the design and engineering output of your product. utilizes the CMMI approach to establish baselines and monitor changes within your systems and services, ensuring that the functionality of your product remains consistent and up-to-date. has significant experience in helping organizations leverage the power of Business Process Management (BPM) software and approaches to transform traditional business functions from paperbased, insular processes to fully integrated, businessmanaged, performance-driven processes that cut across departmental and organizational boundaries. Performing full system design and development activities required to rapidly digitize business processes and back end technical capabilities including data repositories. Integrating the BPM-based process and systems capabilities with the existing technical infrastructure. Providing training and deployment services. Executing change management strategies to assist in managing the roll-out and adoption of the new business processes. Providing program management for long running process improvement initiatives. utilizes the CMMI approach to establish baselines and monitor changes within your systems and services Our configuration management services include: Identification of new and emerging technologies, versions and requirements Change control Functional and physical configuration verification and auditing Develop and implement procedures to monitor and manage various configurations Management of all hardware and software components within your systems and networks Record and update changes in computer systems and networks Engineering support and maintenance of project requirements Application and monitoring of program 30 31

Manage IT Data Center Management and Operations We operate in a highly secure, distributed environment for Federal and Commercial organizations. Our data center management and operations solutions are comprehensive, sophisticated and trusted by mission-critical organizations with terabytes of secure data. provides operations support for database management systems such as DATACOM/DB, IBM DB2, IBM UDB, Oracle and SQL Server. Our services include physical implementation of database table structure, systems monitoring, allocation of physical database space, network monitoring, problem determination, problem reporting, problem escalation, recovery plans, reorganizations, trouble shooting, operating system upgrades, change control, version management, backup and recovery, capacity planning, performance monitoring, modifications to data objects/structures and system programming. Plan and implement database and database administration changes needed to support new hardware and/or software features in the clients operating environment Define and assist in enforcement of all database related policies, processes, procedures, standards and guidelines for designing and defining the users physical database Interface with project teams regarding possible database related software problems, design problems and application interfaces issues Analyze problems, identify causes and recommend solutions Provide emergency maintenance on a 24 x 7 basis based on client policies, processes, procedures, standards and guidelines. Recommend changes to these as needed Deliver documentation of database administration tasks Develop, test and perform the complete database administration processes needed to recover databases with maximum data integrity Develop and provide training and mentoring on the proper operation of all database and related products Enterprise Content Management (ECM) Our Enterprise Content Management (ECM) solutions help you control content, reduce risk and keep costs down. The broad approach spans content collection and archiving, classification, records management, and e-discovery for large volume and disparate databases across your enterprise. We support best-in-class ECM solutions including FileNet P8 Platform and DB2 Content Management. By delivering these solutions, we give our clients accelerated application deployment and lower total cost of ownership. We integrate and activate content with even the most complex processes for streamlined optimization across the entire enterprise. Information Management: Business Intelligence & Data Warehousing Our information management practice features leading edge business intelligence (BI) and data warehousing (DW) solutions. Our business intelligence solutions enable business users to visualize, understand and make decisions regarding even large amounts of disparate and very complex data. We deploy these solutions throughout all stages of the development life cycle. Our comprehensive information management services include: Developing the business case Understanding the process and organizational objectives Choosing the best software and tools for each project Building, using, testing and evaluating solutions Deployment of solutions Training and mentoring Maintenance and ongoing development DW solutions involve collection and maintenance of large volumes of data, including highly sensitive information. We leverage the proven methodology, grounded in quality assurance and project management, from the beginning of every project to maintenance and expansion of the database. 32 33

Manage IT Infrastructure Management Services Program Management provides comprehensive services to help organizations optimize critical IT staff. With Infrastructure Management Services from, customers get the technology, reliability and control that their business demands without jeopardizing strategic priorities. s proven processes provide for seamless transitions and smooth project management. At the same time, it helps customers reduce focus on non-core functions and reduce costs. s well-defined Service Level Agreements (SLAs) provide customers with the assurance of consistently superior performance. Be it multiple service windows, availability or technologies, has the flexibility and agility to ensure that the customer s IT infrastructure remains responsive to their business needs. The infrastructure management services enable customers to identify efficiency improvement opportunities, design the right solutions for their operating environments, and then plan and implement a solution that delivers measurable performance improvement against quantified service level agreements (SLAs). The infrastructure management services are used by several organizations around the world as a means of achieving large increases in availability and reliability for relatively modest investments in services and tools. Organizations using s infrastructure management services have achieved these goals by reducing the time required to resolve problems, improving capacity planning, streamlining change management, increasing business resiliency and better management of data center assets. Server and Backup Management: helps customers manage their server environment and backup effectively to maintain performance at optimum levels. The server and backup management offerings ensure that server parameters and operating systems are administered and tuned well. The offerings span multiple environments, platforms, operating systems and tools. The service deliverables include operating system administration, performance monitoring of servers (monitoring CPU, disk space, memory utilization) and fine tuning, management of upgrades and patches, first level diagnosis of server problems and escalation of hardware problems to vendors Desktop Management: s desktop support services are focused on helping Information System managers ensure quick deployment and standardization of desktops across the organization for cost and time savings with better manageability and productivity. The service offerings in this area include: Desktop Computer configurations Standard office application management an support Desktop standardization and imaging Asset management - single point for acquiring, deploying, and managing computer and software Technology refresh upgrades Personal computer maintenance through single point of contact Organizations are always trying to work smarter, while complying with government directives to be more citizen-focused. But coordinating and prioritizing projects can be a challenge if resources are limited or there is a lack of internal governance structure. Corporation s Program Management services can bring uniform management to multiple inter-dependent projects and ensure compliance with government mandates and legislation. Our experts will work with project sponsors and stakeholders to identify program needs and determine the most effective methods for managing program activities. We will develop a plan that integrates information from multiple initiatives and identifies relationships and dependencies among projects. We verify the plan to ensure that it adheres to established standards and aligns with organizational objectives. Then we develop Standard Operating Procedures (SOP), principles, tactics, techniques, procedures and training materials to support the program. s experts deliver projects from concept through completion. Project Management Office (PMO) Support Quality Assurance and Control Developing/Defining Service Level Management (SLM) Program Portfolio Management Enterprise Architecture Development and Documentation of Standard Operating Procedures (SOP) Doctrine Development and Training Support Acquisition and Logistics Support Configuration Management PMP/PMBOK Process Improvement: ITIL, CMMI, ISO Task Order Management Value We Bring In: Increase the efficiency of existing resources Enable more accurate planning for future investments in technology infrastructure and human resources Ensure that projects stay on schedule and within budget Ensure compliance with Federal mandates and legislation Improve service 34 35

Manage IT Service/Help Desk Management believes that the Service/ Help Desk Management function should add value to the users by resolving issues and by setting in place processes to ensure the same problem does not arise again. Corporation helpdesk services are geared to the requirements of a wide range of organizations. Users - and this could be employees with systems difficulties, or customers seeking advice when accessing product or service information over the internet - are given a single point of contact where fast efficient help is on hand whenever they require it. Our Helpdesk best practices aim to: Reduce management complexity with a single point of contact and a consolidated plan for services support Help reduce costs by freeing up your staff to concentrate on company core business issues Improve end-user satisfaction through a consistent and well defined service level agreement Help resolve issues faster with single-sourced, flexible, multi-level support Leverage of our expertise to help reduce risk while optimizing availability Gives your callers the comfort of knowing a person, not a machine, will help them 36 37

Manage IT 8605 Westwood Center Drive Suite 303 Vienna, VA 22182 Phone : 703.288.5258 Fax : 703-991-5998 Email : info@datawiz.net 38