IT infrastructure

Engineering systems

Design and installation
of integrated engineering systems for data processing centers

Design and installation
of integrated engineering systems for data processing centers

Technological solutions

Dispatch control and data processing center management: automated dispatch management systems
Portal solution for centralized dispatch control and multi-facility management: unified automated dispatch management systems
Building management systems
Inventory and infrastructure management Data centre infrastructure management

Standards

Standardization of separate process subsystems as well as of the integrated solution as a whole.

TIA/EIA 942 standard
We follow the American National Standard TIA/EIA 942 “Telecommunication Infrastructure for Data Centers” to ensure proper equipment quality, operating availability, compatibility, noise immunity and safety
Tier standard
Our data centre infrastructure development specialists are Accredited Tier Designers, which confirms their competence in accordance with the Uptime Institute classification. Building and certification of data processing centres according to the Tier standard guarantees high quality results and the required reliability

Design and implementation
of power supply systems

Design and implementation
of power supply systems

Technological solutions

Power supply systems
Power supply systems
Power distribution networks
Independent power supply
Uninterruptible power supply
PoE for IP devices
Lighting systems
Lighting systems
Street lighting
Workspace lighting
Emergency lighting
Evacuation lighting
Electrical engineering lab
Electrical engineering lab
Expert electrical measurements, officially certified
Power supply equipment
Power supply equipment
Power distribution panels: assembly of switchboard equipment
Grounding systems
Grounding systems

Ventilation and air conditioning systems
design and installation

Ventilation and air conditioning systems
design and installation

Technological solutions

Precision air conditioning
Adiabatic systems
Domestic (semi-industrial) air conditioning
Ventilation
Automatics
Auxiliary facilities
Chiller system
Freon system
Domestic split system air conditioning

Structured cabling systems design and implementation

Structured cabling systems design and implementation

Technological solutions

Structured cabling system design for office buildings, data processing centers, production facilities, medical institutions
Low current systems design and integration into a structured cabling system
Creation of cabling infrastructure for commercial and production facilities
Creation of structured cabling systems to support Wi-Fi devices, integrated safety systems, automated dispatch management systems, etc.
Installation of intelligent management systems
Facilities maintenance
Communication lines measurement and certification
Registration and certification of facilities

Low current systems design and installation

Low current systems design and installation

Technological solutions

Structured cabling system
Telephony
Safety systems
Fire alarm systems
Television
Radio broadcasting systems
Master clock systems
Intercom systems
Dispatch control
Specialized systems (fiber optic communication lines, video conferencing systems, smart home, lighting, etc.)

Integrated security systems
design and installation

Integrated security systems
design and installation

Technological solutions

Access monitoring and control systems
CCTV systems
Perimeter protection systems and solutions
Security alarm system
Fire alarm and automatic fire extinguishing system

Water purification and treatment systems
design and installation

Water purification and treatment systems
design and installation

Technological solutions

Turnkey solutions for modular water treatment facilities
Turnkey solutions for modular water treatment facilities
Domestic drinking water and process water treatment plants
Storm sewer and oil-containing wastewater purification plants
Industrial sewage purification plants
Domestic sewage biological treatment plants
Pump stations
Pump stations
Water supply
Booster pump stations
Sewage pump stations

Data transmission networks
design and installation

Data transmission networks
design and installation

Technological solutions

Standard technological solutions
Standard technological solutions
Creation and upgrade of own networks, including wireless networks in office buildings, hotels, shopping and business centres
Creation and upgrade of corporate or industrial data transmission networks
Creation and upgrade of transport communication networks
Short-range radio networks design and installation
Design and creation of software-defined wide area networks
Design and creation of solutions for development of transport networks of communication services providers
Design and creation of upgrade solutions for networks of communication service providers
Trending technologies
Trending technologies
H3C: wireless solutions, backbone networks, corporate networks
Ruijie Networks: wireless solutions
BRAS: solutions for communication providers
TCP traffic optimization systems
Traffic mirroring systems
Traffic balancing systems
Software-defined wide area networks
Remote access to network resources

Design and installation of automated dispatch control and management  systems

Design and installation of automated dispatch control and management  systems

Technological solutions

Automation of building systems
Automation for HVAC, plumbing, electrical, structural and refrigeration equipment
Automation of office spaces
Automation of open space offices and conference rooms including climate control, lighting, schedules, mobile applications, control panels
Integrated dispatch control
Swift dispatch control, resources management, and reports
Electrical power supply quality control and accounting
Automated system of commercial accounting of power consumption, Automated system of electric power technical record-keeping
Building management analytics
Energy consumption control
Integrated solutions
Installation of any equipment and information systems
Predictive engineering equipment diagnostics
Automatic monitoring of deviations or variations in the production process; estimation of potential losses

Design and installation of computing infrastructure, virtual environments and cloud platforms

Design and installation of computing infrastructure, virtual environments and cloud platforms

Technological solutions

Virtual and cloud infrastructure
Software-defined data centre
Software-defined network
Hyperconverged infrastructure
Secure access
Data storage systems
Conventional
Dell EMC, NetApp, Lenovo, IBM, Huawei, Hitachi, HPE, Pure Storage, DEPO, Aquarius
Scale-out
NetApp, Dell EMC Isilon and domestic solutions: Baum, Raidix, Aerodisk
Other
Dell EMC ECS, VPLEX, Red Hat GlusterFS, Veritas Info Scale, IBM SVC / Storwize, Software Defined Storage
Disaster recovery
Veeam
Veritas Backup Exec
Commvault
EMC: NetWorker, Data Domain, Avamar and Data
Protection Advisor
Tivoli Storage Manager
Open-source solutions
Acronis domestic data backup systems
VAS for service providers

Design and implementation of voice
and multimedia solutions

Technological solutions

Solutions for communication service providers
Softswitch 4/5 class
SSW class 4 (transit node)
SSW class 5 (terminal node)
Combined SSW 4/5: support & transit node
Voice networks protection: Session Border Controller
IMS (IP Multimedia Subsystem)
Mobile virtual network enabler, Mobile virtual network operator
Voice network quality monitoring
NGN and IMS networks operations, corporate VoIP networks
Real-time system
End-to-end call analysis
Networks segmentation
Analysis of media traffic parameters: R-factor, MOS
Statistical data collection and multiparameter notifications
History of on-demand calls with full log of informational exchange
Reports
Antifraud in voice networks
Monitoring
Traffic analysis
Rules and threshold setup, rating calculation
Black lists
Blocking
Real-time prevention
Dynamic algorythms for constraint triggering
Threat notifications
Multimedia systems and video conferencin

Multimedia systems for sports, entertainment, and other cultural and business facilities..
Video conferencing for meeting rooms, assembly halls, situation centers and classrooms

Switchboard systems
Extron, Crestron, Kramer, Gefen, Wyreshtorm, Digis
Display systems
Christie, Panasonic, Vivitec, Sony, LG, Samsung, Sharp, NEC, Barco
Control systems
Crestron, Extron
Congress systems (simultaneous interpreting)
Bosch, DIS, Shure, Televic
Sound systems
JBL, Crown, Shure, Biamp, BSS, Bose
Video conferencing systems
Poly, Cisco, Avaya, Mind, Videomost, Protei
Corporate telecommunication systems
Corporate telephony
Additional kinds of services
Call transfer
Call forwarding
Call hold
Call park and pickup
Call waiting
Conference calls in Ad hoc and Meet me modes
Music on hold
Name indication
Сallback
Intercom
Call centres
Omnichannel call centres supporting various types of inquiries
Processing of incoming and outgoing calls
Interactive voice response
Recorded announcements
Call distribution
Shifts scheduling
Quality control of services
Recording of conversations and agent screens
Voice biometry
Reports
Creation of private LTE networks
Own isolated cellular network
Transition to modern digital technologies based on a single platform
Automation of technological systems, use of applications
Video surveillance with capability of LTE overlay
IoT transport infrastructure

Safety alert and emergency response systems

Mobile network core infrastructure design and deployment

Mobile network core infrastructure design and deployment

Technological solutions

Oracle
Signal information management platform Eagle (STP/MNP)
DSR signal messaging controllers
PCRF policies management system
Unified OCSG (SCEF) IoT gateway
Nokia
Eden-Net SON radio coverage optimization system
Cisco
Mobile network core EPC elements (MME/SGW/PGW)
PIC, Tekelec
Mobile voice traffic monitoring system
SIGOS
Mobile network monitoring system
Ericsson, Nokia
pLTE Core: private mobile networks core
Huawei
vEPC (MME/SGW/PGW): mobile network core elements

Information security

Information
security

consulting

Information
security

consulting

Technological solutions

Audit of information security processes
Assessment of risks and current maturity level of information security processes
Comprehensive technical and project documentation development for creation of information security systems
Development of policies, regulations, concepts and other organizational and executive documentation
Evaluation of conformity with the Russian Federation legislation or other regulatory documents, including certification per Federal Service for Technical and Export Control of Russia
Comprehensive design for compliance with Federal Law FZ-152 “On Personal Data”
Comprehensive design for compliance with Federal Law FZ-187 “On Safety of Critical Information Infrastructure of the Russian Federation”
Comprehensive design to ensure information security in state-owned information systems
Information security support during migration of private business data to a cloud
APCS protection
Financial institutions audit
Certification of IT facilities per to safety requirements

Network
security

Network
security

Technological solutions

Firewalling
NGFW, UTM, firewalls
Firewalls create a barrier between local networks and untrusted external networks, such as the Internet. Firewalls use a set of specific rules to permit or block traffic. A firewall can be hardware-based, software-based, or both.
Email security and Anti-spam
Email Security
Scammers use personal information and social engineering tactics to create phishing campaigns in order to mislead recipients and direct them to malware web sites. Email traffic inspection applications block incoming attacks and monitor outgoing messages to prevent potential loss of confidential data.
Network access control
NAC
To limit the number of users who can access the network, it is necessary to recognize each user and each device. In addition, you can apply your own security policies, i.e. block incompatble terminal devices or grant them only limited access.
Network traffic analysis
NTA
To detect abnormal user behavior or anomalous network server activity, one needs to know what a normal pattern of behavior looks like. Behavioral analysis tools automatically recognize abnormal activity enabling the analyst team to better identify indicators of compromise that pose a potential problem and quickly address the threats.
Intrusion prevention system
IPS
IPS devices scan network traffic to actively block attacks by correlating vast amounts of global analytical data on threats. IPS devices block malicious activity and monitor the spread of suspicious files and malware over the network to prevent pandemics and reinfection
Web application firewall
WAF
A WAF detects and blocks attacks on web applications that are overlooked by standard firewalls and intrusion detection systems. However, any WAF requires proper setup and continuous signature updates, so 24/7 monitoring of incidents by several cyber security experts is a must.
Anti-APT, Sandbox
Sandbox is a cyber security practice that allows the user to run a code or open files in a secure isolated environment of a host computer that simulates the end user’s operating environment. The sandbox environment monitors files or code as they are opened and detects any malicious behavior, preventing threats from entering the network.
Wireless network protection
Wireless networks are not as secure as wired ones. Unauthorized users can get access to the wireless LAN unless strict security measures are taken.
Virtual private network
VPN
VPN capabilities are not limited to encrypting network traffic routed through untrusted network segments such as the Internet. VPN technologies allow the merging of local area network segments between different offices, data centers (Site-to-Site VPN), as well as provide users with a secure remote access to corporate networks or to individual applications (Remote Access VPN).

By using VPN technology, we provide encryption of network traffic, authentication and authorization of devices and users, as well as restricting network access, making only the necessary resources available for access.

Applications
and information security monitoring

Applications
and information security monitoring

Technological solutions

Antivirus protection
Deployment of antivirus software for asset protection.
Security analysis tools
Implementation of products increasing the level of information security through automated control, removal of errors and technical vulnerabilities in the configuration of information system components. An automated monitoring of the protection measures efficiency is also performed periodically.
Security information and event management
Design of SIEM class systems for comprehensive monitoring of IT infrastructure information security, automation of collection, storage, normalization, and correlation of security events, as well as for registration of incidents and further response.
Response to information security incidents
Integration of IRP/SOAR systems into existing infrastructure for real-time detection of cyber threats and incidents, and for aggregation of data from various sources in a unified security operation centre.
Connection to security operations centre
Connection of customer’s information protection tools to a security operations centre for analysis of incidents and timely response.
Data leakage protection
Complete control over all communication channels: email, web activity, printers, USB storage devices, various messengers and cloud services.
Industrial information security
Development of solutions for protection of automated industrial management systems. A comprehensive approach to infrastructure protection using special tools for technical equipment operations, such as controllers, automated workstations, SCADA servers.

Security analysis
and intrusion testing

Security analysis
and intrusion testing

Security analysis can be performed using the “black box” model—when no legitimate access, initial configuration data, settings or information protection measures in place are available, or using the “grey box” model—when legitimate access to the information system has been granted.

Technological solutions

Analysis of web sites, email servers and other network services
Analysis of corporate network, dedicated network segments (process networks, DMZ), and external perimeter
Analysis through social engineering techniques
Demonstration of exploitation of detected vulnerabilities

Technical support
and maintenance

Features

  • Guaranteed level of availability of IT solutions and systems
  • Reduced cost of IT infrastructure ownership
  • Single point of entry and responsibility for various IT solutions
24
/ 7
technical support

Service department

  • 24/7 monitoring and technical support of customer’s IT systems
  • Dedicated service manager
  • Guaranteed service level agreement
7
cities
Regional representative offices in Russia

Own
lab

  • 32 stands, over 600 items of equipment
  • Traffic generators and other test equipment
  • Pilot zones for demonstrating solutions and point-of-care testing
  • Preconfiguration of equipment before delivery
  • Simulation of the customer’s infrastructure fragments to detect causes of failure and test proposed solutions
  • Testing of new versions of software and configurations
  • Transfer of equipment skills to customer’s specialists
2
thsd
items available at our warehouse for tools, parts and accessories; updatable for the project

Engineering expertise

  • Comprehensive engineering expertise covering a wide range of competencies allows to provide one-stop-shop services
100
certified engineers on staff
20
service managers

Technical support
for IT solutions

Technical support
for IT solutions

Technological solutions

Technical support of data transmission networks
Technical support of data transmission networks
Corporate and backbone IP/MPLS networks
Wi-Fi networks
Cryptonetworks and firewalls
Load balancers
Service routers
Traffic filtration and optimization devices
DDoS attack protection systems
Visualization systems for traffic and network infrastructure
SD-WAN and SDN networks
Support for providers’ switched networks and services
Support for providers’ switched networks and services
Virtual voice switches
Session border controllers
Voice gateways
Signaling control systems for mobile networks
Mobile network core components: PS Core, pLTE Core, IMS, DRA/DSR, STP/MNP, PCRF, SCEF; traffic monitoring systems for mobile networks
Radio access optimization systems for self-organizing networks
TV solutions support
TV solutions support
Central head-end stations
TV transcoders and cable TV signal repeaters
Hybrid TV platforms
TV data stream encoding systems
Technical support of servers and data storage systems
Technical support of servers and data storage systems
Servers
Storage systems
Tape libraries
SAN networks
Outsourcing of data processing engineering infrastructure
Outsourcing of data processing engineering infrastructure
Monitoring, administration and maintenance of data processing engineering systems

Technical support
for  information security solutions

Technical support
for  information security solutions

Technological solutions

Security centres
Protection of providers’ and corporate data networks
Special traffic filtration solutions for communication service providers in compliance with the current legislation (“Barrier” data processing system software)
Information protection: websites, technological portals, access gateways, etc.
Data leakage protection: DLP systems
Solutions for user identification and information resources access management
Protection of user desktops
Solutions for physical access control

Outsourcing of IT infrastructure
and user desktops

Guaranteed quality of service
Contractually-agreed quality parameters
Cost transparency for IT infrastructure support
Expenses management
Easy scaling of the scope of services
In accordance with business needs

Technological solutions

Timely response to incidents and service requests
User support
Software support and administration
Systems and service administration
Scheduled preventive maintenance
Equipment repair and replacement
AWS connection
Equipment installation and commissioning

Software

Consulting and implementation
of Microsoft solutions

Consulting and implementation
of Microsoft solutions

Technological solutions

Hyper-V, System Center
Private Cloud virtualization and management
Azure, Azure Stack, Office 365
Cloud and hybrid solutions
System Center
Infrastructure monitoring and management
Exchange, Skype for Business, Teams
Corporate email systems and unified communications
Double Take High Availability
Disaster-proof solutions for services and applications
Quest Migration Suite, MS Migration tools
Migration

Consulting and implementation
of 1C solutions

Technological solutions

Integrated automation based on 1С: Enterprise 8
Analysis of enterprise processes and designing a system meeting state-of-the-industry requirements, followed by customized adjustment and modification of the system per current business processes
Implementation of CRM systems based on Bitrix 24
Fast setup of basic functions (within two weeks)
Comprehensive implementation for large-scale companies, including project research and development of technical specifications
Customization of solution per business tasks
Automation of business processes, integration with social networks, implementation of chatbots
Implementation of the Creatio platform to speed up sales and marketing operations
Integration of customer service and business management systems into one consolidated system

Consulting and implementation
of CRM systems

Technological solutions

Perfomance management
Installation of performance assessment systems for network devices
Implementation of network configuration management
Equipment configuration collection and analysis systems
Working with DBMS
Database design and development: Oracle, MySQL, MariaDB, Postgres
Data Warehouse implementation
Integration of applications and services

Consulting and implementation
of ITSM systems

Technological solutions

Business processes development
Consulting and implementation of DWH/BI data analysis systems
Problem management
Configuration management
Change management
Release management
Service level management
Financial management for IT services
Capacity management
IT service continuity management
Availability management

Consulting and implementation
of DWH/BI data analysis systems

Technological solutions

Oracle
DWH
Qlik View/Sence
BI
Tableu
BI
Power BI
BI

Development and integration
specialized web portals, web applications

Technological solutions

Development of internal and external websites
Development
Implementation
Platform upgrade: from customization of interface elements to complete redesign of user interface using best UX practices and modern front-end technologies
Creation of virtual operating spaces for employee co-working
Shared document library
Group calendar
Task tracking functions
Team communication tools
Automation of business processes
Single point of access to corporate information systems
Single point of access to remote data, applications and services
Custom solutions
HTML/CSS, PHP, SQL (MySQL, PostgreSQL), JS (Angular, React, Vanilla, JQuery, Vue, NodeJS, Gulp), Redis, Nginx, Git, Ajax, iOS, Android
Product development for HR
Personnel recruitment: vacancy database, CV database, vacancy approval
Personnel management: candidates pool, enrollment process
Employees training and adaptation: education plan, manuals
Pay stubs
Administration of leaves, sick leaves, and business trips
Monitoring module for work time accounting
Personnel performance evaluation
Performance assessment
Organization of teamwork; monitoring and evaluation of employees’ effective performance
Intranet setup
Socially-oriented intranet portals
Communications
Real-time in-house communications and cross-corporate business processes
Marketing services
Information services

Implementation of monitoring systems
and IT asset management systems (OSS/BSS)

Technological solutions

Enterprise IT infrastructure
Monitoring of servers and equipment, IoT, IoE
Monitoring of services and processes (creation of resource and service models)
Synthetic monitoring
Mapping networks and network connectivity
Contents list