Infrahub provides a range of Services that covers the depth and breadth of IT Infrastructure. There has been a paradigm shift in the way customers perceive quality of service. To keep with the changing needs of business, Infrahub offers services through a mix of onsite, offshore and remote infrastructure management services.
We realize that with tighter constraints on IT spends, businesses are focused on realigning their core resources towards meeting the primary demands which means significantly less focus on improving and retaining in house technology expertise.
In such circumstances, outsourcing IT services to a trusted partner gives customers a leading edge over its competitors since relying on a managed services partner provides instant access to a pool of highly skilled resources who can work towards managing and optimizing the customers IT services in turn helping the customer focus on their core business functions thus improving efficiency and productivity
Network Design & Implementation
Network Consulting Services
Managed Security Services
Network Design & ImplementationOur team comprises of highly qualified Network engineers who are well versed with Planning, Designing and Implementing complex and heterogeneous network environments. We work with customers from the requirements gathering phase and our key deliverable’s include developing the following : 1.High Level Design ( HLD ) – A high-level design provides an overview of a solution, platform, system, product, service, or process 2.Low Level Design ( LLD ) – A low-level design builds upon the HLD and includes the detailed network topology, the physical and logical designs, network protocol design, IP and VLAN schema, functions and features to be implemented 3.Network Implementation Plan ( NIP ) – The NIP describes how the network will be implemented and transitioned into an operational state. The NIP contains a detailed explanation of the overall implementation process and a detailed list of the tasks involved 4.Network Ready for Use Plan ( NRFU ) – The NRFU document describes ways to test and certify that the network is ready for use. The NRFU document includes various tests to ensure that the customer network has end to end reachability 5.Project Management Plan ( PMP ) – The PMP document describes the overall plan of the project, execution methodology, how stakeholders will be managed, communications matrix, risk management, time management and budget management
Network SupportAs businesses get more consumer-centric and operations switch to 24×7 mode, it becomes imperative to have a network with 99 % plus uptime and this is only made possible with good network management. In order to cater to our varying customer needs, we have tied up with the best manufacturers in the industry which includes but is not limited to companies like Cisco, HP, Cyberoam, Fortigate, and Dlink. Our managed network service portfolio is driven by the ITIL framework which is the de-facto standard for managing any IT estate. Our qualified professionals are adept in offering the following services : 1.Onsite Managed Services 2.Offshore RIM ( Remote Infrastructure Management ) 3.Dedicated 24*7 NOC setup 4.Proactive & Reactive Network Monitoring 5.Incident Management & Resolution
Network Consulting ServicesAs a part of our Network Consulting Services, Infrahub's team of skilled professionals come with years of experience working across the depth and breadth of Networking and communication technologies like Data, Voice and Security. We help customers with the following services: 1. RFP Writing: The Request for Proposal is a document that spells out your requirements for services and/or equipment.It gives prospective vendors or contractors the information they will need to prepare a bid. Our RFP Writing services includes : a.Interviewing the customers to capture key business requirements and mapping them against clearly articulated technical deliverables b.Drafting technically sound RFP's which includes sections like Executive Summary of the Customer, Intent for RFP, Requirements, Timelines, Legal information etc which in most cases are extensive in nature and requires thorough functional and technology know how to understand. c.Helping the customer float the RFP's to appropirate OEM's and System Integrators which have the required technology expertise to cater to the customer requirement 2. Vendor & Solution Evaluation: a.Function as an interface between the Customer and various bidding Vendors/ System Integrators. b.Evaluate each bidders solution proposal and shortlist only those bidders that are fully compliant with the customer requirement c.Invite shortlisted bidders to present their respective solutions to a panel of members which includes key personnel from the Customer as well as our technical experts d.Jointly review proposals along with the Customer personnel and help resolve any queries arising out of the proposal presentation e.Follow up with the bidders to help answer all pending queries f.Help the customer drive the RFP to a formal closure and submit all relevant documentation for future reference 3. BoM ( Bill of Material ) Finalization: a.Represent the customer to evaluate BoM's from various Bidders b.Ensure that the content of the BoM is not over scoped and is in line with the customers requirement c.Drive bidders to make additions/deletions/changes based on customer feedback as and when required d.Finalize the BoM after thorough review and evaluation
Managed Security ServicesWith the rise in the number of security incidents across the globe and sophistication in hacking methodologies over the years; Data Security is a challenge, every organization faces. Be it a large, mid-sized or a small scale industry, protecting client Data takes precedence over any other challenges. Infrahub offers a host of services to cater to these needs 1. Vulnerability Assessment Vulnerability Assessment provides valuable insight about vulnerabilities/loopholes in customer IT infrastructure, where systems are exposed and vulnerable to internal/external attacks. We also provide recommendations and improvements to help customers in identifying weak links and mitigating threats.It helps organizations who wish to acquire and maintain industry regulation like ( PCI- DSS, , OWASP, BS7799. HIPAA, OSSTMM) 2. Network Penetration Testing Our penetration services mimic an attacker to gain access into your network/servers by exploiting vulnerabilities that may exist, any bypass mechanisms to get into your network/infrastructure, with the intent of finding and reporting any confidential data found, unauthorised access to machines and other sensitive information.It helps organizations in preventing intrusions, external/internal attacks, financial loss,achieving and maintaining regulatory compliance and protecting their brand, goodwill and customer confidence. 3. Network Security Architecture Review and Design Network infrastructure and architecture are foundation on that all other aspect of security relies on. Security is an essential and critical component of the network design.A well thought out and secure network design allows better/scalable network segments, well defined access control, better logging and monitoring and removal of single point of failure.Our security architecture review service provides a detail evaluation of your organization's current security architecture. The service identifies network and design architectural weaknesses in security, performance, scalability, and extensibility. 4. Application Security Testing Application security testing is assessing the security of an application based on three basic objectives i.e. confidentiality, integrity and availability. It also evaluates the effectiveness of controls that are implemented to protect the application and organization from risk posed by application based vulnerabilities and security flaws.Our testing services provide indepth analysis of application security to provide insight into weak links, design and implementation issues.
Project ManagementWith the increase in the size and complexity of IT Infrastructure projects, managing Projects efficiently has become one of the most significant factors in ensuring Project success. Managing Scope, Cost & Time right from the initiation phase increases the probability of delivering a project successfully. Infrahub's team of highly skilled Project Managers come with years of experience delivering complex IT Infrastructure Projects across various Geographies. Our Project Managers are PMP certified professionals, the industries most coveted credential authorized by the Project Management Institute ( PMI ), USA. Our Project Managers get involved with the stakeholders during the initiation phase to ensure that key business requirements are documented. The requirements gathered during this phase is used as an input to developing the PMP ( Project Management Plan ) document. The Project Managers ensure that the PMP is continuously updated as the project evolves. Each project is driven through various phases of the Project Management lifecyle and typically covers the following : a. Initiation b. Planning c. Execution d. Monitoring & Control e. Closure
TrainingInfrahub focuses on imparting cutting edge technology training’s for industry leading certifications and programs. Our trainers come with years of experience and are adept in delivering sessions through various mediums like web streaming sessions or onsite classroom training’s. Some of our key training programs are listed below : Cisco Nexus OS Architecture Introductory Course The Nexus line of switches is one of Cisco's most advanced line of switches which caters to high end Data Centres. This course introduces candidates to the following key topics: a.Introduction to the NX-OS Architecture b.Key Differences between Catalyst 6500 vs Nexus 7000 c.NX-OS Modular Architecture d.High Availability Features & Capabilities e.Command Line Interface of NX-OS f.Operational & Management Features g.Innovation in the NX-OS space MPLS ( Multi Protocol Label Switching ) Introductory Course The MPLS Introductory course is aimed at candidates who are interested in stepping into the Service Provider technology domain. This course serves as a platform to help candidates get an understanding of how MPLS came into existence and the reason MPLS is here to stay. Provided below are the key topics covered during this course : a.Understand history and business drivers for MPLS b.Learn about MPLS customer and market segments c.Understand the problems MPLS is addressing d.Understand the major MPLS technology components e.Understand typical MPLS applications f.Understand the benefits of deploying MPLS & Learn about the future of MPLS Ethical Hacking Our ethical hacking course goes indepth into the latest techniques used by attackers to exploit and hack systems. The participants are provided with real life attack scenarios and how to mitigate those threats. The course covers all the basics and advanced techniques required for understanding system security and how to exploit them to get inside with an equal importance on hands on lab exercises and lectures. The course provides simple, clear and practical explanation/examples to make sure each and every individual understands everything from the basic concepts of communication/application protocol to the various advanced and sophisticated attack vectors and hacking techniques. At the end of the course the participants will be able to use their knowledge to attack and penetrate networks/infrastructure of any proportions using sophisticated and latest hacking techniques and provide solutions/recommendations to mitigate the risks and patch the vulnerabilities in the systems. ISO 27001 Internal Auditor Training Auditing is crucial to the success of any management system. As a result, it carries with it heavy responsibilities, tough challenges and complex problems. Candidates learn how to lead, plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013. The course touches upon the following key topics : a.Key Plan-Do-Check-Act (PDCA) cycle within management systems. b.Information Security Management principles c.Concepts and specifically the requirements of ISO/IEC 27001:2013. Our tutors come with years of industry experience in the field of information security and auditing. The course is aimed at introducing attendees to the importance of Information Security in today’s world and developing an understanding of the processes involved in being ISO 270001 compliant. The course also serves as a foundation for attendees interested in expanding on their existing knowledge of the standard and helps in developing their skills and ability to conduct internal ISO 27001 audits within their organization. The training program will comprise of a combination of tutorials, classroom group exercises and role play. Vulnerability Assessment and Penetration Testing Our vulnerability Assessment and Penetration Testing course covers all the advance exploitation techniques and tools. Students will learn how to analyse the network infrastructure using the perspective of a hacker, spotting vulnerabilities before they can be exploited. The course covers standard vulnerability assessment procedures right from finding vulnerabilities to reporting in a consistent format. It also focuses on the usage of open source VA/PT tools, configuring, installing and managing them. At the end of the course, the students will be able to perform VA/PT on a network with ease,understand/calculate the risk based on the criticality of the vulnerabilities found and create a report which will make business sense to the decision makers.
Structured CablingStructured Cabling is the wires, fibres and cables that distribute information throughout a building. It can be a complex, multitier system involving different types of media — and getting it all to work together reliably and efficiently isn’t always easy. A comprehensive approach helps put all the pieces in their correct places, and no one offers a comprehensive perspective quite like InfraHub does. Copper cabling - Ideal in “horizontal” situations — that is, for service areas on a particular floor or office, for instance Fiber cabling - Well suited to “vertical” applications, working as the backbone between floors and between buildings, and as the connection for Wi-Fi or DAS systems In an intelligent building, these different layers of IP connectivity are the arteries of information that allow central operation and interoperation between various building services. InfraHub has years of experience in successfully delivering structured cabling projects that make infrastructure work smarter, so your building works better. InfraHub specialises in the Planning, Design & Installation of structured cabling systems with an emphasis on new construction & corporate relocations. Whether your network is small or large, InfraHubcan provide the copper & fibre optic cabling needed to connect across the LAN , WAN and SAN network. InfraHubalso offers comprehensive testing and documentation services. InfraHub has years of structured cabling design and implementation experience. Our in-house design team consists of trained and certified engineers from leaving vendors. InfraHub has experience in both vertical & horizontal connectivity projects spanning a wide variety of industry vertical’s, as well as expertise in all aspects of network technologies & solutions such as: category 5e (CAT-5e), category 6 (CAT-6), and fibre optic cabling and modular connectors. Whether upgrading current cabling networks, relocating offices or setting up Greenfield offices, InfraHub has the experience & capabilities to provide accurate scope of work backed up by meticulous drawings & documents to enable your IT staff to operate efficiently. Structured cabling falls into six subsystems 1.Entrance Facilities is the point where the telephone company network ends and connects with the on-premises wiring at the customer premises. 2.Equipment Rooms house equipment and wiring consolidation points that serve the users inside the building or campus. 3.Backbone Cabling connects between the equipment/telecommunications rooms, so named because the rooms are typically on different floors. 4.Horizontal Cabling wiring can be IW (inside wiring) or Plenum Cabling and connects telecommunications rooms to individual outlets or work areas on the floor, usually through the wireways, conduits or ceiling spaces of each floor. 5.Telecommunications Rooms or Telecommunications Enclosure connects between the backbone cabling and horizontal cabling. 6.Work-Area Components connect end-user equipment to outlets of the horizontal cabling system.