The document provides an overview of network and security services offered by GSS America to communication service providers, equipment manufacturers, and enterprise customers. The services include network design assistance, solution rollout support, service delivery, remote provisioning, service assurance, technology migration assistance, network integration testing, global network management, network application performance optimization, QoS management, vendor management, and managed security services. Specific services described in more detail include network monitoring, network device monitoring, network device administration and management, global operations command center support, managed security services, intrusion detection and management, perimeter security management, identity software management, vulnerability assessment and management, and managed firewall services.
69. Global Operations Command Center (GOCC) for 24x7 support Our Global Operations Command Centre (GOCC) Infrastructure optimization enables an organization to realize the value of their IT infrastructure investments and convert them into a strategic asset. With the current economic situation, focus is on improving IT efficiency and optimizing existing IT investments, while reducing capital and operating expenditure on existing and new IT investments. Key drivers for optimization include business alignment, data centre consolidation, services consolidation, mitigating downtime costs, globalization, virtualization, security, ‘going green' along with project, staff, and service level/performance assessment GSS solutions to IT optimization and Virtualization are holistic and client centered. GSS adapts its solutions to meet each organization’s optimization and virtualization goals, whether they are cost reduction, improved energy efficiency, enhanced response to customers, improved responsiveness to business needs or a combination of these and others. GSS America’s COE has developed offerings which provide enterprises with the flexibility necessary to address the challenges today. The services are depicted below. 7
132. Firewall administration, including rule changes for services to be turned on or off; monitoring of traffic flow to and from IP addresses and ports
153. Network & Security Transition Framework Due Diligence Knowledge Transfer Steady State Shadow Support Transition Planning Transition Execution / Shadow support Improved service Reverse Shadow Environment Information Risk Assessment To-Be Tools & Process design Review Requirements Detailed data collection Primary Shadow Activity Grouping & Sequencing Knowledge Transfer Setup offshore support Steady State Updated Knowledge base Better Processes X:WEEKS Y:WEEKS SLA Measurement starts 15