Disaster Recovery Solutions
Is your organization prepared for a complete IT failure involving your computers and network? Are you backing up your sensitive and critical information needed to sustain business revenue and ensuring the survivability of your company in the wake of a natural or man-made disaster? GPSI Guam has extensive experience preparing and planning for such scenarios. Disaster recovery focuses on your IT or technology systems supporting critical business functions. We can assist you in developing a Disaster Recovery Plan (DRP) that documents your critical business processes or set of procedures to recover and protect your IT infrastructure in the event of a disaster. We can also assist in developing a robust disaster recovery solution customized to your business needs.
Help Desk / User Support
Your hard work and long hours are paying off, your successful business is growing at a rapid rate, and with that growth comes an increasing IT hardware inventory, user applications, email accounts, and network management responsibilities to manage on a 24/7 basis. Disruptions to any of these critical processes can have a detrimental impact to your bottom line and your one and only IT savvy person is stretched to his or her limit and can no longer single-handedly manage your entire IT environment. You need help. GPSI Guam can help deliver a customized Helpdesk solution for your company.
Independent Verification & Validation
If you need an independent, disinterested third-party to determine whether your product, service, or system meets business and technical requirements, specifications, and fulfills its intended purpose, then GPSI Guam can assist you. Validation assures your product, service, or system meets the needs of the customer and other identified stakeholders and may involve acceptance from your customers. Verification is an evaluation of whether or not a product, service, or system complies with a regulation, requirement, specification, or imposed condition.
Information Assurance is the process of adding business benefit through the use of Information Risk Management (IRM) which is strongly related to the field of information security and business continuity. IA relates more to the business level and strategic risk management of information and related systems, rather than the creation and application of security controls. IA is an interdisciplinary field requiring expertise in business, accounting, user experience, fraud examination, forensic science, management science, systems engineering, security engineering, and criminology, in addition to computer science. GPSI Guam can provide assistance in developing your corporate governance to address issues such as privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery as they relate to information systems.
If you can’t convincingly proclaim your company network is robust with all the latest protections in place to protect proprietary data, client information, and other critical information, then you might want to consider a Vulnerability Assessment. A Vulnerability Assessment is a technical security assessment focused on your internal IT infrastructure. There are typically two components in an internal vulnerability assessment:
- Assessing your internal architecture and IT management practices
- Internal network vulnerability scan.
This assessment will help identify, quantifying, and prioritize the vulnerabilities in your system.
A penetration test (Pentest), is a planned, ethical attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality, and data. A Pentest may be a “White Box” test where all background and system information is provided or “Black Box” where only basic or no information is provided except the company name. A penetration test will advise if a system is vulnerable to attack, if defenses were sufficient, and which defenses, if any, were defeated in the penetration test. Security issues uncovered through a Pentest are presented to the system’s owner. Effective penetration tests will document this information with an accurate assessment of potential impacts to the organization and outline a range of technical and procedural countermeasures to reduce risks.
- Identifying high-risk vulnerabilities resulting from a combination of lower-risk vulnerabilities exploited in a particular sequence
- Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software
- Assessing the magnitude of potential business and operational impacts of successful attacks
- Testing the ability of network defenders to successfully detect and respond to the attacks
- Providing evidence to support increased investments in security personnel and technology
Network Operations Center (NOC) / Security
Network Operations Centers (NOC) in an organization oversee complex internal and external networking environments that require high availability. An example of a NOC could be a Security and Fire Alert service for residential homes and business. NOCs may monitor one or many networks for various conditions and may even operate more than one NOC to manage different networks or to provide redundancy or backup for another NOC. They analyze problems, perform troubleshooting, communicate with site technicians and other NOCs, and track problems through resolution. When necessary, NOCs will escalate problems to the appropriate stakeholders. Primary responsibilities of a NOC may include:
- Network Monitoring
- Incident Response
- Communications Management
- Reporting Problems
Contact GPSI Guam if you need assistance in standing up a NOC, to relocate or renovate, or building new capabilities and services into your existing NOC.
Requirements Definition & Tracking
If you’re planning a major upgrade or complete replacement of a current IT system, GPSI Guam can help develop your Functional Requirements/User-defined Requirements and translate those into Technical Requirements for your project. Inaccurate Requirements Definition can lead to schedule delays, wasted resources, duplication of work, and customer dissatisfaction. Just as important as defining your requirement is Requirements Tracking or Traceability. Every requirement needs to be tracked for changes which may increase or decrease the size of the project and every requirement needs to be tested thoroughly to determine if all objectives of the requirement are met for successful project completion.
Server Management takes on many definitions. With so many standards, guidelines and opinions on server management, GPSI Guam can help take the lead and navigate you through a maze of technological puzzles. We’ll assess your current server environment, determine where you want to be, and pool the right technical experts to build the right Server Management solution for your inventory of hardware and server applications.
Experiencing lost e-mails? Always running out of storage space? Your office experiences a power surge and now you can’t bring up your accounting system and payroll processing is an hour away. We have experience managing multiuser computing environment and are aware of the many tasks associated with maintaining a critical processing system. Just like your car, IT systems need periodic maintenance. You may need to acquire, install, or upgrade computer components and software, provide routine automation, maintain security patches, and train functional users, managers and staff. GPSI Guam can help you.
On a remote island and need a phone in a hurry? Need to send site survey pictures to your company where landline telecommunications are rare to nonexistent? GPSI Guam can provide you a satellite phone solution that connects directly to a constellation of either geostationary or low-earth-orbit satellites of which your calls are then forwarded to a satellite teleport that connects you to the Public Switched Telephone Network. We have an operational satellite phone and can demonstrate the usefulness of this device. Give us a call before you travel to some of the outlying islands and we’ll be happy to demonstrate this device for you.
Wi-Fi Mapping, Installation & Maintenance
We have tools that can test performance of your wireless or wired network. We have a team of Wi-Fi experts who can graphically map your Wi-Fi network to see if your hotspots are placed correctly and radio channels are assigned properly. This map reveals all the dead zones and can help you optimize hotspot placements for maximum coverage in your work areas and offices. We also have tools that test the performance of your wireless or wired network. Contact us if you’re looking to install a new wireless network. We’ll survey your facility and give you a quote that will include quality installation, warranty, and follow-on maintenance.