System Management
Symphony Services understands the unique requirements of ISVs in the systems management space and has dedicated teams to address their needs. The company offers competitive advantage by providing ISV's with solutions for cost-effective product development, sustenance, proof-of-concepts, and simplified implementations.
Through its Platforming, Global Delivery Model and Agile development methodology, Symphony Services’ ISV clients establish a product line architecture that can respond to future changes. By partnering with Symphony Services, ISV clients have been able to bring products to market months ahead of their competitors, reduce their cost of development by over 30%, and gain up to 10x productivity and software quality.
Symphony Services has experience working on the following areas in systems management:
- Performance, Server & Event management and Monitoring
- Agent-less and Agent driven Sniffing
- ITIL compliance, IT Security & compliance
- Migrations: Exchange, Active Directory
- LDAP/ADLDS Integration and Management
- Application Interoperability
- Applications modules
- Connector development
- Cluster server support, Load Balancing
- Approval Based Workflow
- Provisioning (Automation & Scheduling)
- Localization, Internationalization
- Remote-deployment
Technology Competency
Technology stacks of major platforms are continuously changing and newer technologies are emerging as powerful development platforms. Symphony Services’ competency centers help clients leverage its expertise in leading technology platforms to provide scalable, high performance solutions with lower costs and minimum time to market. The company has proven experience and ready-to-use skill sets with following technology competencies:
- MS Platform: Exchange, Share point, MS-SQL and .NET service monitoring
- MS Cluster Server, VERITAS CS
- Protocols/Stacks: SNMP, WMI, WSMAN, CIM, IPMI, SSL, LDAP, ADLDS, MAPI
- Interoperability: HP Openview, CA Unicenter, IBM Tivoli, MoM, BMC Patrol, Micromuse (NetCool)
- Monitoring: Vmware, WebLogic, Oracle, MS-SQL 2008, Exchange, Share point
- OS: Windows. Vista, LongHorn (Win2008), Linux, HP/UX, Sun Solaris, AIX – 32/64 bit computing
- Scripting : PowerShell, VCS shell script
Services for the Systems Industry Segment
Symphony Services primarily focuses on network management, performance management, change & configuration management and security management services for the Systems segment.
- Network Management:
- Remote Management
- Event Management
- Fault Monitoring
- Provisioning
- Agent Less Sniffing
- Event Management
- Auto Discovery
- Performance Management:
- Application Monitoring
- Interoperability
- Virtualization
- Storage Management
- Change & Configuration management :
- Asset Management
- Migrations
- Patch Management
- Security Management
- Desktop management
- Application management
- Policy Management
- RBA (Run Book Automation)
- Knowledge Library / scripts
- Automated provisioning
- Workflows
Security
Symphony Services believes in giving top priority to security, not at the later stage of the SDLC, but over the entire product development life cycle. Security defect repairs are often much more costly than security designed and built from ground-up.
Symphony Services has extensive experience developing products for identity and access management, network access control, email and data security, and web application vulnerability management products. Besides following industry proven practices in product engineering, the company also works on traditional waterfall development and has significant expertise in Agile development using Scrum and XP methodologies.
Symphony Services, in consultation with its innovation group, has leveraged its deep understanding of system technologies and of the security domain to provide suitable solutions to various industry leaders. It also offers comprehensive services in niche areas like:
- Network Access Control
- Firewall/VPN
- Unified Threat Management
- Intrusion Prevention
- Secure Messaging
- Email Security
- SPAM Prevention
- Policy Compliance
- Authentication
- Security Management
- Identity / Access Management
- Policy and Compliance Management
- Security Information and Event Management
- Security System & Configuration Vulnerability Management
- Miscellaneous
- End-point Security
- Antivirus
- Audit
- Encryption
- Spyware