Table of Contents

WSH has become well-known primarily through the provision of systems integration and professional consulting services.

Our systems engineers are in possession of the highest professional certifications and have years of practice and experience in training and development. Thanks to this expertise and our strategic partnerships with major vendors, we are always able to offer our customers the most up-to-date theoretical and practical knowledge. Our trainers regularly provide product support and expert technical consultation. The practical knowledge gained from such experiences contributes significantly to the effectiveness and success of our training courses.

Our knowledge accumulated at the WSH Training Centre serves as the basis for our systems integration service, where our specialists design and implement complex information technology systems of the highest quality and reliability, providing solutions for the full range of customer needs.

In addition to the above, one of our main activities involves providing training for information security and IT security equipment, as well as related consultancy responsibilities and systems integration and systems monitoring requirements. In the field of information security, we are able to provide various services for our customers with regard to almost any issue, offering ready solutions for the matters of data leakage, log analysis, endpoint protection, virus detection and spam filtering as well as Internet security.

Our team consists of highly qualified and experienced systems, network and IT security engineers. The work tasks and collaboration of the team are coordinated by our internationally certified project managers. Whether it's an ad hoc order, project work or support issue, we are likely to be able to provide assistance to our customers.

 

Major vendors represented by us

The major vendors we represent and our qualifications:

          • Juniper – Select Partner (routing, switching, security)
          • Symantec – Silver Partner
          • VmWare – Enterprise partner
          • Fortinet - Gold Partner
          • Dell, Lenovo, IBM and Fujitsu hardware partnership
          • SkyBox – Partner

Our systems integrator team is ready to serve our customers' needs in the following key areas:

          • Professional project management (with IPMA B certified project managers)
          • Consultancy, integration consulting services
          • Flexible support contracts, in small and large business environments
          • IT security services (vulnerability assessment, configuration analysis, compliance testing, IT security audit)
          • Large enterprise, multi-platform systems integration
          • Off-the-shelf vendor software customisation, process integration, customisation in an enterprise environment
          • Teamwork support both for on-premise and cloud environments (Microsoft Skype for Business or Teams solutions)
          • VmWare based mobile asset management solutions

 

Professional project management

WSH Ltd manages projects in a wide range of diverse areas. Our goal is to have discussions with project managers in each field who are in possession of knowledge of their industry, to gain a better understanding of the given industry's typical processes, risks, unique operations, and to adjust our project values to the priorities and expectations characteristic of each field. In addition, we are ready to share our experience in relation to service, consulting or software development projects successfully completed by us, as well as our knowledge from risk management projects, with interested members of the project management profession.

We believe that our unique experience with conducting successful projects in the public administration sector, together with the operating models and risk management strategies we have dealt with in this field, can prove useful for our Customers planning projects with similar characteristics.

The WSH Ltd team consists of highly qualified professionals, most of whom are IPMA B certified. Our team members have many decades of practice in managing software development, systems integration, IT security or audit projects, as well as experience with the successful implementation of high-security and high-risk projects.

 

Microsoft systems

Our professional engineers have been dealing with systems built on Microsoft technologies for long years, not only in large enterprises, but also in banking, education and public administration environments. Thanks to these projects, our company has extensive experience in designing, building and supporting the operation of on-premise, hybrid or entirely cloud-based Microsoft environments. We are at home in the following major Microsoft areas when it comes to matters of operation, design or implementation:

          • Active Directory Central Directory - a centralised authentication and object registration system for Microsoft-based systems that utilises a centralised management approach for system objects and their various configurations, including user authentication.
          • SharePoint-based team collaboration system – a web-based platform for team collaboration support that includes native support for native storage and collaborative editing of various Office-based documents as well as team collaboration processes.
          • System Center Operation Manager – SCOM enables supervision from a central location with regard to various systems as well as services, devices and operations associated with servers. SCOM allows for the monitoring of the status, performance and availability of all the managed objects and assists with identification of problems even before they are noticed by users.
          • System Center Configuration Manager – SCCM allows system administrators to manage the remote, bulk deployment or upgrade of applications to computers.
          • System Center – Orchestrator – this application makes it possible to orchestrate and implement various tasks and procedures using a graphical user interface, and even automate fault reporting after an initial notification of a failure.
          • Exchange-based mail system – The Exchange mail system is Microsoft's cloud-based enterprise mail system that assists with the creation of a secure electronic mail service with high availability.
          • O365 cloud-based systems – O365 is a subscription-based cloud service from Microsoft that is accessible from anywhere in the world to users with a subscription. This cloud-based service offers the entire range of Microsoft products on a subscription basis.
          • Hyper-V-based virtualisation system – Hyper-V is Microsoft's software for the creation and management of virtual servers, which makes it possible to automatically maximise the utilisation of physical hardware and ensure that each virtual server always has access to sufficient resources to maintain its operation, regardless of physical constraints.
          • Skype for Business, Teams – Microsoft's enterprise chat and conferencing support applications that enable high-quality voice and video-based communication between participants. These applications make it possible for parties to work together remotely, yet efficiently and in real time while sharing screens and presentation contents. Skype for Business is an enterprise, on-premise service, while Teams is a cloud-based service specifically intended for large enterprises.
          • SQL Server – SQL Server is Microsoft's database platform responsible for data storage.
          • MS IDM services (ILM, FIM, MIM) and their migration or upgrade – Microsoft's identity management system is used by many large corporations. Its upgrade and implementation requires specific expertise

 

Linux-based solutions

We provide extensive support to our customers with regard to the design, development, implementation and operation of their Linux-based systems. Such installations are usually intended for specific tasks and they are very much dependent on the operating system.

We use multiple distributions for the installation, according to the customer's needs. We always prefer the documented use of distributions that are suitable for long term operation, such as:

          • Debian-based solutions (Ubuntu LTS)
          • Redhat-based solutions (Redhat, SUSE Enterprise, CentOS)

Key functionalities

Our Linux-based systems are suitable to perform the following key functions:

          • Implementation of monitoring tools (Nagios, Cacti, Librenms)
          • Remote access (OpenVPN)
          • Remote training solution (ILIAS)
          • Active Directory integration
          • Container and bare metal virtualisation
          • Database design & Design of database clusters
          • Web Server and Reverse Proxy
          • Implementation of password vaults

Why do we recommend these solutions?

We always strive to offer a convenient basic installation for our customers and to integrate the solution into the environment using pre-built templates/descriptions.

To perform the installations, we make use of our adequate understanding of all the Linux systems we offer, and we've designed our portfolio accordingly.

Our expertise and certificates

We are a SUSE Enterprise partner. We have certified systems engineers to support the operation of complex systems that are based on the operating systems offered by the company.

As far as the installed components are concerned, our engineers have already dealt with the integration and operation of them on numerous occasions in both small and large enterprise environments.

 

Mobile device management solution

For a secure option for enterprise mobile device management, we recommend the VmWare Workspace One solution for our customers. VMware Workspace ONE is a mobile device management software that enables efficient and secure management of activities associated with enterprise-specific mobile devices, such as configuration management, device management and continuous monitoring.

The recommended software provides a solution for the management of mobile devices used for purely corporate purposes or for hybrid purposes, as well as privately owned mobile devices used to access corporate services, and it takes care of the security aspects of management as well. With the deployment of this software, it is possible to achieve control of the mobile devices used by employees, the applications running on them and their settings, allowing a secure separation of the corporate and private environment within a single device. The VMware Workspace ONE platform provides users with independent, simple and secure access to the corporate applications.

The VMware Workspace ONE solution offers one of the broadest feature sets for managing any existing platform. It supports easy distribution of Win32 applications, the ability to enforce GPOs even on non-domain machines, as well as additional Windows features that make client management and migration much simpler and more manageable.

The VmWare-based system can be implemented on a cloud or an on-premise basis as well.

The main components of an on-premise system are as follows:

          • Workspace ONE UEM Console
          • Device services
          • AirWatch Cloud Messaging (AWCM)
          • API
          • SQL database
          • VMware Identity Manager
          • VMware AirWatch AirWatch Secure Email Gateway
          • VMware Tunnel and Unified Access Gateway (Tunnel)
          • AirWatch Content Gateway and Unified Access Gateway (Content Gateway)

The management interface of the tool is transparent and easy to use, where administrators can also display real-time information:

Workspace One management interface example

Workspace One supports a broad range of mobile and desktop platforms, providing a complete solution for tasks related to mobile devices in the long term, too.

Mobile device management

          • All types of mobile devices can be managed, including smart phones, tablets, notebooks, desktops, printers and other peripherals.

Support for mobile opearating systems

          • Support for the Customer's core operating systems is also possible, in addition to support for multiple platforms, such as: Windows 10, MacOS, Apple iOS 9.x+, Android 5.x+

Support for mobile environments

          • The system allows secure management of various mobile infrastructures:
            • Enterprise: end-user, multi-user devices
            • Private: BYOD
            • Business: target device, kiosk, or public mobile device

Reporting

          • Built-in reports (~300 reports)
          • Option for individual reports
          • Scheduled report creation and distribution

Brief summary of the essential functionality and features of the product and system to be delivered:

 

MDM functionality:

Supported operating systems:

Windows 8-10, MacOS, Apple iOS 9.x+, Android 5.x+

All data storage on the mobile device is encrypted

Secure device authentication

Password policy enforcement

Device operating system update check

Jailbreak/rooting detection

Analysis of network/internet traffic routing (enforce company routing)

Centralised certificate deployment

Enable/disable devices

Remotely initiated data wipe

Disable devices logged on for longer than a specified time interval

Containerization:

Supported operating systems:

Windows 8-10, MacOS, Apple iOS 9.x+, Android 5.x+

Convenient, efficient application for e-mail management

Convenient, efficient Internet browser

Convenient, efficient application for document viewing (pdf, word)

Convenient, efficient application for document/spreadsheet editing (word, excel)

Convenient, efficient application for viewing presentations (ppt)

Encrypted storage of the entire container contents

Calendar event notification function (also offline)

Management of contacts (also offline)

E-mail notification function

Sandbox offline support

Deletion of data stored in sandbox based on specified conditions (e.g. time)

DLP function (content usage control)

General features:

Creation of own application store

Use of containerisation

Asset Management, documenting of configuration

Use of factory and customisable individual reports

Sending alerts and notifications to devices monitored by the system

 

Fortinet network and IT security solutions

When it comes to network equipment vendors, our company often recommends Fortinet products to our customers, thanks to their versatility, high quality and excellent value for money. Fortinet products are highly scalable, generally provide more functionality than other vendor solutions in a similar price range and the vendor's customer support is proven to work well for troubleshooting.

We are a FortiNet GOLD partner. We continue to maintain and expand the number of our certified engineers in accordance with our partner status. Our engineers are certified in line with the requirements defined by the vendor.

In addition to installation, we offer assistance with technical consultations, provide a review of existing installations and, if required, we undertake and supervise the handling of potential fault reports, including the administration related to faulty equipment. (RMA)

Our support engineers have the following Fortinet vendor certifications, among others:

          • NSE7: Troubleshooting and repair of FortiGate devices
          • NSE5: Add-on products for FortiGate devices (FortiAnalyzer and FortiManager)
          • NSE4: FortiGate Firewall
          • NSE1-3: SALES

Fortiweb Web Application Firewall

This FortiWeb product is a classic reverse proxy tool. Its function is to ensure that each web service deployed within an organisation can be accessed securely without the use of a VPN. The main feature of the product is the protection of published web services from the most common web-based attacks (the 10 most common security risks: Owasp top10)

Its design also provides the option to publish multiple web functions, which are installed on separate servers, at a common IP address.

The solution is a reliable alternative to the publishing solution of the TMG firewall that is no longer supported by Microsoft.

Key functionalities

The key functionalities of the product are as follows:

          • Publication of web services
          • OWASP top 10 protection
          • Detection of robots
          • Publication of clustered services (Load Balancing)
          • ADFS publication
          • TMG substitution for publishing services
          • Web Content routing
          • Artificial intelligence based protection

FortiGate firewall and UTM equipment

The device, either installed standalone or connected to a high-availability cluster of multiple identical devices, provides the ability to monitor and restrict network traffic or the Internet usage of users based on permissions, in addition to classic firewall functions.

The firewall licensing is strictly limited to the applicable functions, without imposing any quantitative restrictions for those. All functions can be used as far as the hardware capacity of the device allows.

The FortiGate firewall is also capable of terminating site and user VPN connections both for mobile and desktop operating systems.

Small business firewall

FortiGate is capable of securely handling the firewall, VPN, and publication needs of any small business.

ISL (Internal Segmentation Firewall)

If the company is using a multi-layer firewall architecture, FortiGate as an internal firewall can securely separate the network segments. FSSO (FortiNet Single Sign-On) technology allows policies to be created not just by IP, but by directory group memberships, or directory account name. Policies can be extended to recognise applications, so that a person can only access the server with an approved application.

A trait of this design is that the firewall also filters the user's internet traffic.

External firewall

If the company is using a multi-layer firewall architecture, FortiGate as an internal firewalland router can handle internet traffic, even with dynamic (BGP) routing. Usecases for the firewall:

          • VPN setup between user and site
          • Securing published services (IDS/IPS)
          • Internal and external routing

Key features

The FortiGate products have the following key features:

          • Web traffic monitoring and filtering
          • Gateway-side antivirus check
          • IDS/IPS
          • IPSEC VPN connection between sites
          • user SSL/IPSEC VPN
          • SSLVPN workstation validation
          • Application recognition and surveillance
          • SSL firewall based on Active Directory
          • Wireless network control
          • SDWAN

FortiMail, Mail filter appliance

FortiMail applicance can be configured as an email filter gateway, or as an IMAP/POP3/SMTP/webmail server with similar functionalities. The advanced capabilities not only filter traditional spam, but with the necessary license, it can handle modern phishing attacks as well.

With the help of FortiGuard virus lab, it combines URL, antivirus, and SPAM pattern checks, and is able to recognise spam behaviors.

As an email server, the sizing of the appliance is based on user count, or when used as a spam gateway, it's based on the domain and email permeability.

Key features

The FortiMail spam filter and mail gateway's key features are:

          • wide range of advanced and easily accessible policies
          • email address forgery prevention
          • detailed and readable logging
          • central and user-level quaranteen
          • email and web-based quaranteen admission
          • click prevention (the system checks clicked URLs)
          • Phishing email url rewrite or deletion - the system rewrites or deletes suspicious URLs.
          • online or on-premise sandbox integration
          • enterprise encryption
          • scalable and extendable with additional FortiMail appliances (primary, secondary email record and central quaranteen)

Forti Authenticator – user authentication

The FortiAuthenticator provides user authentication via RADIUS, LDAP, and 802.1x protocols. The authentication works with both two-factor-authentication and One Time Password methods. Each device's authentication method can be configured separately, therefor the login method can also differ per device.

It supports external authentication providers. Existing RADIUS or LDAP sources can be extended with two-factor-autentication. It can also sync and integrate with Microsoft Active Directory.

Key features

The Forti Authenticator solution's key features are:

          • Authenticated access to wired and wireless networks (802.1x)
          • Guest network with self registration captive portal
          • Two-factor and One Time Password-based authentication (with physical and virtual tokens)
          • RADIUS / LDAP server
          • Active Directory integration
          • Certificate management for VPN services
          • FortiNet Single Sign-On support

 

Juniper Network solutions

Besides FortiNet, the other major networking vendor represented by our company is Juniper Networks. As a vendor, Juniper observes the principle of "Engineering Simplicity", which is a succinct reflection of the company's engineering approach to upcoming problems, at the same time asserting that these complex problems can be solved in a simple way, too. After all, a simpler solution is always more transparent, safer and more efficient.

Juniper SDSN

The concept of Software-Defined Secure Network refers to a solution that encompasses all network elements, both physical and virtual ones. The focus on threat detection together with a comprehensive policy enforcement positions our network security tools in a new environment context, where their synchronised operation - optionally platform-independent - is what provides immediate and complete protection. The Juniper Networks SDSN solution is built based on the following components:

          • Threat Detection Engine – the SkyATP software detects both known and unknown malicious code. The detection of known threats is ensured through data streams received from various sources, such as the CC database or GeoIP. Several technologies are also available to identify unknown threats, including methods based on sandboxing, artificial intelligence and interception.
          • Centralised policy management – for example, the Junos Space Security Director and Policy Enforcer software control Juniper SRX devices. The Policy Enforcer component is responsible for enforcing in real-time certain security settings on both Juniper and non-Juniper devices that are mandatory in general or required due to threats that are currently being detected or encountered.
          • Expansive rule enforcement – capable of enforcing protection against threats encountered at any point in the network in a multi-vendor network environment. SDSN offers the option to extend security to non-Juniper devices, blocking the spread of a potential infection, even between endpoints.
          • User-based policy enforcement – Unlike traditional IP-based network rules, SDSN will enforce those permissions and access privileges that are assigned to actual users across the network. Whether a user is behind a VPN, in the office, or on WiFi, if their computer meets the security requirements, they will be allowed access to the resources based on their permissions.

Juniper SRX firewalls

Juniper SRX next-generation firewalls are capable of meeting today's challenges in every respect. Besides their unparalleled reliability, they ensure secure access between networks using the most modern protection technologies. The firewalls are available in a rather wide performance range, from small companies with a few employees to large enterprises where many hundreds of gigabytes of traffic must be continuously matched to tens of thousands of rules. The products are available in virtual form (vSRX), with versions for VmWare, KVM or even Azure and Amazon, and even containerised versions (cSRX).

The main UTM and NGFW features included in the firewalls are as follows:

          • Webfilter
          • SSL Proxy
          • User firewall
          • IPS
          • Spam filter
          • Anivirus
          • Content filter
          • Icap továbbítás

A centralised, graphical and quite transparent management interface is provided for the firewalls by Junos Space Security Director.

Juniper EX and QFX switches

The Juniper switch platforms offer high-port-density, high-performance options to meet today's requirements for data centres and cloud infrastructures serving scalable solutions. As businesses grow, data centres must serve increasingly high network traffic while maintaining operation to be able to keep more and more users and devices connected. Using the Juniper data centre architectures, systems can be created that have dozens or even thousands of ports, with unmatched scalability and agility.

Modern data centres use IP fabric architectures based on EVPN-VXLAN, that is:

          • the IP fabric architecture allows the consolidation of traditional network layers into a two-layer spine-and-leaf architecture optimised to serve large-scale networks. Thus, this interconnected system at Layer3 is able to provide highly resilient and low-latency connections.
          • the IP fabric solution is based on an EVPN-VXLAN foundation, which enables the extension of networks and interconnection of data centres.

The Virtual Chassis technology is still available to serve smaller networks, greatly simplifying the management of interconnected devices.

Juniper has an offering of two families of switches for its customers. For larger, IP fabric-based networks, the Juniper QFX product family comprises a large range of products with a broad offering of ports as well as 40 or 100 Gbps uplink port speeds, while for smaller networks or island network systems, the very affordable EX product family is also available to our customers, consisting of a wide range of products.

All Juniper switches run the Junos operating system, which sets these products apart from the competition. They provide transparent management for our Customers thanks to the unified interface, well thought-out functions and commands.

 

Skybox Security Suite – effective network protection and transparency

The Skybox Security Suite is a multi-component software product combining efficient cybersecurity management solutions that provides unparalleled visibility into attack surfaces and reveals key exposures of the network. It is capable of integrating more than 120 security solutions in a single interface. Through analytics, modelling and simulation, it allows security experts to quickly prioritise or eliminate vulnerabilities and ultimately prevent and mitigate attacks.

Security Policy Management

Ensuring ongoing compliance is not easy. Security teams must constantly roll out new applications, update old ones, deploy next-generation versions of network security technologies, and all this is to be accomplished without any room for error. Skybox solutions make it possible to secure the networks for business applications by implementing compliance and firewall rules without increasing the attack surface beyond what is necessary or violating the security regulations.

SkyBox Firewall Assurance

With this component, all the corporate firewalls can be displayed in one single view, regardless of their brand, while ensuring continuous compliance monitoring, implementing firewall ruleset optimisation as well as facilitating attack vector detection and detection of other vulnerabilities. As described above, the module

          • identifies deviations from security policies and platform vulnerabilities in order to reduce attack surfaces;
          • visualises network traffic passing through our firewalls, enabling efficient debugging;
          • cleans up and optimises the firewall rules to maintain security and performance.

SkyBox network Assurance

This component visualises the network zones, regardless of how complex or intricate they are, displays the violations of policies and provides the visibility needed to reduce attack vectors and network discontinuities:

          • visualises and analyses the network as well as the interconnections and relationships between network devices and rules;
          • analyses the possible paths between any source and destination on the network, including the cloud, along with unknown accesses and attack vectors;
          • checks security zones, routers and switches for misconfigurations and vulnerabilities;
          • performs troubleshooting of connections between network zones in a virtualised model to prevent discontinuities.

SkyBox Change Management

This module puts an end to the addition of risky changes thanks to its ability to perform a risk assessment based on its knowledge of every element of the network. Furthermore, it helps accelerate network changes with customisable process management and automation.

          • assesses rule proposals in terms of exposure to vulnerabilities and regulatory compliance;
          • accurately identifies firewalls that require changes;
          • produces a detailed plan from the change request in order to ensure a fast and error-free implementation;
          • automates and optimises the lifecycle management of rules;
          • verifies that changes have been configured in accordance of the original requirement.

Vulnerability and Threat Management

Enterprise networks continue to remain under constant threat, with up to thousands of vulnerabilities potentially occurring at any given moment. Inside an ever-growing and increasingly complex network, the ability to detect and eliminate the most critical attack vectors before they get exploited by attackers translates into a huge advantage.

Vulnerability Control

Skybox Vulnerability Control goes beyond the capabilities of traditional vulnerability scanners. It can identify exposures and prioritise risks utilising deep analysis methods and attack surface information extracted from the network model. This helps take care of blind spots so as to quickly focus on the right area. The module can:

          • see through all vulnerabilities to eliminate the actual attack vectors;
          • map the potential impact of a newly introduced vulnerability on the system within minutes, without having to wait for the completion of a scan;
          • assign network and security control contexts to vulnerability scans for the sake of more accurate prioritisation;
          • use daily updates from Skybox Research Lab to detect vulnerabilities and attack vectors.

Threat Management

Skybox Threat Manager helps security managers keep up with the latest threats, alerting them to the latest information and advice that could have an impact on critical assets as well as highlighting response options that are relevant to the particular environment.

          • Automates the collection and normalisation of threat/vulnerability information;
          • helps establish rapid correlations between threats and the relevant IT infrastructure;
          • shows the recommended response and prevention actions and steps;
          • Integrates the steps into a fault ticket management workflow for the sake of traceability and retrievability of the response actions.

 

Server and storage solutions

We undertake the design, scaling and implementation of complete server and storage-side hardware solutions according to the following criteria:

          • Server infrastructure scaling for a given current and expected future load
          • Scaling of storage infrastructure for a given current and expected future load and capacity growth
          • Design, scaling and implementation of SAN networks between servers and storage
          • Design, SAN network integration and configuration for backup target devices (tape backup device, disk-based backup device)
          • Configuration and installation of auxiliary equipment for the above devices, such as: rack cabinets, PDUs, consoles, etc.
          • Mapping, design and parameterisation of IT networks

Hewlett Packard Enterprise Proliant servers

The HPE Proliant servers have gained the trust of our Customers thanks to their high reliability, flexibility and easy management.

Our portfolio offers the right solution for organisations of all sizes.

          • ML tower servers
          • ML30 server: a single processor server for smaller organisations, corporations and remote sites
          • ML110 server: a single processor server that can now accommodate higher performance Xeon processors for smaller enterprises and remote sites
          • ML350 server: a dual processor server with flexible expandability, which makes it ideal for small, growing companies and remote sites of larger enterprises
          • DL rack-mounted servers
          • DL20 server: a single processor server for smaller businesses and remote sites
          • DL160 and DL180 servers: dual processor servers with flexible expandability, which makes them ideal for small, growing companies and remote sites of larger enterprises
          • DL300 series:

The Proliant DL300 Series includes models with high expandability and enhanced redundancy that are truly capable of meeting every need

          • The Proliant DL360 and DL380, two of the world's most popular server models, are ideal for mixed workloads in midsize businesses with their high scalability and flexibility
          • Models with AMD EPYC server processors are again available, such as the Proliant DL325 and Proliant DL385

HPE storage solutions

          • Entry-level storage solutions:
          • The modular Smart Array entry-level market-leading storage devices may satisfy the needs of small and midsize businesses. The storage devices can be connected via FC / SAS / iSCSI depending on configuration.
            With flexible configurations of the HPE MSA 1050, MSA 2050 and MSA 2052 storage models, all users will be able to find the right storage solution for their needs. These entry-level storage solutions now support remote replication, so they can be utilised in a multi-site implementation, too.
          • Mid-range storage solutions:
          • The HPE 3PAR StoreServ 8000 Series is an ideal choice for mid- to large-sized enterprises with a maximum available raw capacity of as much as approx. 4 PetaBytes along with specialised hardware that guarantees high I/O performance.

The HPE 3PAR storage options are capable of both block-based and file-based serving, so they can even be used as a file server.

The Thin Provisioning and deduplication provided by HPE 3PAR models help reduce the initial investment cost by allowing the customer to purchase a lower initial disk capacity.

WSH Ltd is a Hewlett Packard Enterprise Silver Partner, and to achieve this, our specialists successfully met the requirements of the Hybrid IT specialisation as defined by HPE.

Lenovo DataCenter solutions

Lenovo ThinkSystem servers

We recommend the following Lenovo server families to our customers for their high reliability, good repair service options and value for money.

          • ST ThinkSystem tower servers
          • ST50 server: a single processor server for smaller organisations, enterprises and remote sites
          • ST250 server: a single processor server that can now accommodate higher-performance Xeon processors for mid-sized enterprises and remote sites
          • ST550 server: a dual processor server with flexible expandability, which makes it ideal for both small, growing companies and remote sites of larger enterprises
          • SR ThinkSystem rack-mounted servers
          • SR250 server: a single processor server for small businesses and remote sites
          • SR530 and SR550 servers: a dual processor server with flexible expandability, which makes it ideal for small, growing companies and remote sites for larger enterprises
          • The SR570 and SR590 servers, thanks to their high expandability and flexibility, are ideal for midsize businesses or other companies requiring mixed workloads
          • The high-performance SR 630, SR650 and SR670 servers are recommended even for High Performance Computing (HPC) services, besides setting up virtualisation environments
          • Blade systems

The Lenovo Flex System Enterprise solution has been developed based on IBM's highly successful BladeCenter solution, with the following key features:

          • Up to 14 servers can be installed in the chassis
          • Duplicated, high-speed InterConnect modules ensure high system availability to the outside world

 

Backup and archiving solutions

Taking care of data preservation, backups, recovery and archiving of data is a necessary and crucial aspect in IT. Designing a solution for these needs calls for an absolutely bulletproof approach, regardless of the size of the company.

When designing the procedure, the optimal solution must be created by considering a number of aspects, taking into account the requirements of all the systems, business processes and the specific data retention period. Nowadays, various standards and legislation prescribe requirements for the recovery of data and systems within a given timeframe in the event of a failure or a disaster - in order to ensure business continuity.

To meet these requirements, the solutions we offer and support include products from major vendors. The products available for the solutions may differ in terms of functionality, reliability and value for money. Thanks to the knowledge and experience of our systems engineers, we are always able to put the optimal solution together (both hardware and software) for our customers in order to help preserve, recover and archive their critical data – whether physical/virtual, simple/complex, small/large, a private or public cloud.

 

VERITAS

Veritas Backup Exec

Reliable backup and recovery

Backup Exec provides a reliable backup and recovery solution for growing businesses. Easily protect more data while reducing data storage costs and improving backup performance with integrated deduplication technology. Reduce business downtime thanks to the unique technology that helps restore crucial Microsoft applications as well as VMware or Microsoft Hyper-V virtual environments in seconds – so you can recover an entire application, an e-mail, or a particular file or folder. Experience the simplicity of operation and scalable infrastructure support that makes it simple to achieve your restore point goals with persistent data protection technology, and easily manage any Windows or non-Windows system from a single console.

System Recovery

System Recovery is a standalone, disk-based backup and recovery solution for small businesses. This simple, cost-effective solution helps minimise downtime and avoid disasters by making it easy to recover individual files or folders, or even entire Windows systems within minutes. It can also scale to larger environments using Backup Exec.

Veritas Enterprise Vault

Archive, store, manage and search for critical business information

Enterprise Vault provides a software-based, intelligent archiving platform that stores and manages enterprise data extracted from e-mail systems, file server environments, instant messaging platforms, content management or collaboration systems. Because not all data is created equal, Enterprise Vault utilises intelligent classification and retention technologies in order to acquire, classify, index and store data, while enforcing corporate policies and protecting corporate assets, yet reducing data storage costs and simplifying management at the same time. Enterprise Vault also offers specialised applications, such as the Discovery Accelerator and Compliance Accelerator modules, that search archived data to support legitimate research, content compliance, knowledge management as well as data security initiatives.

 

VEEAM

Archive, store, manage and search for critical business information

Enterprise Vault provides a software-based, intelligent archiving platform that stores and manages enterprise data extracted from e-mail systems, file server environments, instant messaging platforms, content management or collaboration systems. Because not all data is created equal, Enterprise Vault utilises intelligent classification and retention technologies in order to acquire, classify, index and store data, while enforcing corporate policies and protecting corporate assets, yet reducing data storage costs and simplifying management at the same time. Enterprise Vault also offers specialised applications, such as the Discovery Accelerator and Compliance Accelerator modules, that search archived data to support legitimate research, content compliance, knowledge management as well as data security initiatives.

Veeam Availability Suite

Veeam Availability Suite™ is Veeam's leading product. It provides private cloud and virtual workload availability though Veeam Backup & Replication™ and Veeam ONE™ solutions. Veeam Availability Suite enables the Availability for the Always-On Enterprise™ standard. Utilizing server virtualization, modern storage and the cloud, keeping SLA-s, acceptable outage limits and data loss (RTPO™) are kept under 15 minutes for EVERY application and data.

Veeam Backup Essentials

Veeam Backup Essentials™ is a powerful, simple to use, and cost-efficient backup management Availability solution for small businesses. Optimized for small and medium businesses with less than 250 employees, and virtual environments with maximum 6 CPU sockets, Veeam Backup Essentials provides the same features as Veeam Availability Suite at 60% of the cost.

A Veeam ONE

Unified solution for monitoring virtualized environments with management and reporting funcitonality.

 

Further information about Veeam products...

 

Acronis

Acronis, a company also providing data security for Formula 1 teams, offers one of the fastest backup and recovery services in the world, available both in cloud and hybrid designs. It allows you to back up data from any type of device (mailbox, PC, notebook, server, etc...) and uses military-grade encryption. With support for more than 20 platforms, Acronis Backup Cloud is available as a usage-based service with a monthly subscription, so that the solution can be flexibly tailored to the needs of businesses.