Integr8 Nerve Centre – Integr8 Group

By: Integr8 Group  11-11-2011

Companies have increasingly turned to technology to improve efficiencies and drive growth.  However, managing the technology they have installed has, in itself, become a challenge and has often placed a serious drain on resources.

At the core of all of Integr8’s technology offerings is the ability to holistically and effectively manage a company’s ICT. This is largely due to the state of the art management hub we have designed and built.

The Integr8 Nerve Centre® is, as its name suggests, the nucleus of our IT management offering. Based in Johannesburg, the Nerve Centre® includes some of the world’s finest technology. With the flick of a switch, our engineers can access your ICT systems and conduct running repairs, security updates and even remote audits to ensure optimal operations.

Running on a robust business network we run terabytes of data through our Nerve Centre® every day. Our first-level support is available 24/7 and we also have tier-3 support available around the clock should escalation be required. Our Nerve Centre® offers the following services:

AGENTS

Regardless of the size of your business now you can experience the rewards in operational productivity and increased profitability through IT automation. By implementing a comprehensive and integrated solution with the power, flexibility and scalability to meet your needs today and expand as your business grows, IT automation enables a pro-active approach to improved operations and customer satisfaction. From Software Inventory to Remote Desktop Management, G8keeper provides the tools, technology and resources that make complete IT automation possible.

Automation is a key factor in the delivery of successful IT Services. G8keeper provides unparalleled automation of the everyday services you deliver so that you can create and automate services on demand.

Through Agent Procedures, G8keeper provides pro-active service delivery capabilities that result in increased productivity, consistent service levels, and maximum utilization of staff, expanded service capabilities, cost reduction and much more!

ANTIMALWARE

Detect, destroy, and prevent malware while leveraging the automation capabilities of the G8keeper IT systems management framework.

Customer networks face a variety of threats day in and day out. Some of those threats require a specialized tool to identify, analyze, and remediate. G8keeper Antimalware, powered by Malwarebytes, is an easy-to-use, simple, and effective anti-malware application with complete integration into the G8keeper framework.

G8keeper Antimalware monitors every process and stops malicious processes before they even start. The real-time protection module uses an advanced heuristic scanning technology that monitors your system to keep it safe and secure. In addition, we have implemented a threats center that will allow you to keep up to date with the latest malware threats

BACK UP

Experience the power of G8keeper’s Backup to implement real-time automated disk remote backup, disk imaging and bare metal restore for Windows servers and workstations.

G8keeper Backup is feature rich including:

  • Bare metal restores
  • Synthetic Backups
  • Robust status monitoring and alerting
  • Machine imaging

The solution is part of G8keeper’s IT Automation Framework, giving IT Professionals the ability to deploy, configure, manage, monitor, secure, back up and restore distributed systems from a single management console. With backups being foundational for today’s IT environments, having a robust, reliable, and easily managed tool can ensure the recoverability of your IT infrastructure. Being able to address multiple forms of loss has also become critical. Is it a workstation or is it a server that needs a restore? Is a bare metal restore required? Is it a physical device that needs to be brought online quickly in a virtualized environment? All these possibilities should be considered when choosing your backup tools. G8keeper Backup provides real-time automated disk remote backup, disk imaging and bare metal restore for Windows servers and workstations. Unlike conventional file-based only products, G8keeper Backup creates an image of the entire system state – including operating system, business applications, user settings, drivers and data – giving administrators the framework to completely rebuild a downed system in less than an hour.

The solution is part of G8keeper’s IT Automation Framework, giving IT Professionals the ability to deploy, configure, manage, monitor, secure, back up and restore distributed systems from a single management console.

DESKTOP MIGRATION

Swapping users and computers is finally easier done than said.

G8keeper’s Desktop Migration allows admins to schedule regular backups of settings and to collectively migrate settings to groups of users without touching any machines directly.

If you’ve been doing IT for a while, chances are you’ve been asked to do the classic waterfall upgrade. The CEO get’s a new laptop, so his 6 month old machine get’s passed to a VP, who’s laptop gets passed to a Director, and so on down the line. Have you been asked to do a network-wide upgrade to Windows 7? Migrating users from one machine to the other or even one OS to another can be time consuming and painful. With G8keeper’s Desktop Migration module, moving users between machines can become an easy, centrally managed task.

With Desktop Migration, admins can specify which system settings, applications settings, and files should be backed up. Different settings profiles can be created and applied to any machine or machine group. Systems settings include windows OS settings such as Desktop shortcuts, Screen saver, and wallpaper. Application settings include parameters from Microsoft Office Suite settings, Adobe Acrobat, Blackberry Desktop, Firefox, and Skype. Files can be backed up and/or excluded based on file name, folder name or even File Types

INFORMATION CENTRE

G8keeper offers comprehensive reporting on all assets under management.

The core sets of functions performed by the G8keeper framework are: deployment, configuration, execution, update, logging, reporting, monitoring and remediation. These functions are part of the core tasks an IT professional performs on a daily basis. The Info Center module is an integral part of this framework which allows for assembling of the data from the other pieces of the framework into actionable business intelligence.

IT Professionals need quick and easy access to the details of their networks. The ability to accumulate, track and analyze data over time is invaluable for tactical and strategic planning.

IT Professionals need quick and easy access to the details of their networks. The ability to accumulate, track and analyze data over time is invaluable for tactical and strategic planning.

The G8keeper IT Management Platform provides comprehensive integrated reporting for all data collected and stored in the system. From hardware and software inventory to bandwidth usage and server uptime, G8keeper provides IT Professionals the information they need to effectively manage and convey the status of the network infrastructure.

MONITORING

Proactive monitoring of servers, workstations, remote computers, Windows Event Logs and applications is critical to security, network performance and the overall operations of the organization.

What is the average time it takes for a user to call when a server goes down? How often do you know the server is down before they call? There isn’t a way for one IT professional to watch all the critical services under their management. IT Professionals need to know what is going on with the systems within their networks. Proactive monitoring of servers, workstations, remote computers, Windows Event Logs and applications is critical to security, network performance and the overall operations of the organization. Down time is not acceptable.

PATCH MANAGEMENT

Automatically keep computers up-to-date with the latest patches and updates.

Fast and easy to update.

  • Up and running in minutes
  • No software to install
  • The G8keeper server automatically installs needed software components transparently
  • Easy administration of users and policies

G8keeper Patch Management automatically keep servers, workstations and remote computers up-to-date with the latest important security patches and software updates.

IT Professionals know that when their network is at risk, the organization is at risk. It is a challenging task to keep up with and apply security or software updates within the IT infrastructure. Especially if the networks span multiple locations, include multiple domains, traverse multiple firewalls, and include remote and home users.

Patch management is not just scanning and applying patches. Often patches need to be deployed in a test environment, undergo an approval process or require multiple steps to deploy. G8keeper provides the tools and infrastructure to enforce policies and to easily address the complexities of software and security patch deployment.

SERVICE DESK

An ITIL-ready, automated and fully configurable service desk solution.

G8keeper Service Desk includes a built in Knowledge Base which allows your Service Desk staff to:

  • Quickly find related known error data, resolutions and workarounds
  • Convert tickets into Knowledge Base articles
  • Provide end user accessible Knowledge Base search capabilities

With G8keeper Service Desk it’s easy to track, automatically calculate and/or enforce employee time allocations on service requests. With the built in reporting, track the productivity of employees and document incidents that prove the most time consuming.

ANTI VIRUS

What sets G8keeper Antivirus apart from stand-alone solutions is the embedded integration approach.

Powered by the powerful Kaspersky Labs antivirus engine, G8keeper Antivirus for Windows Workstations provides complete protection on networks and beyond from potentially dangerous programs and network attacks.

The robust G8keeper VSA framework and agent technology enable a Single Pane of Glass methodology for Administrators to configure and deploy G8keeper Antivirus across the network while providing real-time status updates and alerts to ensure maximum security

AUDIT AND INVENTORY

Good data empowers good decision making.

Having good data at your fingertips means that you can make better decisions, give better answers, and have a better understanding of the current state of your endpoints. G8keeper’s Audit can grab every piece of useful data from your managed machines.

Having comprehensive data allows you to:

  • Close security holes
  • Reduce interoperability issues
  • Examine hardware/software policy issues
  • Inventory computers without interrupting the user

With our Audit and Inventory, knowing and tracking every system and software detail becomes simple, efficient, and reliable no matter where the machines you need to manage are located.

You and your team may manage multiple computers and perhaps in many locations. Quite often whoever fills the IT role is expected to know each machine by name and category and to be able to provide per-department IT costing and inventory information. If your network has more than about 20 machines, managing those machines can become very difficult. IT professionals faced with the challenges of tracking IT resources would benefit from a complete hardware inventory and software inventory of the servers, workstations, and mobile computers on every network.

Unfortunately, many IT professionals end up having one system for inventory, another remote access, or even a separate system just for chassis or serial number tracking.

G8keeper’s Audit and Inventory is a core feature of G8keeper’s IT Automation Framework. With our Audit and Inventory, knowing and tracking every system and software detail becomes simple, efficient, and reliable no matter where the machines you need to manage are located.

DESKTOP POLICY MANAGEMENT

G8keeper frees network professionals of their day-to-day chores like computer auditing.

Define and manage desktop standard settings and configuration of a group of machines specific to individual organizations or groups of organizations. Define standards of settings and configurations such as corporate wallpaper, IE favorites, and screensaver and deploy those settings across an entire group of machines.

Provide the flexibility for users to customize machines to their preference and personality, allowing for a higher level of productivity and user satisfaction. Along with standard organizational settings, backup individual settings on a recurring scheduled basis.

The integrated G8keeper Desktop Policy Management module provides an automated desktop mangement solution and enables the definition and deployment of group profiles for any range of control over the machines you manage. IT Professionals and Managed Service Providers can remotely deploy user customizations and machine “personalities” during operating systems, hardware or application upgrades, maintaining consistency across an organization and enforcing corporate standards. Combine G8keeper Desktop Policy Managment and Intel® vPro™ Technology and contribute to the global “Green initiative”. Experience increased productivity while pro-actively promoting energy efficiency.

END POINT SECURITY

Powerful add-on providing essential IT systems security protection.

Reporting on your current AV status is built right in to G8keeper’s Endpoint Security. No report configuration required, no separate app, or web page to load. It’s right there.

Of course G8keeper’s Info Center has a deep reporting feature set that allows for:

  • User defined reports
  • Scheduling
  • E-mail notification
  • Export HTML, Excel or Word

Security in today’s IT infrastructure is more about layers then about single points of defense. Protecting the outer layer of your network, your endpoints, can be absolutely critical. Endpoint protection starts with a strong Endpoint Security and malware detection and prevention engine.

With these challenges, how do you know if your endpoints are secure? Does every site need a local update server? Have you ever seen machines on the network but been unable to verify definitions, or scan status? What if you can’t get your AV vendor’s management system to push out the latest updates or version?

NETWORK DISCOVERY AND MONITORING

G8keeper Network Discovery allows you to find, catalog, deploy, view, manage and report on all IP devices on the network.

Simply said, if you cannot find everything connected to the network, you cannot manage it. The role of G8keeper Network Discovery is to find and catalog all IP based devices connected and interconnected to a network or networks.

Create a Network Discovery process that will run periodically to discover new devices or devices that are no longer visible within the network and provide for automated agent deployment for instant management of Windows, Mac and Linux devices.

Network Monitoring utilizes SNMP to provide a graphical view of CPU, RAM, Disk and Network Interface data. As is the case with all G8keeper functionality, the Network Discovery and Network Monitoring is completely integrated within the G8keeper framework to ensure a Single Pane of Glass web-based interface for network administrators

REMOTE ACCESS WITH LIVE CONTENT

Quickly, securely and non intrusively access and manage computers from anywhere.

To increase productivity and responsiveness, IT Professionals frequently need to access servers, workstations and mobile devices securely, quickly and without impacting the productivity of users. The G8keeper Web based, integrated IT Management Platform delivers a complete, fast and secure remote access and remote control solution for you and your users even behind firewalls and NAT. We call this technology Live Connect.

Live Connect provides a robust and powerful single machine interface to give you full control over your endpoints with minimal end user interruption.

But it’s much more than remote control! Now you don’t need to take control to be in control! With G8keeper’s fully integrated, home-grown remote access technology, using only a Web browser, IT Professionals can quickly, securely and non intrusively access and manage computers from anywhere. With G8keeper, you have the tools, flexibility and information you need to resolve issues without hindering the productivity of the users.

Live Connect is built to help you resolve an issue without taking remote control and interrupting the user from doing their job. Begin leveraging technology to do more remotely and quickly resolve issues no matter where you are.

TICKETING

Highly-repeatable, best practice IT management in a highly-integrated, single pane of glass interface.

Our products are highly configurable to meet each customer’s specific need.

You can accomplish this with a complete, secure, reliable and full service IT Systems Management Solution that will meet your needs today and provide the scalability you need for the future.

G8keeper is the ultimate solution for automating recurring IT tasks. With G8keeper, IT professionals can offer extended service capabilities with better service delivery. And, with optional configurations, maximum scalability and multiple domain capabilities, IT departments or service providers of all sizes can experience the rewards of IT automation.

Highly-repeatable, best practice IT managementin a highly-integrated, single pane of glass interface.Our products are highly configurable to meet each customer’s specific need.Pre-configured bundles:
You can accomplish this with a complete, secure, reliable and full service IT Systems Management Solution that will meet your needs today and provide the scalability you need for the future.G8keeper is the ultimate solution for automating recurring IT tasks. With G8keeper, IT professionals can offer extended service capabilities with better service delivery. And, with optional configurations, maximum scalability and multiple domain capabilities, IT departments or service providers of all sizes can experience the rewards of IT automation.


Other products and services from Integr8 Group

11-11-2011

Procurement – Integr8 Group

Because we buy in quantity and have negotiated the very best price available, we can pass our savings on to our customers, ensuring you get not only the best equipment for your particular requirements, but that you get it at the most attractive prices.