Services

Enterprise services

Integration services for optimization of business processes

OSI Enterprise services include consulting services and outsourcing. Enterprise services are provided in collaboration with customer’s team and resolving challenges, posed by information technology, with the aim of achieving the best use of existing technology, new requirements and combination of vendor solutions and open source software.

At Enterprise services we offer our customers complete implementation with the involvement of domestic and foreign partners.

Read more

Professional services

Main scope of our professional services is to help our customers to gain maximum added value from existing investments. We provide following professional services:

  • Consulting;
  • Analyses;
  • Design and planning;
  • Prof of concepts;
  • Implementation.

Infrastructure services for optimization of performance and costs of existing components of the network, data center and security infrastructure. Key areas of this infrastructure services are services of planning, consulting and integration of data centers, secure authentication and authorization, digital identities and protection of data with PKI technologies. Services:

  • Virtualization of data center.
  • Licensed and performance analyze and optimization of software and hardware of data centers.
  • The construction and upgrading of data center.
  • Establishment and management of control and help desk systems.

Services of introduction of solutions of identity management, rights and audit trails.

  • Analysis of state of digital identities and establishment of identity management for providing unified identities in intranet and WEB SSO for internal and external applications.
  • Analysis of rights, planning and implementation of appropriate protection of accesses by the principle: ”Minimum rights for complete implementation of working process” (”Need to know principle”), with complete system of access recording, which is consistent with the law, state and technological regulations.
  • Analysis and introduction of central identity provider (Enterprise ID).

Services for data protection with mechanisms of digital encryption, masking and time-stamping, based on cryptographic mechanisms.

  • Analysis of requirements and selection of optimal software.
  • Planning and implementation of infrastructure.
  • Planning and design of solutions for data protection.
  • Digital signature.
  • Timestamp.
  • Central authentication system.
  • Counseling and establishment of data protection with secure authentication mechanisms: digital certificate, one time password.
  • Analysis of requirements for protection against run-off data, introduction of PKI solution and encryption of documents.

Technical protection of critical information on infrastructure level.

  • Planning and ensuring in accordance with regulations: ZVOP, ZEPEP, PCI, ISO27001.
  • Analysis of security of applicative solutions and planning of higher level of protection, including solutions of stronger authentication, unified authentication, traffic protection against applicative and data servers.
  • Protection of applicative servers by preventing exploitation of weakness, such as XSS, SQL injection, exceeding memory …
  • Review of security of infrastructure.
  • External and internal security check (can replace the main point).
  • Review of security of applications.
  • Static analysis of source code.
  • Dynamic analysis with review of application and implementation of penetration tests.
  • Introduction of a system for recording access to data based on user identities and recording events of logging into the central system.
Read more

Cloud services

At cloud services we enable our client a secure and continuous transition to use of cloud services. We provide analysis of transition to the cloud, integration of cloud services into the existing data center and relocation of service to the cloud where this is reasonable.

  • Database as a Service;
  • Backup as a Service;
  • IaaS;
  • PaaS;
  • Relocation of data to the cloud;
  • Integration of CLOUD identities with enterprise identities.
Read more

Managed services

With managed services we implement external services from help after ored to full external solution management to enable full and optimal functioning of IT environment to the customer.

  • External maintainance of an appropriate time response (SLA).
  • External implementation of clients infrastructure and services (SLA).
  • External implementation of custom services.
Read more
Want more information?