Local Area Networks
Local area networks play a critical role in the communications infrastructure of almost any company. For even the smallest client, the LAN can be the life-blood of their business and its functionality has become as crucial to their operation as the telephone.
In a market segment where the technology is changing every twelve to eighteen months, LAN design can become a complex and confusing process. Even the most advanced users and IT organizations recognize the difficulty in staying abreast of the features and functionality of today’s local area networking equipment.
Affinity Partnerships offers a wide range of network design services customized to our clients’ needs. With expertise in all local area networking technologies, and extensive server architecture knowledge, we can offer our clients designs that are optimally suited to their requirements.
Our service offerings include: Benchmarking and analysis of existing local area network infrastructures. Thorough needs analysis with client’s technology group. Design of systems and network infrastructure and topology. Identification of single points of failure and mission critical components. Development of specifications for LAN hardware and network management systems. Preparation of bid documents and management of bid process. Coordination and management of equipment installation.
Wide Area Networks
Installing an intra-state or global wide area network can be a daunting task involving interfacing with carriers, Internet Service Providers (ISPs) and installers. Affinity Partnershipshas the experience you need to implement MPLS, Frame Relay or dedicated satellite circuits. We can provide design, specification, project management or installation oversight.
Enterprise Network Planning, Consulting and Installation
Complete network design services from concept to implementation, if desired. Cabling and wiring design and oversight can also be performed.
Providing Microsoft Windows, Small Business Server and BackOffice Integration and optimization.
Exchange Server deployments and migrations
Active Directory planning, integration and deployment
Group Policy implementation
Windows to Windows migrations (all versions)
Novell to Windows migrations
Linux and Unix network integration, and co-existence with Windows networks
SQL Server installations
Proxy Server installations
Application Consulting and Design Services
Application Testing and Sizing of your applications to determine if they will scale before you deploy. We can also provide automated scripting and integration of complex database systems with custom solutions.
System Management and Optimization
We provide traffic analysis for voice and data networks, cable auditing, and system auditing. We can assist you in developing an effective approach to overall system management. Services also include data recovery and whiteroom disk drive recovery.
We have the experience and certification to address all your wireless requirements. We’ve done a significant amount of work for customers doing building-to-building bridging (for example, to avoid the costs associated with trenching to install (fiber), in-building wireless access points, free space optics (FSO), and long-distance microwave applications.
A secure network comprises of several modules. We have partnered with best-of-breed product vendors in the differing security modules. As a result we are able to offer you a high performance security solution. We work with you from the ground up or integrate any one of the following solutions into an existing network infrastructure. Our solutions ensure the confidentiality, integrity and availability of your network systems and data.
Anti-Virus and URL Filtering
Malicious code, viruses and spam protection with our gateway e-mail solutions, corporate desktop and internal mail system’s protection. Content filtering solutions, web usage logging and employee Internet management.
Perimeter and internal network security for your global enterprise-networks and home offices.
VPN’s (Virtual Private Networks) & Encrypted Remote Access
Secure, encrypted client and gateway hardware and software VPN solutions.
Intrusion Detection Systems
Host or network based intrusion detection systems monitor for suspicious activities on the network or server. Configurable parameters and attack signatures alert you so that you are able to respond to events. They provide an added level of security additional to your firewall.
IP Address Space Management
Manage DHCP and DNS across global networks, our solutions resolve user names against leased IP address, providing an effective audit trail and logging system.
Reporting, Logging and Alerting
Reporting and alerting solutions to help you make sense of your vital log data. Event correlation and security incident notification solutions.
Our computer network technology assessments can provide you with a baseline analysis of where you are. When you need to know what you don’t know, this is the solution. Our technology assessments can review your entire network, from the physical to the application layer, leveraging the OSI model, to give you a top to bottom perspective of how you’re doing, where you need to improve, and what we’d recommend as potential solutions. Our technology assessments will lay things out in a prioritized manner, so that you can effectively plan and budget for your information technology investments.
Our computer network security assessments are similar to our technology assessments but focus only on the security aspects of your network. This can include a best practices review, penetration testing and analysis and a review of your perimeter and internal security mechanisms.