Services We Provide
In order to maintain customer confidence, information systems must be dependable. No matter whether the business application is accessed through the web or an internal legacy application on the mainframe, customers must feel that the data is both current and accurate, there is assurance of high system availability, that system interaction is intuitive and that they are operating in a secure environment. To accomplish this, the information system must be maintained at the optimum level.
MOJA applies industry best practices to managing information systems with the objective of sustaining a stable and secure operating environment. Security technologies are utilized to conduct continuous security monitoring. Performance technologies are utilized to monitor production systems to provide assurances that there are no degradations in performance and that the application is performing as expected and not exposing sensitive information or introducing risk. Clients with geographically dispersed locations receive the same level of quality service as their primary site.
The help desk serves as a problem resolution center that serves as the primary interface for users to request support. Response to Help Desk request is made according to priority assigned at the time of request. Help Desk Team members determine if escalation is required and if necessary, escalate to the appropriate tier level. Help Desk Team members provide ‘regular’ status updates for critical and high priority open issues. All users are notified on the progress and resolution of their issue. Response time is compared and managed to the Service Level Agreement.
User entitlements should be continuously assessed. Users pose a significant threat to sensitive enterprise information. We encourage organizations to adopt a Least Privilege Policy whereby users are assigned system privileges based on requirements to do their jobs and nothing more. Conducting regular user entitlement reviews provide auditors and IT advisors with a detailed view of an organization’s data ownership, access controls, and rights to sensitive information.
Networks are continuously monitored to detect security vulnerabilities and to discover any performance degradation. Support is provided with installs, updates and maintenance of firewalls, switches, routers, and other ancillary equipment and software products.
Application database performance is continuously monitored to detect unusual behavior and to isolate the source. The root cause of performance bottleneck(s) are identified, optimization plans are developed and implemented for maximum performance. Maximum continuous performance for the application requires that the instance, transaction workload, operating system and virtual machines supporting the database are all optimized.
The public expects to gain access to information from any location at any time on any device. This poses a potential security risk. New mobile devices constantly emerge and cycle in and out of existence. Securing each device is a monumental task. Our suggested security approach would be to implement an application-control strategy that covers internal applications and external web-based applications. Management proactively limits what kinds of enterprise information can reach some or all devices.
Enterprise Security Support
The introduction of security solutions into the enterprise to address possible security vulnerabilities is an on-going process. Procedures are applied to protect hardware, software, networks and information. Computer security programs are developed and implemented which educate users on computer security issues, provide for disaster recovery, continuity of operations, contingency planning, intrusion detection and risk assessment. Assistance is provided in maintaining the enterprise System Security Plan and Cyber Security Program Plan.
Software maintenance is conducted employing our System Engineering Methodology (SEM), iterative process activities associated with the planning and development stages of the information systems development lifecycle. Our SEM practices lowers risk and improves quality. Maintenance to applications may be for the following reasons: Corrective maintenance, Adaptive maintenance, Perfective Maintenance or Emergency Maintenance
Activities are an integral part of the Enterprise Quality Program. Configuration Management (CM) will support the development and maintenance of databases, interfaces, software, hardware, regression test and documentation for products and services.
Our Configuration Manager is responsible for maintaining the CM Repository, ensuring that all developers adhere to the CM Plan and procedures. Configuration control will be applied to systematically control changes and maintain the integrity and traceability of all work products throughout the life of the system.
System documentation is maintained to reflex the current level of development or changes. User manuals are updated as applications/functions are modified.
Backup and Recovery
Daily backup operations are performed to ensure all required file systems and system data are successfully backed up to the appropriate media to allow for system reconstruction. Media is recycled and sent off site as necessary. Regular testing of recovery/restore procedures is conducted.
As new applications or technology is added or modified, users are provided the appropriate training. Users are also provided with security awareness training. A survey is conducted once a year to assess customer satisfaction.
MOJA staff is continuously engaged in process improvement to introduce new technology or solutions that might bring about a reduction in operational cost or realize an increase in productivity for our client.