We provide comprehensive project services, from defining requirements, designing solutions, and supplying the necessary technology, through to the implementation and support for the core IT infrastructure—covering compute, network, and storage layers. 

From initial business case development and vendor alignment to evaluation and commercial management, we support our clients at every step of core infrastructure and end point computing refresh projects.

Our key service areas:

  • Competitive Vendor Engagement
  • Scope Alignment
  • Evaluation
  • Technical Orchestration (e.g., various ‘X’aaS consumption options)
  • Implementation Services
  • Technology as a Service (TaaS)
  • Trade-In Options
  • Support & Maintenance
  • Full Recycling, eWaste Management, Data Destruction & Certification

Our process

While our clients typically oversee the overall project process, our involvement in the design phase is detailed within a Statement of Work (SoW). This outlines specific tasks, responsibilities, and client prerequisites essential to advancing through each stage of the engagement process.

Timelines may vary depending on project size and complexity, with average project durations of around 3 months.

Concept

  • NDA
  • Presales study
  • Proposal

Initiation

  • Project definition workshop
  • Detailed discovery
  • Logical design
  • Requirement definition
  • Project management

Design

  • Detailed design
  • Solution configuration
  • Design document
  • Client sign off

Validation

  • Proof of concept (POC)
  • Test plans
  • Required amendments

Implementation

  • Site survey
  • Site preparation
  • Installation
  • Build notes

U.A.T

  • Design
  • Test plans
  • Amends via change control
  • Re-test

Refresh

  • Roll out plans
  • Roll back plans
  • Final testing

Migration

  • Non critical services
  • Critical services

Handover

  • Training programme
  • Transitional onsite support
  • Customer pack

Review

  • Post implementation workshop
CONTACT

Protect your organisation

Schedule a call to learn how we can help you safeguard your organisation
from ever-evolving cybersecurity and data protection threats.

Schedule a call to see how we can support your organisation