A set of documents for it infrastructure of the enterprise. What does the IT infrastructure of an enterprise include? Branch corporate network

IT infrastructure is a complex of interconnected information systems and services that ensure the functioning and development of enterprise information communication tools.

IT infrastructure is not just the foundation for the existence of any modern company, IT is now becoming a strategic asset that drives the business. Building a reliable IT infrastructure that satisfies the company's business processes is a difficult task that is practically impossible to solve on its own by the company's IT department. Most importantly, the IT infrastructure must meet the business needs of the company. In order to organize a truly reliable, high-performance and scalable IT infrastructure, you need to have a large number of highly qualified specialists, as well as considerable experience in building IT infrastructures.

Corporate information system (KIS) is an integral part of the IT infrastructure, which includes information centers, databases, communication and collaboration systems. When building a corporate information system (CIS), it is necessary to take into account a number of important factors. So, for example, a common mistake many companies make is that they first implement an ERP system, and then companies face the fact that the infrastructure is not ready to service this system. IT infrastructure is the core of all other information systems or business applications. And the work of all other applications, ERP systems, databases, and as a result, the business as a whole, will depend on how the IT infrastructure is built, how reliable and efficient it is.

Simplified diagram of the corporate information system (CIS)

Stages of creating the company's IT infrastructure:

Development and approval of technical specifications. Terms of Reference (TOR) is a document that includes all the customer's requirements for the information system being created.

    Project development. After the approval of the terms of reference, a working project is developed - a document containing a technical description of the implementation of the requirements specified in the terms of reference.

    Implementation. At the stage of implementation, the physical implementation of the developed project takes place.

    Creation of executive documentation. The final stage of creating an IT infrastructure is the creation of executive documentation. The executive documentation contains a detailed description of the IT infrastructure required for the use and maintenance of the created corporate information system.

At the stage of implementation of the enterprise IT infrastructure, LanKey produces:

  • Creation of engineering systems and SCS (Structured cabling system). SCS is a combination of low-current and power (electrical) networks. As part of the creation of engineering systems, laying, installation of cable routes, installation of outlets, cross-connection of patch panels, wiring and connection of electrical networks, equipment of a server room, creation of ventilation and air conditioning systems, installation of centralized uninterruptible power systems (UPS) are carried out.
  • Creation of network infrastructure. Installation of active network equipment, creation of wireless Wi-Fi networks. For large premises and buildings, Wi-Fi networks are built on the basis of CISCO or 3COM WLAN controllers, which provide client roaming and access point control. In small rooms, the Wi-Fi network is built on the basis of WDS technology.
  • Installation of automatic telephone exchange (automatic telephone exchange). Installation and configuration of automatic telephone exchanges, programming of work logic, connection to city telephone networks or IP-telephony service providers are carried out.
  • Supply of equipment and software. In accordance with the working project, the equipment and software are supplied.
  • Installation of server hardware. Installation and connection of server equipment, data storage systems, backup systems is being carried out, commissioning and commissioning are being performed.
  • Implementation of server virtualization systems. Server virtualization implies the simultaneous operation of several virtual machines on one physical server. Virtualization can significantly reduce hardware and software costs, simplify the information system, increase the flexibility and reliability of IT infrastructure, and reduce energy and maintenance costs. We are implementing Microsoft Hyper-V and.
  • Implementation of basic network services based on TCP / IP protocol. Installation of DHCP, DNS, WINS services is in progress. DHCP (Dynamic Host Configuration Protocol) is a protocol that allows you to automatically configure the network parameters of all devices connecting to the network, assigns an IP address, mask, gateway, DNS, etc. DNS (Domain Name System) is a server that provides domain name resolution in an organization. WINS (Windows Internet Name Service) is a NetBIOS computer name resolution server.
  • Implementing Windows Domain and Active Directory Directory Services. The Active Directory directory service is the core of the information system. It provides storage and management of information about all users and devices. Active Directory is the single point of authentication and authorization for users and applications across the enterprise. The domain structure is built based on the needs of the business, the requirements of the security policies planned for the implementation of applications, the number of departments and subsidiaries, and much more. A site structure is created, replication mechanisms are configured depending on the geographical location of the company's offices. In accordance with administrative requirements, the structure of organizational units is being built, users are united into domain groups based on their belonging to a particular department of the company, etc. Group policies are assigned to all users and computers, with the help of which security policies are distributed, printers are assigned, applications are installed, etc. The deployment of the directory service is based on the Windows Server 2008 R2 operating system.
  • Deploying file servers. File servers store common company documents and make them available to all users in the enterprise. A tree-like structure of folders is created, each of which corresponds to certain departments of the company, and has unique permissions. Domain groups are used to differentiate access to folders. Windows-based file servers are accessed using the SMB (CIFS) protocol. File servers are deployed based on Windows Server 2003 R2 or Windows Server 2008 operating systems.
  • Implementation of print servers. Print servers provide management of all printers in an organization and also provide access to printers to company users. Printers are grouped by department, by location, and pooled by ownership to provide load balancing. Print servers store and manage print queues. Deployment of print servers is based on Windows Server 2003 R2 or Windows Server 2008 operating systems.
  • Database management systems (DBMS) implementation. DBMS provide storage, access and management of application databases. The main products in the database management systems market are Microsoft SQL Server and Oracle. For applications such as 1C Enterprise, Microsoft Dynamics, Microsoft CRM, SQL Server is implemented, optimized and tuned, taking into account the characteristics of a particular application. Taking into account the needs of the business, data replication between servers in the branches of the company is configured accordingly.
  • Implementation of servers for control and protection of Internet traffic. These servers protect the corporate network from Internet attacks, provide control and management of user access to the Internet, and provide access to internal network resources via the Internet. Microsoft Forefront Threat Management Gateway (TMG) (formerly ISA Server) is being implemented as the main solution for protecting and managing Internet traffic. TMG, being the best application layer firewall, provides the highest level of protection for corporate resources. Access rules for user groups are configured, permitted and prohibited protocols (ICQ, POP3, FTP, etc.) are assigned, certain sites are permitted or prohibited. Configuring Site-to-Site VPN channels with remote offices and branches of the company. For small businesses, alternative solutions are also being introduced, such as Kerio WinRoute Firewall, Linux / FreeBSD and SQUID or SOHO class routers based on CISCO, 3COM, Dlink, LinkSys equipment and others.
  • Implementation of mail servers. Microsoft Exchange Server 2010 is being implemented as the main solution for organizing the exchange of mail messages throughout the enterprise. Exchange Server is the leader among corporate mail systems, in addition to wide possibilities for working with mail, Microsoft Exchange Server provides a set of collaboration tools such as: contacts, tasks, diaries, address books and shared folders. The structure of the Exchange server is built in accordance with the site topology and domain hierarchy. Anti-spam filters and mobile access options are being configured. Secure publishing of Exchange Server services on ISA Server is performed, services are published: SMTP, OWA, ActiveSync, IMAP4, POP3 (depending on customer requirements) Additional anti-virus and anti-spam solutions are installed, such as GFI MailSecurity and MailEssentials, Kaspersky, Microsoft Forefront. For small businesses, we offer the cloud service Exchange 2013.
  • Implementation of unified communications. The use of unified communications enhances communication between company employees, providing users with the ability to exchange text messages, audio calls, video calls, audio conferencing, and video conferencing. Unified communications allow you to save significant money, replacing the need for moving and business trips with the possibility of conducting web conferences, online seminars, and saving on long-distance telephone calls. We offer leading solutions from market leaders - Microsoft Lync Server 2013, and Cisco CallManager.
  • Implementation of terminal servers. Terminal servers provide remote access to the server desktop, or to a specific application. In fact, an image from the server is transmitted to the user's computer screen, and keystrokes on the keyboard and mouse movements made by the user are transmitted to the server. The scenarios for using terminal servers can be different: access to the desktop via the Internet, work with resource-intensive applications installed on the server, remote work with business applications. Often, some departments of the company use only terminal access for their daily work using thin clients. Terminal servers are installed and configured, the necessary business applications are deployed on them, and access rights are assigned. Microsoft Terminal Server and Citrix are used as terminal servers.
  • Implementation of backup servers. Backup servers protect all electronic information in the enterprise. The primary backup solutions are Symantec BackUp Exec and Microsoft SystemCenter Data Protection Manager. For backing up virtual machines, we offer Veeam BackUp & Replication deployment. Backup servers are installed, network storages, disk arrays and tape libraries are connected and configured. Backup agents are installed on all redundant servers (Domain controllers, file servers, SQL servers, Exchange, etc.). Schedules and backup methods are configured in accordance with the backup policy. Data backup and recovery mechanisms are being tested.
  • Implementation of anti-virus protection servers. Anti-virus protection servers provide enterprise-wide deployment, management and updating of anti-virus software. Installation of anti-virus protection servers, deployment of anti-virus protection agents, configuration of rules for actions upon detection of viruses, configuration of updates of anti-virus signatures. The main antivirus products are Kaspersky, Symantec, Eset NOD32 and Microsoft Forefront.
  • Installation of client workstations. Installation and configuration of workstations, laptops, phones and other equipment with which users will work is carried out. All necessary applications are installed, computers are entered into the domain and the user environment is set up.
  • Installation of peripheral equipment. Installation, connection and configuration of printers, copiers, scanners, multifunctional devices, etc. Device network settings are configured, printers are installed on print servers, scanners and faxes are configured to store copies on file or mail servers. The means of monitoring and control of peripheral equipment are installed.

Benefits of working with LanKey:

    IT infrastructure is created in a complex and turnkey. The LanKay company, one of the few, performs all the work independently from beginning to end, from installing the SCS and deploying clusters to connecting the mouse to the secretary's computer and setting up the iPhone to synchronize with Exchange with the director. All work is carried out within the framework of one project, at the end of which the customer receives a completely finished and functioning IT infrastructure. The customer does not have to control the performance of work by this or that contractor and resolve conflicts between them. The customer will not find himself in a situation where something does not work, and the contractors blame each other, refusing to solve the problem.

    The work is done by professionals. All work is performed by certified engineers with extensive experience in implementation in large projects. LanKay employs certified engineers from Microsoft MCSE (MCITP), GFI, Kaspersky, Symantec, CISCO, 3COM, Allied Telesis, D-Link, Panasonic, APC, EuroLan Nexans, Exalan +, Belconn, Molex. All work is carried out in accordance with state and world standards (GOST / ISO). There are licenses and certificates for all works.

    The highest level of quality and reliability. LanKey offers quality and proven solutions based on hardware and software from leading manufacturers. LanKey is a partner of HP, Dell, IBM, Intel. LanKey is a Microsoft Gold Partner.

    Further support of the IT infrastructure. LanKey is always ready to provide further support and development of the created IT infrastructure. The customer does not have to recruit a large number of highly paid specialists, the customer does not have to look for a company that provides IT outsourcing services that can maintain the information system at the proper level. No one can cope with this task better than us.


LanKey has been building corporate information systems for several years. During this time, specialists of our organization have created IT infrastructures of varying complexity in many companies and enterprises, in various industry sectors of the market. LanKey company offers solutions for large and small and medium-sized businesses, as well as for state enterprises. In addition, we offer a full range of services in the following areas:

  • IT consulting
  • Comprehensive audit of information systems
  • Information security audit
  • IT outsourcing services
  • Comprehensive services for the construction of data centers
  • Cloud services. Rent of virtual servers. Hosted Exchange, Microsoft Lync in the cloud.

LanKey is a leading supplier of hardware and software .

SW-CMM for software products, SE-CMM for systems engineering, Acquisition CMM for purchasing, People CMM for human resources management, ICMM for product integration. In 2002, SEI published a new CMMI (Capability Maturity Model Integration) model that combines previously released models and takes into account the requirements of international standards.
  • chaotic;
  • reactive;
  • proactive;
  • service;
  • benefit.

Chaotic the level is characterized by multiple support services, undeveloped maintenance service.

  • commodity (commodity);
  • utility (resource);
  • partner (partner);
  • enabler (support).

In profile commodity the enterprise views IT services as its core investment to automate fundamental administrative functions with minimal cost. When optimizing the IT infrastructure in organizations with this profile, the focus is on reducing costs.

For profile utility companies that are initially focused on costs, but recognize the importance of building relationships with customers. For these enterprises, IT optimization is a vehicle for enforcing service level agreements, reducing response times, availability, and other customer service parameters.

Profile partner involves considering the IT infrastructure of an enterprise in terms of business impact. While cost cutting is always relevant, the focus is on getting the economic benefits of investments in information Technology... In these situations, the business units work with IT to improve the overall quality of the IT service and achieve the end goals of action enterprises.

In companies of this profile enabler IT infrastructure is an important element of a business development strategy. IT initiatives are the main driving force behind business development and are viewed as a prerequisite for competitiveness.

The Microsoft IT infrastructure optimization methodology identifies the maturity levels of enterprise IT infrastructure. The Microsoft IT Maturity Model includes four levels [6.4]:

  • base;
  • standardized;
  • rationalized;
  • dynamic.

A basic level of The maturity of the IT infrastructure is characterized by the presence of a large number of manual processes, minimal centralization of management, lack of standards and policies for security, backup, and system image management. The management of the enterprise and the IS service is poorly guided by the capabilities of the existing IT infrastructure and its potential to improve business efficiency. At the same time, the costs of managing the IT infrastructure are high, and the risks of ensuring the quality of the provision of IT services are also high.

Enterprises with basic maturity level IT infrastructures can improve business efficiency when moving to a standardized level, by reducing costs by implementing the following areas:

  • developing standards and policies, as well as strategies for their implementation;
  • reduce security risks by creating layered defense;
  • automation of many manual and long-term operations;
  • implementation of best practices.

Standardized level maturity of the IT infrastructure implies the introduction of management points based on standards and policies for the administration of desktops and servers, the definition of rules for connecting machines to the network, the maturity of the enterprise IT infrastructure, the costs of managing desktops, servers and switching equipment of networks are minimized, and support and IT service delivery is beginning to play an important role in supporting and expanding a business. When ensuring information security, the main focus is on preventive measures, and on any security threats the company responds quickly and predictably.

The enterprise uses fully automated deployment with minimal operator involvement. The number of images of software systems (images) is minimal, and management process desktop computers are minimized. The IS service maintains a database of configuration items with comprehensive information.

Dynamic level The maturity of an enterprise's IT infrastructure implies an understanding of the strategic value for effective business conduct and competitive advantage. This level assumes that all costs of the IS service are transparent and are under full control, the data necessary for their work is available to users, an effective joint work at both the employee and departmental level, and mobile users receive virtually the same level of service as in the office.

The processes of support and provision of IT services are automated. This is implemented using specialized software tools built into the system, which allows you to manage information systems in accordance with changing business requirements. Investments in information Technology provide quick and predictable business returns.

This level of maturity of the enterprise IT infrastructure is characterized by efficient management support and delivery of IT services; and continuous optimization of service support levels.

Enterprises with dynamic maturity level IT infrastructures have the ability to implement new IT technologies necessary for the progressive development of the business, the benefits of which far outweigh additional expenses.

  • Email
  • Implementation of 1C systems
  • Wi-Fi wireless networks
  • IT infrastructure management systems, ITSM.
  • IT infrastructure is a complex multicomponent integrated system, which is a complex of information technologies (software and hardware) and ensures the activities of the organization. Computer hardware, software, network services, services, e-mail, monitoring systems, information security policies, control systems, backup and data storage systems, office equipment, telephony, etc. - all these are components of the enterprise IT infrastructure.

    An example of an IT infrastructure diagram:

    Depending on the business model of the organization and the size of the company IT infrastructure can be very different. Today there are a large number of different technologies and solutions from different manufacturers. Their choice for building an IT infrastructure should be based on solving the main problem IT infrastructure - meet business needs, ensure business continuity, data availability and security.

    Creation of IT infrastructure

    Creation of an efficient IT infrastructure is a rather complex process that requires a high level of competence in various areas of IT. It is necessary to analyze a large amount of information in order to ultimately obtain an effective IT infrastructure that meets the needs of the business.

    IT infrastructure planning

    In order to enter the planning of the future IT infrastructure it is necessary:

    Analyze the organization's business processes;

    If, during the operation of the IT infrastructure, new business processes appear in the organization, existing ones change, the organization changes, we develop - there may be a need to modernize the IT infrastructure.

    Modernization can mean almost any changes to the IT infrastructure, the purpose of which is to increase the availability, security and efficiency of its use:

    • increasing capacity in connection with the development of the organization (purchase of computers, servers, licenses, disks, memory, etc.);
    • introduction of new systems, services, services into the existing infrastructure due to changes in business needs (teamwork tools, CRM, ERP, document management system, two-factor authentication, etc.);
    • the introduction of information security tools in connection with changes in legislation or the emergence of new business areas (the need to ensure the safety of personal data, bank secrets, state secrets, etc.).

    Get expert advice

    We have the necessary competencies and resources to implement IT infrastructure projects of any scale. We can help at any stage from planning to implementation and maintenance of IT infrastructure and ensure a high level of execution. Submit a description of the problem your business needs to solve. We will offer possible options for its solution and estimate the cost of its implementation.

    Today's companies with efficient IT infrastructure gain a significant strategic competitive advantage. Moreover, the constant development of the business, for example, the expansion of the branch network, entry into new markets, the complication of processes, entails a continuous complication of the company's software and hardware complex. Therefore, the need for rational IT management, especially for large structures, comes to the fore.

    An important feature of modern large companies is efficiency, accuracy and work with a huge amount of information that needs to be stored and protected. The IT infrastructure of such organizations, consisting of a large number of components - applications, communication services, server infrastructure, workstation and data storage systems, information security systems, network and engineering infrastructure - requires a systematic approach to management. The key tasks are the competent choice of software and hardware solutions, adequate management of all systems of the company, ensuring the continuity and safety of work.

    Traditionally, the IT infrastructure requirements of different companies depend on the specifics of the business.

    For example, for large retail enterprises, the ability to quickly build up a retail network is critically important: to open new stores and warehouses and quickly integrate them into a common IT system. In this regard, the IT infrastructure of retail chains is characterized by large scale and large territorial distribution.

    In the banking sector, priorities have traditionally shifted towards security: great importance is attached to the protection of financial and personal information. Banks have always used the practice of backing up data centers at a remote site and a deeply echeloned data access system.

    Modern trends in the business development of large companies providing mass services determine a number of requirements for IT infrastructure, regardless of the specifics of their activities.

  • The transition to personal work with each client requires the storage, processing and protection of huge amounts of information. While for banks working with personal data of clients has always been one of the key processes, for retail chains this is a new trend. The mass issuance of discount and bonus cards, the launch of various promotions and other loyalty programs allow merchants to collect and analyze personal data of customers, which must also be stored and protected.
  • The need to provide mass services in full and of the same quality at all points of service requires centralized management of a distributed IT system. The standard of the banking business is the transparency of operations throughout the bank's network and the same high level of customer service in all of its branches and branches, regardless of territorial location.
  • The rapid development of mobile and Internet technologies forces companies to make decisions very quickly and respond to changes. Internet and mobile sales, RFID tags, contactless payment technologies, self-checkout counters - in the struggle for a modern "advanced" buyer, companies are constantly coming up with new technological ways of selling. Similar processes can be observed in the banking sector: if earlier it took several weeks for a new banking product to enter the market, with the development of new technologies this time is reduced to several hours.
  • These trends make the following IT infrastructure requirements particularly significant (see figure):

    • uninterrupted work;
    • scalability;
    • safety;
    • rate of change;
    • transparency and manageability;
    • adequate cost of ownership.

    Let's consider how the listed requirements are reflected in the necessary properties of IT of modern large companies.

    Uninterrupted work

    First of all, IT infrastructure should not interfere with business processes. IT of modern large companies is required to work 24 × 7; even short-term disruptions lead to downtime of critical business processes, to large financial and reputational losses.

    Malfunctions occur for two main reasons: equipment failure and various errors - user or software.

    A hardware issue can be resolved by duplicating or clustering multiple device instances. Then, if one of them fails, the rest will do his job. In particular, the virtualization mechanism allows you to further expand the possibilities of duplication.

    To protect against user errors and software failures, companies create a backup and recovery system that allows you to restore actual data in a short time.

    Probable problems and failures are better prevented or stopped early than fixed. For these purposes, large companies use proactive monitoring systems that inform administrators about problems in the IT infrastructure before these problems lead to unpleasant consequences and stop business processes.

    Scalability

    Proactive monitoring is also required to timely identify IT bottlenecks that limit business scalability. With regular monitoring and "unfolding" of such places, the likelihood that as a result of the expansion of the business will have to rebuild the entire IT infrastructure of the company.

    To improve scalability, unified solutions are used - from the same configurations of operating systems and software to templates and scripts for deploying the infrastructure of entire branches (for example, new bank branches or retail stores). The more processes in an IT infrastructure are automated, the more scalable and manageable it is, as a rule.

    Unified solutions also help accelerate the pace of IT change in response to business growth. It is faster to change the general template once than to make changes to each instance. The simplest example of such an IT tool for replicating solutions is Group Policy. Having changed the policy setting on the central server once, we are relieved of the need to change them on each server or workstation.

    Safety

    The more complex the infrastructure, the more different systems it includes, the more vulnerable it is. The volume of data and the complexity of business processes directly affect the architecture of information security systems.

    Real money is behind the information processed in banking systems. It is obvious that access to such data can lead to serious losses. This feature dramatically expands the circle of potential attackers and increases security requirements.

    The information security system in banks necessarily includes access rights management, encryption of communication channels, total monitoring, and detailed logging.

    To a lesser extent, this issue concerns retail chains, but here the importance of financial and personal information, as well as the increase in the volume of electronic payments, impose almost the same security requirements as in the banking sector.

    Rate of change

    Competition forces companies to constantly improve the level of service and the quality of services provided. Changes in business processes should be supported by IT infrastructure services: if a decision is made to make changes, then it should be implemented as soon as possible.

    An example is the development of Internet and mobile sales and banking: banks and retail chains strive not only to follow new technologies and be “no worse than competitors”, but to work “ahead of the curve”, trying to be the first and offer customers more and more technological services and services ...

    Transparency and manageability

    The simpler and more transparent the infrastructure, the easier it is to manage, fewer errors, and cheaper maintenance. The transparency and manageability of the IT infrastructure means a predictable IT response to business changes. This guarantees a reasonable assessment of whether the infrastructure is capable of supporting the necessary business changes, and if so, at what time and at what cost. Transparency is achieved by collecting data about the company's information system. This can be reports on the operation of hardware and software, information about changes in architecture, accounting for licenses - everything that allows you to predict the behavior of IT under any changes. The more information about the processes and state of the IT infrastructure is taken into account, the more accurately we can predict its behavior and, therefore, the more efficiently we can manage it. But just getting information at a specific point in time is not enough. You need a history of state changes, a history of events that took place in IT. It is impossible to obtain such information without constant monitoring of the infrastructure. If each event is not only recorded, but also described and evaluated, this will provide a more complete forecast in case of a problem in the future, as well as reduce the time and financial costs for its solution.

    Adequate cost of ownership

    It should be borne in mind that the main costs of a large company are not spent on the purchase or creation of infrastructure, but on its support, which implies constant adjustments to the current needs of the business. For today's large companies with complex business processes, change itself is not cheap. And multiplied by scale, they are often astronomical amounts. Therefore, the requirement for a reasonable cost of ownership of IT infrastructure becomes especially important.

    Modular structureallows you to change parts of the infrastructure, add new functionality and get rid of obsolete components at a minimum cost, while common and proven technologies reduce the cost of integration with other systems and make it easier to find support specialists. Therefore, initially, the IT infrastructure should be built according to a modular principle and based on mainstream technologies: this will make it possible to make changes to it in a short time and with minimal costs.

    So, current trends are such that for large companies the specifics of the business in relation to the IT infrastructure fades into the background. Business is becoming more technologically advanced, many new tools appear, which inevitably entails an increase in the complexity of the IT infrastructure. If earlier IT only supported business processes, now they are becoming an integral part of the business, the very essence of innovation.

    To ensure the successful functioning of an enterprise, its IT department develops an information infrastructure (applications, servers, disk arrays, networks), which makes it possible to provide an appropriate level of service.

    The historically established way of building IT departments fully reflects the structure of the information systems used. Moreover, each specific division maintains a specific information system. With this approach, as a rule, there is no effective system of interaction with business users and there are problems with determining the quality of the services provided.

    Along with the first information systems, the need arose for managing corporate infrastructure.

    Information technology in companies is usually understood as a set of information systems that support and automate existing business processes.

    The IT used in the service has a number of features:

    • The diversity of applied IT, which is associated with the presence of a large number of subject areas related to the service sector, and their diversity.
    • Intellectualization of IT. The service must implement the whole range of intellectual services related to individualization, i.e. with more efficient operation of the product in the specific conditions of its use by a given consumer (or with the expansion of the usefulness of the product for him).
    • Unification and standardization, the need to take into account Russian and international standards regulating the use of IT in the service sector.
    • Individualization of IT, focus on a specific user. The success of service activities is determined by the demand for the offered service and by how accurately and in a timely manner the service company is able to determine the needs and individual preferences of each of its customers, offering a product or service at a higher level than competitors, which is possible thanks to IT.
    • Scalability of IT to meet the needs of both small and large service enterprises.
    • The adaptability of IT, the ability to meet the various requests and needs of customers, transform directly in the service process.

    Information technology is a system of organizational structures that ensure the functioning and development of the information space of the enterprise and the means of information interaction. Information technology is based on the IT infrastructure.

    Infrastructure(Latin infra - below, under and naT.structura - structure, location) - a complex of interconnected service structures or objects that make up and / or provide the basis for the functioning of the system

    Information Technology Infrastructure (IT Infrastructure)- is an organizational and technical union of software, computing and telecommunications facilities, links between them and operational personnel, providing information, computing and telecommunication resources, opportunities and services to employees (departments) of the enterprise (organization) necessary for the implementation of professional activities and solutions to the relevant business -tasks.

    IT infrastructure includes a collection of various applications, databases, servers, disk arrays, network equipment and provides consumers with access to information resources. IT infrastructure becomes a technological component of any service and ensures its delivery in accordance with agreed rules and procedures.

    Enterprise IT infrastructureis a single complex of software, technical, communication, information, organizational and technological means to ensure the functioning of an enterprise, as well as means of managing them.

    To ensure effective operations, modern enterprises need an IT infrastructure consisting of an integrated set of systems, programs and services. The IT infrastructure should be holistic, as reliable as possible, competently designed, have a large margin of safety, correspond not only to the current state of the business, but also take into account its development in the future.

    The underlying IT infrastructure is the technological underpinning for the operation of other layers of the enterprise architecture. Its correct design allows:

    • Reduce IT costs;
    • Simplify the modernization of existing infrastructure;
    • To minimize the likelihood of downtime or system failure;
    • Maintain the security of the organization's infrastructure at the proper level;
    • Provide easy management of IT infrastructure;
    • Improve the reliability of the organization's IT infrastructure.

    One of the conditions for the efficient functioning of the IT infrastructure is the well-established practice of its operation. The operation of the IT infrastructure should be based on policies and procedures developed and established as corporate standards. The distribution of functions and tasks within the IT department should ensure timely maintenance of all elements of the IT infrastructure.

    Maintenance is a set of software and technical level measures carried out at the stage of production operation and aimed at ensuring the required reliability and efficiency of the information system.

    At the moment, we can distinguish the following group of tasks solved by the IT department:

    • Ensuring the efficiency, availability, confidentiality of the information being processed.
    • Maintenance of IT infrastructure operation.
    • Prevention and elimination of failures.
    • Crisis planning and management.
    • Providing automatic monitoring of IT health.
    • Ensuring the reliability of the IT infrastructure.
    • Information security assurance.
    • Equipment modernization.
    • Minimizing the cost of maintaining IT infrastructure.

    Ideally, IT infrastructure responds to changes in the environment

    functioning, increasing load, tightening of business requirements, while maintaining its functionality, integrity, readiness, the agreed level of security. Market development forces the organization to change business models, which, in turn, requires adequate changes in the IT infrastructure.

    Enterprise IT infrastructure components

    Over time, the composition of the IT infrastructure has changed.

    In the days of mainframes, the infrastructure was:

    • communication lines,
    • modems,
    • power supply systems,
    • air conditioning.

    During the development of local networks, the infrastructure remained the same, but the structure of its elements became more complex.

    The transition to global networks has further complicated this concept.

    At the same time, the complexity increased:

    • by increasing the number of elements,
    • connections between them,
    • due to the complication of the internal structure of the elements, the redistribution of functions between them.

    For example: programs for managing channels have moved to managing network devices. That is, in parallel with the complexity of the equipment, mathematics became more complicated - infrastructure management programs

    The standard network complex infrastructure of any company includes the following components:

    The physical composition includes:

    • wiring, routers,
    • switching devices,
    • servers, desktops,
    • cable system;
    • passive and active network equipment;
    • client jobs;
    • additional equipment (printers, faxes, authorization devices);
    • system software (operating systems (OS), information security tools, device drivers);
    • standard application software (tools for processing spreadsheets, working with texts, e-mail, files);
    • network services (DNS servers, packet protection, authorization, Internet access and application servers - database management systems (DBMS), mail services);
    • technical support services, dispatch and quality control center.

    Organizational and administrative components:

    • instructions for setting up a server and client software site, work procedure;
    • rules for dividing the network into areas according to security and performance needs;
    • special software focused on providing some business processes (design, inventory control, accounting, interaction with suppliers, production management).

    Information infrastructure of various levels (global, national, industry, organizations, etc.) contains:

    • distributed information resources, including web resources (sites, portals, etc.), banks and databases (including those with remote access), electronic libraries, electronic journals;
    • distributed computing resources, including shared computing centers, supercomputer centers, network computing resources of organizations, individual computers;
    • telecommunication resources providing interaction of remote users with information and computing resources.

    Types of IT infrastructure

    IT types

    infrastructure

    tours

    Specifications

    lack of coordination, manual escort, scattered workplaces.

    building server infrastructure;

    introduction of a directory service for authentication;

    setting up services for automatic updates; application of anti-virus protection; traffic protection; implementation of basic network technology scenarios (DNS, DHCP).

    standardized

    centralized management of IT infrastructure, availability of automated basic processes, directory service for authentication,

    updates are automated,

    anti-virus protection at workplaces;

    backup system for critical servers;

    central firewall;

    internal DNS, DHCP.

    software update at workplaces for the latest versions of OS and office suite; active use of System Management Server;

    application of solutions for centralized backup and disaster recovery; organization of remote access to VPN-networks;

    isolation of critical servers using IPSec (for Active Directory / Exchange).

    rational

    centralized managed and consolidated IT

    implementation of identity management automation technologies;

    infrastructure, use of directory services and group policies for centralized administration; automation of control / monitoring of software and hardware functioning;

    server monitoring; backup and recovery for all servers and workstations; remote access (VPN, Remote Desktop); Server isolation using IPSec.

    using System Management Server to manage servers; checking applications for compatibility;

    image management of workstations;

    deployment / management of firewalls in the workplace;

    organization of secure wireless network access using Internet Authentication Service (IAS) and Active Directory directory services.

    dynamic

    fully automated IT infrastructure, fully meeting user needs in heterogeneous environments; automatic update management for servers; automatic application compatibility testing and automatic image management of workstations; firewalls - on servers and workplaces; secured wireless connections.

    solution for automatic distribution of server images; solution for determining the load level;

    support of workplace quarantine;

    monitoring the productivity of workplaces;

    readiness to switch to a new OS version;

    tools for effective transition to new software versions; Isolation of Active Directory Domains Using IPSec.

     

    It might be helpful to read: