Magnetic IT Services delivers professional IT Services for any type of company. We are an IT Services Company that offers IT Consulting, IT Support, IT Monitoring, Helpdesk, Administration and maintainance for the IT Infrastructure.
With us you will always find IT solutions for your problems, we are accustomed to offer personalized solutions for the companies. By outsourcing with us, you will immediately see an improvement in quality of service (We hold the most prestigious IT certification worldwide, CCIE), and a substantial cost reduction that will allow you to focus on what matters the most : your business.
Our services encompass the assessment of existing infrastructure and formulation of strategy. We also design solutions to meet business needs for today and the future, planning and implementing our clients required needs, including the provision of project management, as and when required.
For each of these segments, we provide services that address all the stages of the design:
IT outsourcing has changed changes the way companies manage and operate their information systems. According to Gartner, outsourcing the IT environment will lower IT operating costs 19%-29%. More importantly, it will free IT staff to focus on core business objectives and projects.
You will immediately lower your IT operational and labor costs. Tasks will be assigned to the appropriate pay grade and you only pay for the time/resources you use. Your IT staff will now be able to focus on your internal IT projects. Trained IT professionals using complete IT management software will resolve your issues quickly. We provide full or partial IT Outsourcing services.
We provide a wide range of security services and solutions.
- Wired security
- Wireless security
- Remote access VPN solutions, IPSEC or SSL
- Site-to-Site VPN solutions
- Dynamic VPN (DMVPN)
- Flex VPN
- Unified Threat Management solutions
- Email security gateways
- URL Filtering
- Application Filtering
- Next Generation Firewall
- Advanced Threat Protection
- Network Access Control
Software Defined Networking
We’ve done the first ever Cisco SDN Implementation in Romania. The solution is based on Cisco ACI (Application Centric Infrastructure). The multi-pod design empowered the business to have a Data Center spread on 2 different geographic locations but with a common set of policies, all of the services being able to run if either one of the two Data Centers were down
Data Center & Virtualization
We provide a wide range of Data Center services including Colocation Services for your infrastructure.We can also migrate your servers from physical to virtual environment.
Nexus 2K/3K/5K/7K/9K Series Platform
Cisco UCS Platform
VMWare ESXi, VMWare vCenter, Vmotion, DRS, Clustering
Cisco Nexus 1000V
Cisco MDS SAN Switching Platform
Routing and switching
This is what we do best, after all, we have received an expert certification for it, CCIE , the most prestigious networking certification worldwide
- Network design resources including network audits, design, implementation, and maintenance
- Implement and deploy complex network solutions
- Troubleshooting and maintaining the network to ensure optimal function
- Layer 2 services: STP, VTP, LACP, Trunking, SPAN, IGMP, PPP, OTV, VXLAN
- Layer 3 routing : RIP, EIGRP, OSPF, IS-IS, BGP, PIM
- Multivendor integration (Cisco, Juniper, Fortinet, HP, etc)
Wireless and Mobile Services
Today’s networks are all about mobility, the lack of wires lowers the cost for the cabling and the number of active switching equipment, while providing almost the same speed as the wire. All of the devices in a wireless environment use a bandwidth that is free, 2.4Ghz or 5Ghz. It is very important the the wireless network must be properly configured, secured and sized, otherwise there can result in a lot of problems, including unauthorized access to your internal resources. It is quite easy to gain access to your wireless network if it is not very well secured.
Every user now has a personal smartphone that it brings to the office, that the IT staff does not have access to it, or that does not manage it. How do you ensure that it is secured?
An unsecured smartphone connected to your network can compromise your whole network. We have now entered a new era, an era of Internet of Things, an era where every device is connected to the Internet, where every device is just a door in front of an attacker.
We provide complete MDM (Mobile Device Management) solution that can provide secure conectivity for your mobile users.