Network challenges? Optimize your environment!

Business networks are often like children: they grow unnoticed, sometimes in a disorganized and often unexpected way. The company can quickly end up with a lot of unoptimized equipment to manage, which may look like this…

But it keeps on growing: management wants to install a videoconferencing system, make backup copies of a subsidiary and keep them at the head office…

Can your network support these new features? The answer is probably not.

From there, problems multiply. Over time, users experience slowdowns, phone calls are sometimes jerky, intermittent breakdowns may even occur. How to solve these problems? Where to look?

With a multitude of disparate equipment, and often without a centralized logging system, it is difficult to investigate and find a problem.

Network analysis: why and how

For ESI, each client is different. The most important part of our work is, first of all, to determine our client’s situation, and what led him to need a network analysis. An added feature? Intermittent breakdowns? A willingness to plan future investments to be made in the network?

Once this objective is established, we analyze the most recent network diagrams, if any. We examine the equipment, the configurations, the redundancy, the segmentation… We evaluate all this in order to assess the global health of the equipment.

We can thus identify:

  • End-of-life equipment
  • Equipment close to failure
  • Configuration problems / optimizations
  • Limiting network points

But most importantly, depending on your needs, we help you identify priorities for investment in the network in the short, medium and long term. At the end of the analysis, our clients obtain :

  • An accurate view of their network
  • An action plan on existing equipment
  • An investment plan.

Why ESI?

ESI Technologies has been assisting companies to plan and modify their infrastructure for more than 22 years now!
Contact us now to find out more about what ESI can do for you!

Review of Télécom 2016

This was the 13th edition of this annual event organized by Comtois-Carignan. ESI Technologies participated in the Industry Day on Tuesday April 26 during which 34 presentations on topics related to telecom, IT and contact centres were offered.

For a third consecutive year, we presented a conference this time on threat evolution and data protection. Installing security devices such as firewalls or first-generation IPS was before common and sufficient to protect organizations against threats that might affect the operations of a company’s activities. Today, the rapid evolution of malicious activity requires installing new solutions to better protect our assets. Our presentation provided an excellent overview of these solutions: next generation firewalls and IPS, protection systems against advanced threats, security for web browsing, email security and unified authentication services.

Participants were able to ask questions about these pioneering technologies, protection solutions that provide control and visibility to better react to a threat detected in the environment.

During the industry cocktail, 42 partner booths were available for participants to discuss technologies and service offerings. This cocktail formula is highly appreciated by participants, giving them the opportunity to discuss and share views on presentations of the day.

If you missed the ESI presentation, please contact us so we can share its content with you.

Roger Courchesne – Networking and Security Practice Manager

A brief review of the Telecom 2015 Event

Many ESI representatives in sales and technology attended the event of April 21 that was intended for the industry. We noticed that a new trend is becoming increasingly predominant  among the subjects of different speakers; that is cloud solutions. Indeed, several  presentations focused on the subject; whether with IP telephony solutions,  Microsoft Lync or unified communications, participants could attend some very good sessions. ESI was also among the presenters at the event, where we discussed the challenges of securing enterprise data with the increasing usage of mobile devices.

We also noticed that this year, contrary to previous editions, no presentation used the expression “BYOD”, which does not mean the subject was not discussed. Presenters are now instead referring to the concept using the term “mobility”.

Although topics were not identified with the “security” tag, almost all presentations dealt with IT security in the solutions or business cases presented. Security is a must, it is an integral part of all business solutions, and customers and presenters are all aware of it! Convergence, unified communications and hybrid networks were also some of the topics discussed during the 2015 edition of this Telecom Event.

Roger Courchesne, Director – Internetworking & Security Practice