SlideShare uma empresa Scribd logo
1 de 35
Delivering Interface Customizations Services to
Enterprises
© 2012 Copyright - Techstur.com
What is Managed Services?
Managed services is the practice of transferring day-
to-day related management responsibility as a strategic
method for improved effectiveand efficient operations.
Why TechStur.com Managed Services?
Managed services are rapidly replacing
traditional information technology (IT) management tools
and mega-outsourcing arrangements because they provide a
more cost-effective method of managing and protecting
enterprisenetworks, systemsand applications.
© 2012 Copyright - Techstur.com
Why TechStur.com Managed
Services?
Contd ...
Tailor your solution to your organization’sneeds
FlexibleOutsourcing for Sustained Growth
Realize Measurable Value in Your Processes and
Systems
TechStur.com Managed Services Solutions can
help you in
•Lower operational costs and improve productivity —
Takeadvantageof economiesof scale, with reduced lock-in.
•Reduce risk — You can discover how to quickly and
effectively react to IT labor shortages, increased application
complexity and therapid rateof businesschange.
•Maintain control of your destiny — Even while you have
ushelping you manageapieceof your business.
© 2012 Copyright - Techstur.com
Why Managed Services?
Do you want your IT internal staff to focus on core competencies
rather than juggling with IT challenges?
Do you want to maintain control of Business-Critical Systems?
Are you increasingly reactive rather than proactive when it
comesto management of your IT infrastructure?
If you have said “YES” to all of the above
questions then its time you think about
Managed Services.
© 2012 Copyright - Techstur.com
TechStur.com Managed Services
TechStur.com Interface Customization Services comprises a
comprehensive, integrated suite of services to manage a client’s
distributed computing environment as a single entity—all with single
point-of accountability.
Integrated service elements include:
Citrix Web Interface
Citrix NetScaler AccessGateway
Citrix CloudGateway - StoreFront
Microsoft Outlook Web App 2013
© 2012 Copyright - Techstur.com
Desktop Management Suite
Desktop management is a comprehensive approach to managing all the
computerswithin an organization.
"New technology gives small businesses real protection capabilities
that can substantially mitigate the risk of disasters, accelerate recovery
when they strike, and equip us to work more efficiently when they
don't. Effective use of these technologies can enable productivity gains
previously imaginableonly by Fortune-500 corporations."
© 2012 Copyright - Techstur.com
Interface Customizations Includes
Microsoft RD Web Access2012
Microsoft Outlook Web App 2010
Microsoft RD Web Access2008 R2
Microsoft Forefront TMG 2010
Ericom
Interface: FAQ
Custom Citrix Web Interface5.4
Help desk
© 2012 Copyright - Techstur.com
Microsoft Outlook Web App 2013
Customize Microsoft Outlook Web App 2013, new custom OWA
2013 interface look that matches your company's brand and
identity with TechStur.com.
Microsoft Outlook Web App (OWA) provides secure access to your
Outlook email, calendar, contacts, tasks, and Global AddressList - via
the Internet. This guide explains how to log on to OWA and use
OWA features.
© 2012 Copyright - Techstur.com
Citrix NetScalerAccess Gateway
Citrix NetScaler Gateway is the only
SSL VPN to provide secure remote
access to virtual desktops and
applications.
Citrix NetScaler Gateway is a secure remote access solution that provides
administratorswith application control whileempowering userswith access
from anywhere. With flexible deployment options and a single point of
management, IT administrators set policies—based on roles, devices, and
networks—to control access and user actions, ensuring better data
protection and compliancemanagement.
© 2012 Copyright - Techstur.com
Desktop Security
TechStur.com desktop security provides protection against antivirus,
firewall, spyware, worm, and Trojan horseprotection.
Firewall Feature helps in detecting and terminating unwanted external
applications such as spyware and adware. It also blocks unauthorized
access into your network and sensitive data. This provides a tremendous
security to your environment and data.
© 2012 Copyright - Techstur.com
Desktop Support
Desktop support is automating various computer-related support tasks in an
organization. Troubleshooting, softwareinstallation, softwarepatches, etc., can
all be done via the network - reducing the turnaround time for IT support,
simplifying and improving management of computersin theorganization.
TechStur.com Desktop Support acts as the primary point of contact for
computer related problems - providing diagnostic, remedial, and referral
servicesasappropriate.
TechStur.com Desktop Support comprisesof
Deep Scan
Patch Management
Help desk
© 2012 Copyright - Techstur.com
Deep Scan
Scanning foroverall PC health and vulnerability
Deep Scan includes scanning of Windows Registry, at running
processes, and insideof no executablefiles, archivefiles, and filesof
all sizes. So-called "smart" scans ignore archives, extremely large
files, and sometimesno executables.
© 2012 Copyright - Techstur.com
Patch Management Suite
Patch management is the process of
controlling the deployment and maintenance
of interim software releases into production
environments. It helps you to maintain
operational efficiency and effectiveness,
overcome security vulnerabilities, and
maintain the stability of your production
environment.
Our integrated patch management suite includes patch
management, software delivery, and automated asset
inventory (professional). Techsur verifies Microsoft
patch information and maintainsaknowledgebase.
© 2012 Copyright - Techstur.com
Help Desk Suite
It is a support system designed to assist end users with
technical and functional questions and problems.
TechStur managed services team provides you with a single point of
contact, 24 hours a day, seven days a week, where you can obtain IT
support by telephoneor Internet.
Our service desk tool enables us to log, monitor and report IT activities
into a detailed database, allowing the service desk team to conduct
comprehensivereporting on IT support activities.
© 2012 Copyright - Techstur.com
Despite its name, desktop management includes overseeing laptops and
other computing devicesaswell asdesktop computers.
In recent years, security-related tasks have become an increasingly large
part of desktop management.
As a result, an increasingly large proportion of administrative resources
havebeen devoted to security-related tasks
Patch management,
Fighting virusesand spyware,
Controlling greynet applications
(programsinstalled without corporate
approval, such asinstant messaging, file
sharing programs, and RSSreaders).
Desktop Management
© 2012 Copyright - Techstur.com
Desktop Management Interface (DMI) is an industry framework for
managing and keeping track of hardwareand softwarecomponentsin a
system of personal computersfrom acentral location.
DMI was created by the Desktop Management Task Force (DMTF) to
automate system management and is particularly beneficial in a network
computing environment wheredozensor morecomputersaremanaged.
Desktop Management
Interface
© 2012 Copyright - Techstur.com
Managed Server Hosting offers greater efficiencies, reliability, and
range of services than hosting in-house or using collocation. Selecting
the right host should be a matter of determined strategic choice, not
expedience.
Questions To Ask
1. How stable is your Managed Service Provider (MSP)? Will they
bearound tomorrow?
2. Everyone claims to have good customer service; how can you
really proveit?
3. How much isthisgoing to cost? Can I do morewith less?
4. What servicesareincluded in thebaseprice? What costsextra?
5. Who will fix thingswhen they go wrong?
© 2012 Copyright - Techstur.com
6. How quickly can you get my server configuration built and
running?
7. How reliable are the network and facility? How good are
yourtechnical capabilities?
8. a service contract required? What happens if I want to
modify my services?
9. What are your limitations? Are there any limitations to the
applications Ican run from the servers you host?
10. What are the biggest mistakes to avoid?
Find a provider that will excel at meeting all your
needs. Here are more questions what you should
ask.
© 2012 Copyright - Techstur.com
Managed ServerHosting
OurManaged ServerHosting Solutions align yoursystems with business
goals.
TechSturManaged ServerHosting comprises of
Server Monitoring
Application Monitoring
ServiceMonitoring
WindowsEvent log Monitoring
CPU, Memory and Disk Utilization Monitoring
With Techstur Enterprise Server Management, you'll benefit from an
exceptionally stable server environment, embedded management
intelligenceand arapid, substantial return on investment (ROI).
© 2012 Copyright - Techstur.com
Application Monitoring
Application failures are usually the most common problems that occur in
IT infrastructure. Monitoring critical applications proactively helps to
prevent application failuresand identify degradationsearly.
TechStur Application Monitoring can monitor mission critical
applications that run on Servers. Various parameters of applications like
MS Exchange, Oracle, MySQL, MSSQL & Lotus Notes can be
monitored.
© 2012 Copyright - Techstur.com
Service Monitoring
Monitoring system level services for availability and response time is
essential to ensurethat your Server Management plan iscomplete.
TechSturService Monitoring can monitor
HTTP, FTP, Telnet etc that arerunning on your servers
WindowsNT Services
Availability and responsetimeof all theservice
© 2012 Copyright - Techstur.com
Core Services – Always Included
Root/Administrator Access
Unlimited 24/7 serviceand technical support
Custom monitoring schemasthrough theentirestack
Accelerated responseand recovery to any alert or service
request
Rapid hardwarereplacement
Operating system patching
Server and operating system hardening
A dedicated SalesExecutive
It is important to realize that TechStur Managed Server Hosting is
a full-service package designed to alleviate or entirely prevent
serviceand businessdisruptions.
© 2012 Copyright - Techstur.com
Managed ServerHosting – Available à la Carte
Since every solution is customized to the unique needs it
addresses, thefollowing value-added servicesareavailable.
Security (Physical and Network)
Recovery (Backupsand DataRestoration)
DatabaseCare(for all platforms)
Storage(dedicated StorageAreaNetworkswith mirrored
arrays)
High-Availability Clustering
Multi-siteRedundancy; Multi-Master Replication
EnterpriseEmail
© 2012 Copyright - Techstur.com
Benefits To YourOrganization
Depending on your need or reason for choosing TechStur.com, several or
many benefits can be realized. In consultation with you, TechStur.com will
provision, monitor, and manage a custom-configured hardware and network
infrastructurepurpose-built to itstasks.
Managed ServerHosting negates the need for
Capital expenditures
Lengthy provisioning process
"Over-purchasing"
Someinsurancecosts
Most third-party servicecontracts
Trial-and-error
© 2012 Copyright - Techstur.com
Managed ServerHosting provides
Fixed monthly costs
What you need right now
On-demand scalability
Vendor-certified engineers
Affordableaccessand migration to advanced solutions
Quicker implementation and faster ROI
Quicker resolution of problemsor adverseevents
Carrier-gradehosting facilitieswith redundant independent
power supplies
Managed Growth
Managed Server Hosting not only delivers an excellent technology
service, but also makes business sense as we match to your cash flow,
and help you grow.
© 2012 Copyright - Techstur.com
TechStur.com Managed ServerHosting is ideal for
SMBs, Start-Upsall theway up to theMid to Large
Enterprisespace
ASPand SaaSHosting
Disaster Recovery and BusinessContinuity Planning
Just-In-TimeDeployment
Scalability Planning
Managed Growth
PredictableExpenditures
Greater BusinessEfficiency
© 2012 Copyright - Techstur.com
Network Management Solutions
Network management is the execution of the set of
functions required for controlling, planning,
allocating, deploying, coordinating and monitoring
theresourcesof anetwork.
Detect, diagnose and resolve network performance
issuesbeforethey turn into costly downtime.
TechStur.com Network Management Solution (NMS)
includes
Router & WAN Monitoring
Switch Monitoring
© 2012 Copyright - Techstur.com
Router&WAN Monitoring
WAN links are usually the most expensive part of the network, and managing
bandwidth allocation can becomplex.
Oversubscribing to bandwidth could mean that your company is paying for more
bandwidth than required, and under subscribing could result in congestion and
unacceptablenetwork performance.
TechStur.com Router&WAN Monitoring
can help you in
Ensuring High Network Availability
Monitoring Router Performance
OptimizeBandwidth Allocation
MinimizeRecurring Cost
© 2012 Copyright - Techstur.com
TechStur.com NMS' offerings are relied on by mission
critical networks on a daily basis. 
Wecan help your organization gain control of theincreasing
requirementsto:
Design, implement, manageand maintain technology
infrastructures.
Identify, assess, and remedy security vulnerabilities.
Utilizetechnology to improveROI.
Managetechnology asabusinessasset.
Our solutions can make a difference
in your business with defined,
measurableoutcomes. 
© 2012 Copyright - Techstur.com
Here is your organization's chance to work with some of the greatest
technical experts in the world. The benefits of involving NMS for a
High Availability (HA) Disaster Recovery (DR), Continuity of
OperationsPlanning (COOP) or Continuity of Government (COG)
TechStur.com NMS specializes in implementing Automated Disaster
Recovery solutionsto limit network downtimeand dataloss.
Why waste time and money hoping that the
organization's data is protected or that a technical project
will beimplemented successfully?
Know from the start that the HA DR/COOP/COG
solutions or technical project your organization
implements will be a success by utilizing TechStur.com
NMS.
© 2012 Copyright - Techstur.com
Managed Security Solutions
Every industry Vertical has its own unique information security
challenges brought about by consolidation, regulations and different
businessrequirements.
TechStur.com understands these challenges and leverages its
experience with its many clients across all industry verticals to deliver
Managed Security Solutions tailored to your specific Threat
Management needs.
© 2012 Copyright - Techstur.com
Additionally, TechStur.com leverages its Managed Intrusion
Prevention, Managed Scanning, Threat Intelligence, Managed
Enterprise Security Monitoring, Managed Intrusion Detection and
Managed Firewall services to create solutions to address security
specific needs, such as Threat Management and Enterprise-Wide
Security Reporting, insideyour organization.
OtherManagedSecurityServices include
1. DDOSMitigationsServices
2. Managed Firewall
3. Content Integrity Monitoring Services– CIMS
4. Email Protection Services
5. Host-Based Intrusion Detection Services– HIDS
6. Network Intrusion Detection Service- NIDS
© 2012 Copyright - Techstur.com
How TechStur.com Managed Services Works . . .
Step 1: IT Audit & Assessment - Disco ver, do cument and
assess the existing ITinfrastructure.
Step 2: IT Remediation (if required) - Co rrect pro blems with
existing infrastructure
Step 3: IT Performance Monitoring - Mo nito r and repo rt o n
the perfo rmance o f infrastructure
Step 4: ITSupport - Suppo rt fo r staff o n ITpro blems
Step 5: IT Operational Maintenance - Operate and Maintain
yo ur ITInfrastructure
© 2012 Copyright - Techstur.com
Thank You
© 2012 Copyright - Techstur.com

Mais conteúdo relacionado

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Destaque

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Destaque (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Custom Citrix Web Interface

  • 1.
  • 2. Delivering Interface Customizations Services to Enterprises © 2012 Copyright - Techstur.com
  • 3. What is Managed Services? Managed services is the practice of transferring day- to-day related management responsibility as a strategic method for improved effectiveand efficient operations. Why TechStur.com Managed Services? Managed services are rapidly replacing traditional information technology (IT) management tools and mega-outsourcing arrangements because they provide a more cost-effective method of managing and protecting enterprisenetworks, systemsand applications. © 2012 Copyright - Techstur.com
  • 4. Why TechStur.com Managed Services? Contd ... Tailor your solution to your organization’sneeds FlexibleOutsourcing for Sustained Growth Realize Measurable Value in Your Processes and Systems TechStur.com Managed Services Solutions can help you in •Lower operational costs and improve productivity — Takeadvantageof economiesof scale, with reduced lock-in. •Reduce risk — You can discover how to quickly and effectively react to IT labor shortages, increased application complexity and therapid rateof businesschange. •Maintain control of your destiny — Even while you have ushelping you manageapieceof your business. © 2012 Copyright - Techstur.com
  • 5. Why Managed Services? Do you want your IT internal staff to focus on core competencies rather than juggling with IT challenges? Do you want to maintain control of Business-Critical Systems? Are you increasingly reactive rather than proactive when it comesto management of your IT infrastructure? If you have said “YES” to all of the above questions then its time you think about Managed Services. © 2012 Copyright - Techstur.com
  • 6. TechStur.com Managed Services TechStur.com Interface Customization Services comprises a comprehensive, integrated suite of services to manage a client’s distributed computing environment as a single entity—all with single point-of accountability. Integrated service elements include: Citrix Web Interface Citrix NetScaler AccessGateway Citrix CloudGateway - StoreFront Microsoft Outlook Web App 2013 © 2012 Copyright - Techstur.com
  • 7. Desktop Management Suite Desktop management is a comprehensive approach to managing all the computerswithin an organization. "New technology gives small businesses real protection capabilities that can substantially mitigate the risk of disasters, accelerate recovery when they strike, and equip us to work more efficiently when they don't. Effective use of these technologies can enable productivity gains previously imaginableonly by Fortune-500 corporations." © 2012 Copyright - Techstur.com
  • 8. Interface Customizations Includes Microsoft RD Web Access2012 Microsoft Outlook Web App 2010 Microsoft RD Web Access2008 R2 Microsoft Forefront TMG 2010 Ericom Interface: FAQ Custom Citrix Web Interface5.4 Help desk © 2012 Copyright - Techstur.com
  • 9. Microsoft Outlook Web App 2013 Customize Microsoft Outlook Web App 2013, new custom OWA 2013 interface look that matches your company's brand and identity with TechStur.com. Microsoft Outlook Web App (OWA) provides secure access to your Outlook email, calendar, contacts, tasks, and Global AddressList - via the Internet. This guide explains how to log on to OWA and use OWA features. © 2012 Copyright - Techstur.com
  • 10. Citrix NetScalerAccess Gateway Citrix NetScaler Gateway is the only SSL VPN to provide secure remote access to virtual desktops and applications. Citrix NetScaler Gateway is a secure remote access solution that provides administratorswith application control whileempowering userswith access from anywhere. With flexible deployment options and a single point of management, IT administrators set policies—based on roles, devices, and networks—to control access and user actions, ensuring better data protection and compliancemanagement. © 2012 Copyright - Techstur.com
  • 11. Desktop Security TechStur.com desktop security provides protection against antivirus, firewall, spyware, worm, and Trojan horseprotection. Firewall Feature helps in detecting and terminating unwanted external applications such as spyware and adware. It also blocks unauthorized access into your network and sensitive data. This provides a tremendous security to your environment and data. © 2012 Copyright - Techstur.com
  • 12. Desktop Support Desktop support is automating various computer-related support tasks in an organization. Troubleshooting, softwareinstallation, softwarepatches, etc., can all be done via the network - reducing the turnaround time for IT support, simplifying and improving management of computersin theorganization. TechStur.com Desktop Support acts as the primary point of contact for computer related problems - providing diagnostic, remedial, and referral servicesasappropriate. TechStur.com Desktop Support comprisesof Deep Scan Patch Management Help desk © 2012 Copyright - Techstur.com
  • 13. Deep Scan Scanning foroverall PC health and vulnerability Deep Scan includes scanning of Windows Registry, at running processes, and insideof no executablefiles, archivefiles, and filesof all sizes. So-called "smart" scans ignore archives, extremely large files, and sometimesno executables. © 2012 Copyright - Techstur.com
  • 14. Patch Management Suite Patch management is the process of controlling the deployment and maintenance of interim software releases into production environments. It helps you to maintain operational efficiency and effectiveness, overcome security vulnerabilities, and maintain the stability of your production environment. Our integrated patch management suite includes patch management, software delivery, and automated asset inventory (professional). Techsur verifies Microsoft patch information and maintainsaknowledgebase. © 2012 Copyright - Techstur.com
  • 15. Help Desk Suite It is a support system designed to assist end users with technical and functional questions and problems. TechStur managed services team provides you with a single point of contact, 24 hours a day, seven days a week, where you can obtain IT support by telephoneor Internet. Our service desk tool enables us to log, monitor and report IT activities into a detailed database, allowing the service desk team to conduct comprehensivereporting on IT support activities. © 2012 Copyright - Techstur.com
  • 16. Despite its name, desktop management includes overseeing laptops and other computing devicesaswell asdesktop computers. In recent years, security-related tasks have become an increasingly large part of desktop management. As a result, an increasingly large proportion of administrative resources havebeen devoted to security-related tasks Patch management, Fighting virusesand spyware, Controlling greynet applications (programsinstalled without corporate approval, such asinstant messaging, file sharing programs, and RSSreaders). Desktop Management © 2012 Copyright - Techstur.com
  • 17. Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardwareand softwarecomponentsin a system of personal computersfrom acentral location. DMI was created by the Desktop Management Task Force (DMTF) to automate system management and is particularly beneficial in a network computing environment wheredozensor morecomputersaremanaged. Desktop Management Interface © 2012 Copyright - Techstur.com
  • 18. Managed Server Hosting offers greater efficiencies, reliability, and range of services than hosting in-house or using collocation. Selecting the right host should be a matter of determined strategic choice, not expedience. Questions To Ask 1. How stable is your Managed Service Provider (MSP)? Will they bearound tomorrow? 2. Everyone claims to have good customer service; how can you really proveit? 3. How much isthisgoing to cost? Can I do morewith less? 4. What servicesareincluded in thebaseprice? What costsextra? 5. Who will fix thingswhen they go wrong? © 2012 Copyright - Techstur.com
  • 19. 6. How quickly can you get my server configuration built and running? 7. How reliable are the network and facility? How good are yourtechnical capabilities? 8. a service contract required? What happens if I want to modify my services? 9. What are your limitations? Are there any limitations to the applications Ican run from the servers you host? 10. What are the biggest mistakes to avoid? Find a provider that will excel at meeting all your needs. Here are more questions what you should ask. © 2012 Copyright - Techstur.com
  • 20. Managed ServerHosting OurManaged ServerHosting Solutions align yoursystems with business goals. TechSturManaged ServerHosting comprises of Server Monitoring Application Monitoring ServiceMonitoring WindowsEvent log Monitoring CPU, Memory and Disk Utilization Monitoring With Techstur Enterprise Server Management, you'll benefit from an exceptionally stable server environment, embedded management intelligenceand arapid, substantial return on investment (ROI). © 2012 Copyright - Techstur.com
  • 21. Application Monitoring Application failures are usually the most common problems that occur in IT infrastructure. Monitoring critical applications proactively helps to prevent application failuresand identify degradationsearly. TechStur Application Monitoring can monitor mission critical applications that run on Servers. Various parameters of applications like MS Exchange, Oracle, MySQL, MSSQL & Lotus Notes can be monitored. © 2012 Copyright - Techstur.com
  • 22. Service Monitoring Monitoring system level services for availability and response time is essential to ensurethat your Server Management plan iscomplete. TechSturService Monitoring can monitor HTTP, FTP, Telnet etc that arerunning on your servers WindowsNT Services Availability and responsetimeof all theservice © 2012 Copyright - Techstur.com
  • 23. Core Services – Always Included Root/Administrator Access Unlimited 24/7 serviceand technical support Custom monitoring schemasthrough theentirestack Accelerated responseand recovery to any alert or service request Rapid hardwarereplacement Operating system patching Server and operating system hardening A dedicated SalesExecutive It is important to realize that TechStur Managed Server Hosting is a full-service package designed to alleviate or entirely prevent serviceand businessdisruptions. © 2012 Copyright - Techstur.com
  • 24. Managed ServerHosting – Available à la Carte Since every solution is customized to the unique needs it addresses, thefollowing value-added servicesareavailable. Security (Physical and Network) Recovery (Backupsand DataRestoration) DatabaseCare(for all platforms) Storage(dedicated StorageAreaNetworkswith mirrored arrays) High-Availability Clustering Multi-siteRedundancy; Multi-Master Replication EnterpriseEmail © 2012 Copyright - Techstur.com
  • 25. Benefits To YourOrganization Depending on your need or reason for choosing TechStur.com, several or many benefits can be realized. In consultation with you, TechStur.com will provision, monitor, and manage a custom-configured hardware and network infrastructurepurpose-built to itstasks. Managed ServerHosting negates the need for Capital expenditures Lengthy provisioning process "Over-purchasing" Someinsurancecosts Most third-party servicecontracts Trial-and-error © 2012 Copyright - Techstur.com
  • 26. Managed ServerHosting provides Fixed monthly costs What you need right now On-demand scalability Vendor-certified engineers Affordableaccessand migration to advanced solutions Quicker implementation and faster ROI Quicker resolution of problemsor adverseevents Carrier-gradehosting facilitieswith redundant independent power supplies Managed Growth Managed Server Hosting not only delivers an excellent technology service, but also makes business sense as we match to your cash flow, and help you grow. © 2012 Copyright - Techstur.com
  • 27. TechStur.com Managed ServerHosting is ideal for SMBs, Start-Upsall theway up to theMid to Large Enterprisespace ASPand SaaSHosting Disaster Recovery and BusinessContinuity Planning Just-In-TimeDeployment Scalability Planning Managed Growth PredictableExpenditures Greater BusinessEfficiency © 2012 Copyright - Techstur.com
  • 28. Network Management Solutions Network management is the execution of the set of functions required for controlling, planning, allocating, deploying, coordinating and monitoring theresourcesof anetwork. Detect, diagnose and resolve network performance issuesbeforethey turn into costly downtime. TechStur.com Network Management Solution (NMS) includes Router & WAN Monitoring Switch Monitoring © 2012 Copyright - Techstur.com
  • 29. Router&WAN Monitoring WAN links are usually the most expensive part of the network, and managing bandwidth allocation can becomplex. Oversubscribing to bandwidth could mean that your company is paying for more bandwidth than required, and under subscribing could result in congestion and unacceptablenetwork performance. TechStur.com Router&WAN Monitoring can help you in Ensuring High Network Availability Monitoring Router Performance OptimizeBandwidth Allocation MinimizeRecurring Cost © 2012 Copyright - Techstur.com
  • 30. TechStur.com NMS' offerings are relied on by mission critical networks on a daily basis.  Wecan help your organization gain control of theincreasing requirementsto: Design, implement, manageand maintain technology infrastructures. Identify, assess, and remedy security vulnerabilities. Utilizetechnology to improveROI. Managetechnology asabusinessasset. Our solutions can make a difference in your business with defined, measurableoutcomes.  © 2012 Copyright - Techstur.com
  • 31. Here is your organization's chance to work with some of the greatest technical experts in the world. The benefits of involving NMS for a High Availability (HA) Disaster Recovery (DR), Continuity of OperationsPlanning (COOP) or Continuity of Government (COG) TechStur.com NMS specializes in implementing Automated Disaster Recovery solutionsto limit network downtimeand dataloss. Why waste time and money hoping that the organization's data is protected or that a technical project will beimplemented successfully? Know from the start that the HA DR/COOP/COG solutions or technical project your organization implements will be a success by utilizing TechStur.com NMS. © 2012 Copyright - Techstur.com
  • 32. Managed Security Solutions Every industry Vertical has its own unique information security challenges brought about by consolidation, regulations and different businessrequirements. TechStur.com understands these challenges and leverages its experience with its many clients across all industry verticals to deliver Managed Security Solutions tailored to your specific Threat Management needs. © 2012 Copyright - Techstur.com
  • 33. Additionally, TechStur.com leverages its Managed Intrusion Prevention, Managed Scanning, Threat Intelligence, Managed Enterprise Security Monitoring, Managed Intrusion Detection and Managed Firewall services to create solutions to address security specific needs, such as Threat Management and Enterprise-Wide Security Reporting, insideyour organization. OtherManagedSecurityServices include 1. DDOSMitigationsServices 2. Managed Firewall 3. Content Integrity Monitoring Services– CIMS 4. Email Protection Services 5. Host-Based Intrusion Detection Services– HIDS 6. Network Intrusion Detection Service- NIDS © 2012 Copyright - Techstur.com
  • 34. How TechStur.com Managed Services Works . . . Step 1: IT Audit & Assessment - Disco ver, do cument and assess the existing ITinfrastructure. Step 2: IT Remediation (if required) - Co rrect pro blems with existing infrastructure Step 3: IT Performance Monitoring - Mo nito r and repo rt o n the perfo rmance o f infrastructure Step 4: ITSupport - Suppo rt fo r staff o n ITpro blems Step 5: IT Operational Maintenance - Operate and Maintain yo ur ITInfrastructure © 2012 Copyright - Techstur.com
  • 35. Thank You © 2012 Copyright - Techstur.com

Notas do Editor

  1. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  2. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  3. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  4. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  5. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  6. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  7. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  8. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  9. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  10. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  11. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  12. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  13. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  14. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  15. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  16. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  17. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  18. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  19. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  20. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  21. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  22. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  23. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  24. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  25. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  26. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  27. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  28. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  29. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  30. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  31. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  32. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  33. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  34. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com
  35. © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com © 2012 Copyright - Techstur.com | GetConnected@techstur.com | www.techstur.com