Managed services

Day to day activities are a commodity, not value generating or innovation-related. We can help you with those tasks, so you have more time to partner with the Line of Business Units and collaborate in achieving your business goals.

ALTUS has developed a Managed Services unit through which different customer’s key operation processes for IT services are managed. This service is aimed at providing specialized personnel, tools and processes to manage the life cycle of the products and services that the IT organization provides to its end users.

The specific services provided through the Managed Services Unit are:

IT Services Center (ISC)
IT Monitoring Center (IMC)
Cybersecurity Center (ICC)
IT Infrastructure Management (ITIM)

Our three key elements

Based on industry best practices, ALTUS manages its Managed Services

  • Processes

    policies, processes, procedures, roles and activities involved in the management of the different services provided by IT organizations.

  • Product

    technology and management systems used by people to carry out processes. 

  • People

    human resources, their skills and competencies required to execute the defined processes.

IT Services Center (ISC)

ALTUS has developed a practice for managing the customer’s end user requests for IT support. We manage the five processes defined by ITIL® v3 for Service Operation.

Incident Management

Focuses on restoring service to users as soon as possible, in order to minimize the impact on the business. This typically involves providing support on the hardware and software that the end user utilizes. For example, an incident is when a user cannot send an email.

Access Management

this requires to manage the requests from end users asking for privileges to access the organization’s systems. For example, an access is when a user requests privileges on a CRM process.

Problem Management

management and
root-cause analysis of incidents that are reported to the Service Desk to create improvement opportunities. For example, a recurring service request could be detected and a self-service portal proposed to improve that request management

Service Request Management

this involves supporting the requests from end users to obtain services on the different processes that the Service Desk manages. For example, a service request is when a user requests an email account to be configured.

IT Monitoring center (IMC)

The IMC works as a Network Operations Center (NOC) where a proactive remote monitoring
and network management of our customers’ IT infrastructure takes place. The IMC monitors the network and servers performance as well as perform initial remote troubleshooting when an issue is detected.

The NOC is based on three main capabilities:

Network Operation Center (NOC)
Which detects alerts that arise in the customer’s IT infrastructure. The goal is to manage the alerts that indicate network items are operating outside the normal thresholds and generate follow up events in caseof detecting any risk in the customer’s operation.
Event Response Center (ERC)
Which manages the events generated in the IT infrastructure and determines the relevance and urgency.

If an event needs to be managed as an incident, ERC creates the case in the Incident Response System and escalate it to the Incident Response Center (IRC). Additionally, it periodically analyzes the health of the IT infrastructure to anticipate possible incidents.
Incident Response Center (IRC):
Which manages the response to incidents detected in the customer’s IT infrastructure, including the root cause analysis of the incident,the actions needed to restore the service and the recommendations for preventing it from happening again.

Cybersecurity Center (ICC)

The ICC acts as a Security Operations Center (SOC) and provides specialized resources, tools and processes in order to implement threat intelligence across the customer’sIT infrastructure. We strengthen our customer’s platform in oder to improve the response and remediation capabilities

Security Monitoring Center (CMS)

Which detects security events that occur in the customer’s IT infrastructure. The goal is to receive raw data relevant for security management and generate events in case of detecting any security risk

Event Response Center (ERC)

which manages the security events generated in the IT infrastructure and determines the relevance and urgency.If an event needs to be managed as an incident,
ERC creates the case in the Incident Response System and escalate it to the Incident Response Center (IRC). Additionally, it periodically performs asset discovery, vulnerability scanning,and reviews vulnerability assessment reports..

Incident Response Center (IRC)

which manages the response to security incidents detected in the customer’s
IT infrastructure. To do this,it uses threat intelligence to identify the affected systems and the scope of the attack. Additionally, it reviews and collects asset information for further investigation into these systems.

IT Infrastructure Management (ITIM)

Through the IT Infrastructure Management service, we provide certified resources to manage the operating and support processes of our customers’ IT platforms, both cloud and on-prem solutions.

The ITIM is based on three main capabilities:

Reactive tasks
Involves unscheduled activities focused on incident resolution derived from abnormal operation of hardware and/or software.
Proactive tasks
involves scheduling of hardware and/or software inspection activities,
which must be carried out periodically based on a health and assurance plan for the IT infrastructure. Its purpose is to prevent incidents, keeping hardware and/or software in optimal conditions.
Optimization tasks
involves activities that aim
to modify the operation of hardware and/or software, in order to increase or change the capabilities of an item of the IT infrastructure.

We'd love to hear from you

Fields marked with an asterisk (*) are required.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.