AUREX GREENFIELDS MIGRATION
The agreed scope of work included the migration of all IT Services from SNC-Lavalin Inc, whose global IT management were outsourced to CGI, to Aurex Constructors. Also included was the setup of the Aurex Azure tenant, setup of Azure Active Directory Connect (AADC), migration of all user and system mailboxes to Exchange Online (M365) with the implementation of multi-factor authentication (MFA) with conditional access and self-service password reset capabilities, the migration of corporate data to SharePoint Online (SPO) from the existing file server, deployment of new Azure virtual servers within the production environment, creation and data migration to Azure blob storage accounts with cognitive search functionality, implementation of OneDrive for Business along with KFM, the preparation and deployment of a Windows 10 image using Microsoft Deployment toolkit, and the implementation and enrolment of all end-user devices into Microsoft Intune. In addition, the migration of existing server workloads to a newly created Hyper-V server environment along with the reconfiguration of all networking devices.
We had minimal, if any, business impact during the deployment of this project which was an exceptional achievement by Netsurit. In addition, Netsurit supported us on numerous items that were outside of the scope that required urgent attention.
– Johan Claassen, IT Manager | 29 June, 2021
MICROSOFT ENDPOINT MANAGER IMPLEMENTATION
A major South African Bank opted to implement Microsoft Office 365 for 40 000 plus users. They needed their people to be able to securely access services and data from any device or location, while obviating the consequent exponential security threats – whilst complying with regulatory requirements such as GDPR and POPI.
The bank chose Netsurits’ team of expert engineers to implemented a comprehensive solution based on the Microsoft Enterprise Mobility + Security (EMS) Suite including Intune, System Centre Configuration Manager, Conditional Access and the Azure AD Application Proxy, Managed devices included applications across Windows, Apple Mac, Android and iOS.
- Adherence to regulatory requirements such as GDPR and POPI.
- Conditional Access policy implemented based on device compliance policies. Only compliant devices could access services and data.
- Additional verification method implemented with Multi-factor authentication to ensure the right user is accessing services and data.
– 23 September, 2020
Request a quote
Still reading? We’ve clearly captured your attention. Why not speak to us in person?