Methodology

Methodology

Conventus consultants complement your existing teams in implementing complicated, highly resilient security architectures and environments. We use a phased approach that ensures information crucial to the success of the project is shared early and often. Every possible opportunity to share knowledge and educate your team is acted upon. More importantly, your team is integrated throughout the process to guarantee project success. The end result goes beyond simply implementing, it increases your manageability, improves your security and maximizes your investment.

Meeting your business needs

Conventus methodology makes sure your projects are sized, scoped and customized to meet your exact business needs and your security and compliance requirements. Our years of business consulting expertise and proven methodology accelerate the time you start seeing business benefits. And, they ensure your business receives the appropriate level of protection.

With over 120 combined-years of experience in designing and implementing Symantec solutions, our methodology makes certain that your projects are handled efficiently, effectively and, most importantly, successfully. Our approach is proven by our work with hundreds of clients, from mid-size to Fortune 50. We ve implemented and optimized security products to protect hundreds of thousands servers and over a million endpoints.

What sets Conventus apart

  • Project support options – Our consultants work with your team at any level in support of your project goals and ultimate success from leading project teams to integrating with existing project teams, or even completing projects independently with little input or oversight required.
  • Top-notch consultants – You work with consultants who are senior level security and compliance domain experts. You never work with quasi-technical presales engineers or junior consultants. Instead you benefit directly from the best security brain trust’ in the industry.
  • Proven customer satisfaction – Conventus’ Net Promoter Scores for customer satisfaction, a universal means to measure customer happiness with their IT solutions, are through the roof. Our methodology increases customer enthusiasm about their security, risk management and compliance solutions by 25-to-200 percent.

Conventus Deployment Methodology: A Phased Approach

Phase 1: Scope and Plan

Confirm project scope and objectives
Develop project plan
Project kickoff
Solution administrator training
Quality checkpoints

Phase 2: Assess and Design

Gather and document business and technical requirements
Analyze and design business processes
Assess solution gaps
Procure hardware
Design solution components
Finalize design documentation
Quality checkpoint

Phase 3: Implement and Verify

Develop test plans
Build and unit test solution components
QA test solution components
Hardware deployment
Software installation and configuration
Integration test of complete solution
Final systems test
Train the trainer training
Quality checkpoint

Phase 4: Deploy and Support

Finalize user training materials
System deployment
Finalize implementation documentation
Transition to Product Support or Managed Services teams as appropriate
User Training
System go-live

Phase 5: Monitor and Manage

Day-to-day infrastructure management
Continued validation that solution is meeting
dynamic business requirements
Identify and address configuration changes as
solution evolves
On-site and remote resident programs
Quarterly health-checks

 

Comments are closed.