Architecture and Engineering

From small implementations to large-scale projects, we are committed to developing solutions that lead with a ‘security first’ mindset. We are here to guide your organization through the design, development, and implementation of your IT infrastructure regardless of size.

Our team has over ten years of specialized experience in the management and implementation of highly complex projects in ever-changing environments. If your organization is looking to upgrade your infrastructure, consolidate an acquisition, or relocate your business, we are here to guide you through the process from conceptualization to execution to ensure optimal up time for our clients.

 

Our Certified Engineers have experience with the infrastructure design, implementation and management of the following:

 

IT Strategic Planning and Road Mapping for Hardware Lifecycle and Budgeting
Staff Augmentation
Cloud Architecture, Engineering, and Migrations
Security/IA Hardware (Firewalls, VPN, IDS/IPS, DLP, SWG, PAM, PKI)
VOIP Architecture, Engineering, and Implementation
Network and Infrastructure Best Practices and Security Assessments
Workflow and Data Management Engineering
Wireless LAN
Security tools implementation and operations
Knowledge Management
LAN Technologies (NAC/802.1x, Web Content Filtering, Multicast)
BI Development
Application Migrations and Upgrades
Network and Infrastructure Mapping and Documentation
Network and Infrastructure Architecture, Engineering and Migrations

With expertise in the following technologies:  

 

Microsoft Office 365
Microsoft Azure
Amazon Web Services
Microsoft Power BI Desktop
AirWatch
Cisco
Aruba
Fortinet
Ubiquiti
Tenable
Linux
Virtualization
Hybrid
QRadar
PtoV

What We Guarantee:

 

  • Our proven track record with long-term and highly complex projects in ever-changing environments is top-tier.
  • We pride ourselves on consistent, clear communication with clients.
  • We will deliver the project that meets the client needs, on-time and within budget.
  • Our comprehensive knowledge through all aspects of technology enables us to recommend and implement solutions that will best fit the needs of our clients.

Do you need help with your next IT project? We are here to help.

Phishing and The Seasons

By Sahan Fernando - Director, Managed Security - Intrinium  Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...

Financial Planning for Security

By Sahan Fernando - Director, Managed Security - Intrinium  Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...

Celebrating Cybersecurity Month!

By Chiara Morrison - Manager, Marketing - Intrinium  October 2018 marks the 15th annual National Cybersecurity Awareness Month (NCSAM), which is an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between...

SMB Relay Attack Tutorial

Don’t even bother cracking NTLMv2 hashes gathered with Responder! Instead, just relay them to a target machine on the network and pop yourself into a LocalSystem shell. This attack uses the Responder toolkit to capture SMB authentication sessions on an internal network, and relays them to a target machine.

Pin It on Pinterest