Project Management

Home » Project Management » Page 2

From small implementation to a large-scale project, we are committed to developing solutions that lead with a ‘security first’ mindset. This will allow your company to be confident that our IT solutions are in line with best practices to keep your company secure and compliant.

Intrinium provides IT solutions to businesses of all sizes, specializing in highly complex projects in ever-changing environments. Our integrated approach to IT services allows us to collaborate and share best practices across departmental lines. This gives us a comprehensive understanding of all aspects of technology while enabling us to recommend and implement solutions that will best fit our client’s business objectives and strategy.

Where we come in:

Have you ever had an IT project that may begin to go over budget, grow exponentially in scope, or you are missing the IT expertise on your full-time team to manage a project through to completion? Whether you are looking to have us assist your IT staff with new projects or jump in to help with on-going projects that need more support, our PMP-certified Project Management team can help. We are experts in taking projects in any status and ensuring they get completed on-time and on budget.

Our Project Management Consultants can support:

Governance and Oversight
Business Continuity Planning
Business Impact Analysis
Disaster Recovery Planning
IT Strategic Planning
Sourcing and Procurement
Communications Management
Quality Management
Contract Negotiation
Vendor Management
Resource Management
Risk Management

What We Guarantee:


  • Our proven track record with long-term and highly complex projects in ever-changing environments is top-tier.

  • We pride ourselves on consistent, clear communication with clients.

  • We will deliver the project that meets the client needs, on-time and within budget.

  • Our comprehensive knowledge through all aspects of technology enables us to recommend and implement solutions that will best fit the needs of our clients.

Do you need help with your next IT project? We are here to help.

Phishing and The Seasons

By Sahan Fernando - Director, Managed Security - Intrinium  Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...

Financial Planning for Security

By Sahan Fernando - Director, Managed Security - Intrinium  Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...

Celebrating Cybersecurity Month!

By Chiara Morrison - Manager, Marketing - Intrinium  October 2018 marks the 15th annual National Cybersecurity Awareness Month (NCSAM), which is an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between...

SMB Relay Attack Tutorial

Don’t even bother cracking NTLMv2 hashes gathered with Responder! Instead, just relay them to a target machine on the network and pop yourself into a LocalSystem shell. This attack uses the Responder toolkit to capture SMB authentication sessions on an internal network, and relays them to a target machine.

Pin It on Pinterest