Our operations procedures ensure security and quality is maintained throughout business operation and project/development life cycles. These are available through various means depending on the team but must be one of our internal systems.
Change management
- Service management process
- Secure development and deployment process
- Change management process
- Incident management process
- Staff management process
Capacity management
We achieve capacity management through a combination of recognised cloud technologies and monitoring. While this is not an exhaustive list, we proactively monitor the following:
- CPU utilisation
- RAM utilisation
- Storage utilisation
- Disk input/output (I/O)
- Network input/output (I/O)
Segregation of environments
We use virtualisation and containerisation technology to maintain segregation of data and systems. These are identified as:
- Infrastructure
- Web applications
- Jamf
- dataJAR
- Databases
- By client
Need further support?
If you still require assistance with us or have any further questions, please raise a ticket with our support team.
Alternatively, please see our frequently updated knowledge base articles for reference.