HFC infrastructure monitoring for cable television operators. The aim of our system is to enable by operator to capture in a short period of time problems and their earlier prediction in HFC infrastructure. It is an own and self-built by Monolit IT system designed for each group of employees to support the HFC network maintenance of the, ie NOC for the team, for the team of technicians in the field and for the Call Center.

System usage in the Call Center provide to operator quick and direct verification of subscriber devices operation status. NOC team, by use of our system, can monitor the operation of all CMTS devices. Additionally, the system alerts about any deviations from the defined parameters of signal levels.

Also, the system supports sales department by among others, by predicting for which subscribers Internet packages can be changed.

Data Retention System (DRS) is the dedicated software for cable operators for collecting and archiving traffic data in telecommunication networks for the needs of law enforcement bodies and special services. The data are collected according to the wording of the provisions (Art. 180a- 180d) of the Telecommunications Act has been in force since 21 January 2013. According to these provisions for public telecommunications, networks operators and public telecommunications services providers, has imposed the obligation to retain and storage telecommunications data. The system stores data retention in the defined time period, not less than 12 months.

The main system DRS functions are:

  • data customer Search according to set parameters such as the IP address and date
  • archiving of all operations related to the prepared data sets and business users DRS
  • for operators with Carrier Grade NAT (CGN) solutions, DRS supports NAT connection for Juniper solutions
  • the ability to integrate with the local base DRS operator. This solution enables rapid search of customers’ phone calls by the operator and authorized services

SIGNATURIX - move your signature in the digital world.

The idea of a solution to describe the handwritten signature in electronic format, which will retain all of its existing biometric-graphology features and will be further enriched with features such as time signature, speed / pace of the folding signature as well as the emphasis on the use feathers matrix. The signature placed on the devices with touch screens and, depending on their types, is stored a number of parameters used in the analysis of authenticity.

Security solutions ensures that each signed document (eg. PDF) using SIGNATURIX is protected against content change, signature substitutions, or its unauthorized use.

ZONEIX - Business processes management and monitoring by RFID usage

ZONEIX is an open system to manage and monitor business processes involving people / employees / teams as well as the resources / assets using RFID technology. The combination of automation, algorithms describing business processes with the necessary gates to verify the RFID tags, it creates a coherent system to support resource management, work time, inventory, creating zones and event alarms.

ZONEIX allows fully proactive management of identifiable products / in order to minimize costs and optimize their use.

- Download brochure

The service works as the business processes safety monitoring in the customer's information and communication technologies infrastructure. It enables rapid response to emerging events that threaten the business processes continuity.

The service reduces the possibility to compromise company’s critical systems operation and minimizes the possibility of leakage or makes data public that are crucial for the customer. The result of the work SOC are also reports evidence of health IT environment, in which overlapping business processes. Reports indicate the frequency, level of threat and the degree of resilience of ICT infrastructure to emerging events. They contain both recommendations on steps needed to minimize emerging risks.

SOC - performed tasks

  • Audit policy, IT security company
  • Monitoring events related to IT security
  • Audit and recommendations related to the security policy based on the monitoring of events
  • Recommendations related to design and solutions processing systems critical data implementation
  • Monitoring access to critical data for the company.

SOC - The Benefits

  • Monitoring events related to IT security in mode 24/7
  • Cyclical audit and procedures enterprise security policy modification
  • The introduction and refinement of procedures of behaviour in crisis situations
  • Comprehensive information about the infrastructure information security state
  • Minimizing costs on information and communications technology security related to post active activities

SHAREPIX – Intuitional Information Management System

Solution SHAREPIX is created based on Microsoft SharePoint and it is complete document workflow module for Information Management System. SHAREPIX system is the scalable solution and personalized for customer’s needs. As part of the solution, you can separate modules responsible for managing documents, invoices, contracts, delegations, holidays. As a part of the solution there is available full contextual search engine through which you can search the entire repository based on the titles, descriptions, endorsements or other descriptions.

Efficient and secure transmission of data is the basis for correct operation of your IT and multimedia systems. It is determinant of Your company organization, its perception by employees and - most importantly - by business partners and customers.

We as, engineers designed and built data transmission systems for a number of prominent state institutions, banks and public buildings. With our knowledge and experience will tell you:

  • whether to connect the terminal equipment by traditional cable network or wireless?
  • whether to use the MPLS provider, or better to use other WAN management technologies?
  • whether for Your Data Center appropriate technology shall be Fibre Channel or perhaps IP?
  • how to minimize the cost of maintaining your system and data management
  • what to do, that your system safe could be and immune to internal and external attacks

Mobile working, remote, telecommuting is a today’s common phenomenon - every fourth employee in the world work like this. Over 70% European executives chose to work in the field rather than at a desk in the office. There are able freely dispose their time, perform the tasks in favourable times and achieve very good results. And this is what the whole point of each employer, because it brings to the success of his company. Efficient mobility terms are good communication between the employee and the supervisor and co-workers, and secured access to applications and corporate devices: at any time and in any location.

To meet Your expectations, we offer:

  • to develop working models of mobile SoLoMo (Social / Local / Mobile)
  • safe integration of the mobile environment with company’s application systems
  • selection and implementation of management systems for mobile devices
  • design, performance and implementation of dedicated system

Business Continuity Management and the association with performing business continuity plans BCP (Business Continuity Planning) is for the company a strategic element in the whole management process. In this way, it shows their commitment to performing an environment that provides a safe and undisturbed operation in the future. Also, this ensures the safety of its customers and suppliers, and enables an effective response to adverse events.

Our experts will help you to:

  • identify key business processes and resources necessary for their implementation
  • assessment and describe risk
  • prepare and implement a Business Continuity Plan survival strategy
  • prepare a Business Impact Analysis (BIA)
  • prepare a response plan for an event
  • train and create awareness among employees
  • carry out regular testing and maintenance of business continuity plan
  • establish internal and external communication channels during crisis
  • prepare coordination with public services and supervisory institutions.

"Nowadays watchword continuity data processing, and thus the system reliability, took on enormous importance. Continuous access to data sets the trends in the data centers construction."

In order to meet the increasing demands on the systems reliability and applications there are created redundant facilities / locations linked via LAN / WAN and SAN. In the event of a failure at the primary location system automatically switches to the backup centers. Automatic switching follows by clustered systems, distributed between the data processing centers. The cluster system is responsible for individual components analysis of the system for failures. In case system cluster failure take appropriate action in order to ensure work continuity. The cluster monitors the application and is responsible for the proper starting, stopping and switching applications in data processing centers.

Monolit IT specializes in building application environments based on high reliability using a especially technology from companies: IBM, VMware, Microsoft".

The dynamic communication technology development in the twenty-first century made a many distributed organizations: large and small, whose members create virtual teams working in different parts of the country or in the world not meeting at all, or very rarely, and limiting the direct contact to a minimum to reduce costs and time to travel. To exchange information we can used phones, mobile telephones, e-mails, text messages, social networking, instant messaging, text, video chat, video conferencing.

Rich in experience in the communication systems development, which are always part of the IT’s company environment. We will help you build a Unified Communications system convenient for users, and at the same time efficient and driving Your business, tailored to its needs, tailored to your financial capabilities. We will help you to:

  • analyse the company and its business processes for internal communications and with the outside world
  • select the appropriate tools for communication
  • integrate all communication channels
  • create a comfortable and safe working group methods
  • train staff in effective use of the Unified Communications possibilities (sharing documents and resources, the use of different communication channels and switch between them, etc.).
  • increase the employees availability and improve the information flow and thus improve the efficiency of your business

No one today does not need to be convinced about how much the information worth is in at the right time, and how much can cost information loss. Losses resulting from improper data protection in organization are twofold: measurable, which can be present in numbers or immeasurable, resulting in the loss of image, customer confidence and business partners, and in extreme cases exposing to criminal penalties (sensitive data loss, eg. Medical Data).

No responsible business partner does not guarantee 100% safety for information processes protection. The more that the weakest link in the protection whole chain is the man with all his frailties and tendencies. However, as engineers we always strive to provide our customers with the highest possible security level for operating systems. We constantly track hazards arising from the rapid information technologies development and intentional hostile hacking inside and outside the organization.

In our offer you will find solutions to ensure organization safety in each system information component and react to events in real time on:

  • protection against unauthorized data leakage DLP (Data Leak Protection)
  • protection and control access to the Internet
  • Next Generation Firewall solutions
  • protection against network intrusion IPS (Intrusion Prevention System)
  • authentication and authorization user
  • databases protection, administrators, monitoring activities
  • cryptographic protection of selected system components
  • monitoring and correlation of security events SIEM (Security Information and Event Management)
  • infrastructure and applications examination for vulnerabilities.
  • workstations protection (desktop and mobile, tablets, smartphones)
  • preparation and supervision the process of certification of Information Security Management System (ISMS) in accordance to ISO 27001.

High availability for business applications and their high efficiency decide about company efficiency. Business applications efficient management is only possible by monitoring virtually all system’s components: hardware, databases, network services and communication channels, virtual environments, cloud computing. Our task is to warn you about problems, before a system failure occurs or disruption in corporate applications usage.

We achieve this by:

  • precise and unambiguous determination of the responsibility of individuals and organizational units of the business processes and supporting them IT system elements
  • risks indication during normal business applications operation before the failure or system unavailability shall be noticed by the users
  • acceleration of response in the case of a failure event
  • use real-time report and transparent show of entire IT infrastructure condition
  • applications automatic registration of abnormalities system’s IT elements
  • determine the correlation function between the individual system components and monitoring of aberrances in their use
  • verify SLA for the controlling management purposes
  • reporting to the company's management
  • sprawozdawczość dla kierownictwa firmy

Data Center is the heart of any computer system. Here work servers ready at any moment to provide us necessary data, here are devices that connect us with the world. Here, finally, they are the database and their archives, without which a modern company cannot operate. By Data Center, and the same data and resources were maximally safe and accessible almost always: 24/7/365, we use most advanced technologies in the field of information technology, energy, HVAC, monitoring, building automation, or even building construction. Data Center design and construction is a real challenge, which successfully face can only a few. The experience gained by Monolit IT, confirmed by numerous references, enables us to offer Data Center construction "turnkey", i.e.:

  • business needs determination and resulting from their Data Center functionality
  • threat assessment feasibility study, site selection and risk analysis
  • concept development according to best practices
  • conceptual design and infrastructure performance and initial cost estimation
  • projects execution: construction building and technical infrastructure, including: architecture and object construction, infrastructure project coordination in the field of energy, telecommunication and cooling with the required environmental arrangements
  • construction permit obtainment
  • performance of construction and installation works
  • performance of components test and installed systems
  • performance of functional and acceptance tests
  • use permit obtainment
  • selection, supply, device and information systems installation
  • comprehensive service, facility maintenance and installed systems

IT harnessed to the enterprise management and effects on their growth and efficiency, and also increase competitiveness on the market. IT support for business requires both new technologies information knowledge and business rules management understanding. Monolit IT provides tools to:

  • visualize functions and business processes
  • examine progress in achieving business goals by the pre-defined measures
  • analyse and simulate processes in order to optimize them
  • select and implement an optimal business model
  • monitor business model implementation on every stage
We offer products and services in the scope of:
  • Identity Management (IDM), Access Management (AM)
  • information management exchange within the enterprise (BPM -Business Process Management)
  • market analysis and products sales support (BI - Business Intelligence)
  • workflow document and work group
  • individual employees productivity and departments optimization (WFM Workforce Management)
  • reduction of deploying costs, operating costs and IT systems services
  • optimal model data choosing (outsourcing, cloud computing)

"Today in business, when important is IT solution flexibility and its implementation and, above all, the all costs and the decisions are taken by the organizations must be accurately hit in need. Therefore, it is good to use the services from experienced consulting companies in order to increase success chances of IT projects. An objective look of outside consultants enables to rationalize needs and expectations generated by the business, so that changes made in the IT area or in chosen system were be appropriately scaled and tailored to the company’s needs. Experienced Monolit IT advisors are able to embrace all the issues related to process , which supporting financial success in business."