IntelliTeK are approved to supply ICT Services to NSW Government bodies. We aim to give agencies and businesses greater confidence that our ICT services meets government requirements and also reduces red tape.
The details of what IntelliTeK are approved to offer NSW Government bodies is as follows:
Architecture and Design
Enterprise & Business Architecture
Analysis of business structure and processes, development of technology roadmaps to support business and ICT strategies. Development and dissemination of ICT standards taking into account impact on legacy technologies and facilitating adoption of future trends. Includes modelling, development and adoption of frameworks as well as definition of current, transitional and future state architectures
Information architecture covers all the sources and forms of information that define the enterprise architecture.
Development of technology solutions that deliver business requirements within the guidelines of an enterprise architecture, when available. This includes development of technical specifications, selection of technology components and development of solution designs.
Benchmarking includes identifying accurate historical and / or current data against which a data set can be compared now and / or in the future. Demonstrated experience in the identification, adaption and adoption of benchmarking processes is also required.
Data Centre Services
Provision of expert advice and recommendations on: migration strategies, future data centre operating and governance models including best practices such as ITIL. Assistance with key strategic documents. Provision of services to assist with actual migration activities. Provision of services associated with data centre operational activities including delivery “as a Service”. Note: All other data centre services are provided under the NSW Government’s Data Centre lease arrangement with Metronode Pty Ltd.
Data Centre Equipment
Supply of infrastructure items within the data centre including: Servers (virtual or dedicated); Storage Systems (for example – storage area networks, network attached storage, tape systems, optical systems); Appliances (for example – de-duplication appliances, backup appliances); Ancillary Equipment (for example – UPS, Firewalls, Routers, Switches); Peripherals (for example – racks, leads, cable trays).
End User Computing
End User Computing Installation, Configuration and Maintenance including delivery “as a service”
Installation, configuration and maintenance. Includes ordering equipment, delivery, installation of operation systems and decommissioning of existing equipment.
End User Computing Management including delivery “as a service”
The provision of infrastructure services and the associated supporting resources that enable service level agreements to be met to the customer’s satisfaction. As a result the customer’s staff should be able to undertake the core business functions that are dependent on the underlying desktop technology infrastructure. Includes, monitoring & analysis, backup and recovery and software licence administration. Updates installed as required inline with agreed timeframes.
End User Computing Hardware including delivery “as a service”
Supply of personal computers, notebooks and laptops, including full “as a service”. Monitors can be provided with the end user device. Note: Excludes the capital acquisition of any device meeting the Government Standard Specification under the ICT Hardware Agreement 888.
Monitors including delivery “as a service”
Supply of computer monitors, including full “as a service”. Note: Excludes the capital acquisition of any device meeting the Government Standard Specification under the ICT Hardware Agreement 888.
Other End User Computing Devices including delivery “as a service”
Supply of any computer based end user computing device not included in any other sub-categories under the End User Device category, including workstations, thin and zero clients. Includes full “as a service”. Note: Excludes the capital acquisition of any device meeting the Government Standard Specification under the ICT Hardware Agreement 888.
The provision of strategic vision and documentation associated with information and communications technology supporting ICT. This includes; strategy and plan development and evaluation, forecasting or analysis of future trends, strategic research and analysis, development of and advice on management frameworks (eg risk, service delivery management and portfolio management).
Procurement transition, integration and delivery of services. Includes contract development, contract planning, contract formation, contract management and service arrangement.
Efficiency & Optimisation
Design, development and maintenance of the operational tools, standards, methods, environment and protocols that enable the consistent and efficient delivery of quality outputs. This can include methodology planning and implementation, billing checking and management, development & implementation of; policies, procedures, analysis tools and standards for: integration, environment, desktop, project offices, performance and evaluation.
Network Equipment Installation, Configuration & Maintenance
Installation, configuration and maintenance of network equipment. Includes loading software, unit and network testing to confirm installation of equipment and software solutions, and configuration.
Network Operations including delivery “as a service”
Management of the fixed and mobile network environment. Includes the provision of integrated support services and architectures that facilitate access to a Customer’s application for both internal and external users. The facilities and services should support a secure and effective technological infrastructure. Covers traffic management, asset administration, facilities management, building cabling and network environment. Network performance meets agreed standards.
Strategic Risk Management
Considers risk from different perspectives with an organisation; strategic, programme, project and operational. Manages risks at a strategic and an organisational level and plans ongoing risk management, identifies mitigation tasks and optimising risk opportunities. Developing a risk methodology or framework.
Business Continuity Planning
Business Continuity Planning (BCPing) is a process that ensures an organisation can continue to operate after a major crisis or disaster. BCPing covers; preparation of a Business Continuity Plan, including a risk management plan, business impact analysis, incident response plan, a disaster recovery plan. Disaster Recovery Plan- A disaster may be anything that results in an inability to access the IT infrastructure, e.g. fire, flood, gas leaks, storms, serious corruption of data or other damage. It covers crisis management, process systems, operations and technology risks.
Capacity & Availability Planning
Capacity Planning baselines existing resources needs and anticipates the organisations future needs based on business input into a Capacity plan which includes; new and upcoming services and products, hardware and application development plans and organisational service levels.
Process & Technology Audits
Conduct ICT processes and technology audits which consider efficiency, costs, service levels, risk levels and alignment to business needs; report findings and make recommendations to the organisation on ways to improve.
Program Office Standards
The ability to creation or review an ICT Program Office including standards, reporting, change management, stakeholder communication, demand management, schedule management, resource management, configuration management, reporting, benefits realisation via programs, change control, governance and dependency management, project team collaboration, performance monitoring and controlling.
Project, Program & Portfolio Management
Manage a project from end to end including project mandate, initiating & business case, planning, executing, controlling, reporting and closing using a project methodology eg Prince 2. Manage large and complex deliverables that are broken down into manageable inter-related projects. Combines the ability and resources to define, plan, implement and integrate a program of works using a program methodology. Support and advise senior management decision making on strategic alignment, prioritisation, risk management, optimisation of resources etc to successfully deliver their business objectives.
Managing the business impact of implementing an ICT change to the business, including stakeholder communications, process and procedure changes, updates to or new documentation and training.
Server Installation, Configuration & Maintenance including delivery “as a service”
The Installation, configuration and maintenance of operating system software and testing of installation, licences, upgrades, patches of operating system (OS) software.
Operations Management including delivery “as a service”
Management and maintenance of the server environment. The management of mainframes, servers and ISP hosting hardware as well as the management of operating system and system management software. Includes the backup and recovery of servers and operating systems.
Security Strategy including delivery “as a service”
Create strategy, architecture, solutions and services that protect ICT environment. Includes developing strategies, conducting security audits and identifying risks and issues and conducting vulnerability assessments. Supporting and maintaining ISO 27001 certification.
Security & Firewall installation including delivery “as a service”
Provision of a security framework that facilitates access to the Customers’ applications, information and data for both internal and external users. Security and Firewall installation and configuration.
Security Testing including delivery “as a service”
Undertake various security testing including, penetration testing, web security testing, secure code reviews, Security and environment testing meets agreed standards.
Security & Firewall Management including delivery “as a service”
Management of a security framework that facilitates access to the Customers’ applications, information and data for both internal and external users. Including performance monitoring, security upgrades and access management.
Systems & Solutions
Business analysis includes structured identification, analysis and documentation of requirements associated with the design, development and implementation of business systems. This includes; business requirements specification, process analysis and design, procedure development, data migration and conversion planning, development and execution of testing strategies, problem identification and resolution, assessment of training needs, liaison between technical and business staff, research and analysis (eg market and customer), risk assessment and management.
Custom Application Development including delivery “as a service”
Custom Application development including: Design & Development, Enhancement, Integration & Implementation, Data Migration & Conversion, Testing, Performance & Metrics, Maintenance and ongoing support. Including provision of development, application development and support “as a Service”
Software Support & Maintenance Services including delivery “as a service”
Services for licensed software and /or developed software and may consist of help desk services, updates, new releases, ancillary services, ongoing maintenance services.
Software Resellers and Software Asset Management Services
Brokerage services for licensed software, software asset management and optimisation, and other software maintenance, subscription and support services.
Infrastructure and Utilities Software
Software licensing and support for database applications, data management, virtualisation and partitioning software, operating systems, enterprise application integration (EAI), application performance and monitoring software, programming language, web design, hosting and middleware applications software, and any infrastructure and utilities software.
Software licensing and support for enterprise resource planning (ERP) software, business intelligence (BI) and enterprise content management (ECM) software, computer-aided design, engineering and manufacturing software, office productivity software, and any software applications not included elsewhere.
Communications and Security Software
Software licensing and support for networking and mobile development and email and messaging software, cloud management software, identity access and encryption software, data protection, privacy protection and anti-virus software, and any communications and security software.