Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

TASK 1

Company Overview (Larsen & Toubro)

L&T India is the country's largest engineering and construction firm, and it also has an extensive
portfolio in information technology, cement, and electrical sectors. L&T InfoTech Limited, a 100%
subsidiary of Larsen & Toubro Limited, offers whole software solutions and services. Its range of
services encompasses a broad range of technical advances, helping to support world-class
multinational companies all over the globe.
The need
After the realization that the complexity of Group IT infrastructure has been increasing with the
significance of operations, L & T InfoTech started the process and a tool to manage a wide and
complicated information technology infrastructure.

TASK 2
L&T's information technology infrastructure has become more complex over time. The management
of L&T InfoTech's vast and complicated infrastructure has been accomplished via the employment of
a technique and a tool to satisfy the criticalities of its operations. Pereira's contribution Brian
Larsen and Toubro India's diverse business activities and character enable the company to offer a
comprehensive information technology infrastructure. The installation of an IBM 1401 system goes
back to 1971, and L&T is considered to be one of the nation's early adopters of information
technology. In 1977, the Center was organized as a distinct entity, the Information Systems Division
(ISD), which was responsible for educating the various L&T divisions. During the execution of a 30-
person-year project in Europe, the ISD took its first step toward globalization in 1987. The project
was a success. In 1997, L&T ISD was transformed into L&T InfoTech Ltd, which is a wholly owned
subsidiary of the company. Many additional initiatives were launched in the United States, Europe,
and the Asia-Pacific region. This was done in order to offer the global market with more attention to
customers, greater flexibility, and quicker response times.
L&T InfoTech employs 2,200 people and has grown into a software house with SEI CMM Level 5
certification as well as a complete provider of information technology solutions. It has seven growth
centers in India, and it has a global presence in the United States, Europe, and Japan via its many
offices. It has seven growth centers in India.
A significant emphasis on the domain is placed on the following vertical sectors by L&T InfoTech:
utility and telecom services, manufacturing (discrete and process), financial services, manufacturing,
manufacturing, and manufacturing, manufacturing, and manufacturing (banking, insurance,
securities). Among the areas of expertise that he has are the following:
 Maintenance of Legal systems through Platform of IBM
 Reengineering and Porting
 Services related to internet (E-commerce or web enabler)
 Development of Apps
 Solution of Euro currency
 “ERP consulting (SAP R/2, R/3)”
 Services of GIS
 “Telecommunication services”
 “Embedded systems”
The company's IT infrastructure steadily improved as the size and complexity of the L&T group grew.
As a first step in the efforts to fulfil the key business functions of L&T Information Technology, the
firm initiated a search for a method and instrument to manage its large and complicated
infrastructure. L&T InfoTech regards its software contracts as crucial, and as a result, it cannot offer
its worldwide customers a rock-solid infrastructure to deliver on their promises of top-tier service.
The major considerations leading to the selection of a solution were: To keep infrastructure
operating smoothly, you must have the ability to identify and manage outages in advance.
The need for a network operations center was necessitated by L&T InfoTech's decision to establish
a network in 2001. (NOC). The NOC would also handle L&T InfoTech's infrastructure, as well as the
infrastructure belonging to the L&T Group.

Network Operation

The NOC was launched in April 2002 and is located in Powai, Mumbai. It extends over a surface of
2,000 m2.
The NOC's resources comprise:
 Midrange and low-end hardware servers. Desktops, backup devices, storage devices;
peripheral networks.
 Various UNIX Flavors, Windows NT/2000 Operating Systems.
 Applications – SAP apps, messaging applications and associated databases.
 Multi-protocol WANs and LANs.
 L&T's networks, include VSATs, L&T Netcom (the captive L&T Group ISP), a CUG
composed of local and international leased lines.

Under a single roof the L&T global network and the NOC is L & T's global network nervous center.
The support team is split into three levels within the NOC. Web interface or telephone calls may be
accepted. This level manages routine events.
If the problem requires more qualified personnel, it will be transferred to level 2 or level 3.
(specialists).
The time allowed to resolve the problem may be increased or automated. Each user should have a
portal view of all components of the services provided. Each item is shown. Therefore, there is an
overview of servers, Network components and reports that impact your company for each SBU.
L&T InfoTech has developed its own reporting tool to track and assess online incident response. The
tool provides the reports for a monthly review meeting. If necessary, all SLAs will be reviewed and
amended. The meeting will take place. There is continued evidence of progress and problems and
weak areas that are crucial for CMM 5 companies are identified.

The basic needs fulfilled by the NOC is to develop a services managed by:
 Ensuring delivery through process-oriented approach of customer-centric information
technology services
 To provide services that achieve goals in terms of cost and performance, such as high
availability and maximized use of capacity.
Benefits of Cost
Because of the significantly reduced downtime on PCs, servers, and networks, the NOC has already
recovered the costs of its operations in the first 12 months of operation. Downtime is crucial to a
company's operations in virtually every corporate information technology function. There are 14 SAP
instances at L&T, which serve a variety of businesses including cement, where downtime implies
that cement trucks from their plants are unable to transport their product (one truck every three
minutes).

Execution
For the following reasons, according to L&T InfoTech, the installation of the NOC is unique and
significant:

 The involvement of in-house teams was required in order to pilot the roll out of the CA Uni
center at six sites across India.
 In India, it was one of the first organizations to deploy the CA Unicenter version 3.0.
 It was completed in-house by the company's IT infrastructure design team, which was
responsible for the functional design.
 This project included implementing IT Infrastructure Library (ITIL), a standard designed
especially for information technology service management. ITIL has developed into the BS
15000 standard, which is currently in use.
 SAP, communications, and associated databases are among the applications on the road
plan for future development.
 The creation of a Knowledge Repository is included in the roadmap in order to enable quick
troubleshooting by less experienced employees.

Managing tools of Networking


In preparation for a whole infrastructure rollout, L&T InfoTech has selected a computer associates
network management system for administration of the entire infrastructure.
This particular project took five months to install CA Unicenter. Some of the components of this
network management system have been developed by L&T InfoTech:

• Unicenter Desk Service

• “Desktop Administration Suite”

• Unicenter Network and management system

• services level of Unicenter Management

• application management likeUnicenter Lotus Notes

SAP is now managed by its own in-house Solution Manager. The integration with Unicenter has
been postponed until a later timeframe.
"The implementation of the service desk, in conjunction with the ITIL-based incident management
procedures (Information Technology Infrastructure Library), has enabled us to provide a significantly
higher level of service consistency and repeatability," says J.C. Colaco, General Manager of IT
Services.
It has been reported by Colaco that almost half of all incidents are handled by employees with less
expertise, who are classified as level 1, and that this has a positive effect. "Unicenter SLMO provides
a clear image of many of our communication links, including their availability, use, and other
characteristics. This frees up the experienced personnel to work on more challenging duties"
(Service Level Management Option). The capacity of different sources can be planned, and the
quality of service may be guaranteed, "Colaco explains.
The asset management option provides for the tracking of hardware and software assets, as well as
the comparison of licensing availability, in order to ensure that they are in compliance with the
company's policies. In order to improve the efficiency of incident reporting, data from the Asset
database will be extracted and combined with user data.
L&T was the first company to use Unicenter v3.0.
L&T InfoTech is presently adjusting its network management tool on a continual basis in order to get
the most possible benefits from deployment results. L&T InfoTech has really created a solution that
enables for the creation and publication of customized online reports with a wide range of
customization options and flexibility.

After having gained practical experience in implementing this network management solution, L&T
InfoTech aims via training to increase and solidify this expertise, then to get into external contracts in
the area of corporate management. It will also combine the administration of infrastructure with the
maintenance capacity of its offshore software.

TASK 3

The importance of data security can hardly be overstated in the digital age. No action, online or off,
can occur without these three concepts: security, privacy, and data integrity. The safety of the data is
mostly addressed in the context of secure information transfer via credible communication networks.
Data security in databases is, nevertheless, as vital. In this post we provide several common data
protections to improve and strengthen databases.

The importance of data security can hardly be overstated in the digital age. No action, online or off,
can occur without these three concepts: security, privacy, and data integrity. For whatever reason,
data protection was needed for each individual connected to and utilizing the Internet. Safety of data
is vital. This is a requirement in every aspect of the online business. Data security is necessary in
many activities, including the secure use of online money, the transmission of sensitive information,
Web services, and much more. Databases are just as crucial as the Internet when it comes to data
security. Databases hold a lot of data. The kind of information stored varies from one enterprise to
another. All kinds of information, however, need some security of data conservation. How
information is generated depends on the safety level. For example, military databases require a
robust and high degree of safety in order for no external person except the authorities involved to
access the information since the spread of critical data may be dangerous and life threatening in this
case. By comparison, a public server database may not have as strong a security need as a military
database.

Databases safety is important because they are subject to security risks which, when publicly
revealed or accessible, may prove destructive and disastrous. Below are some security risks that the
databases experience.

 Privilege Abuse: if excessive rights are given to the user of database than their necessary
capability they may deliberately or accidentally abuse these privileges.
 Valid privilege Misuse: An attacker may abuse the information contained in the database for
harmful purposes by the assailant with legitimate privilege access to the database.
 Promotion of privilege: The attacker exploits software flaws and mistakes in this attack and
then increases clearance for access to vital information contained in the database.
 Operating System vulnerabilities: An attacker uses the operating system vulnerabilities to
obtain unauthorized access to the database for malevolent purposes
 Operating system vulnerability
Many database security methods have been suggested to help relieve these database security
threats. The majority of these methods focus on securing the database against unauthorized access
by strengthening the access control systems. The focus of our article is on some of the typical
security measures that may be used with access control methods to keep information safely, even
from outsiders.

Following is a list of some of the most popular database security strategies.

Cryptography: Cryptography is the study and practice of methods in which the plaintext is
transformed into a falsified non-readable text via encryption.

Hashing:  is defined by use of hash functions that do not allow the collection of the data to convert a
variable length data into a fixed length string.

Steganography: the technique of disguising sensitive information in any kind of cover medium is
steganography.

Access Control: Access control methods limit access to and information to external parties other
than authorized users to the database.

You might also like