Digital Transformation: Cloud-First Programs

Digital Transformation: Cloud-First Programs

Strategic Communications offers State, Local and Education (SLED) agencies an avenue for streamlined cloud procurement and digital transformation through NASPO ValuePoint! Through Strategic’s NASPO ValuePoint Cloud Catalog, SLED agencies have the capability to order and deploy a multitude of cloud solutions in supporting their IT infrastructure, platforms, and applications. These solutions cover a very broad range of services such as cloud-based phone systems, unified communications, enterprise resource planning (ERP) modules, network and email security, and desktop as a service.

To learn more about NASPO ValuePoint Cloud Solutions contract and how your agency can participate please visit https://www.yourstrategic.com/naspo-valuepoint/.

CAPEX vs OPEX with Buy-Back of On-Premises Assets

For CIOs and CFOs, comparing CAPEX (on-premises hardware expenses) against OPEX (pay-as-you-go cloud model) has both performance and financial implications effecting mission-critical processes. As uncertainty of the recent pandemic grows, the realization for real-time autoscaling, provisioning and deployment of IT resources takes center stage.

Both CIOs and CFOs are looking at performance, security, and long-term financial impact of migrating to a cloud-first strategy. In partnering with Tech Data, Strategic Communications transforms your CAPEX into OPEX with our IT Asset Disposition Services! It’s really simple, we buy-back your existing on-premises data center equipment, maximize product life value, and re-purpose the funds in going toward your cloud-first initiatives.

Our IT Asset Disposition Services include:

Pre-Build Solutions (AWS and Microsoft)

Strategic’s AWS and Microsoft Azure Cloud Pre-Build solutions are part of Tech Data’s Cloud Solutions Factory which includes a broad set of IT and business solutions practices. These solutions leverage leading cloud providers, including Microsoft Cloud and Amazon Web Services, and its vast ecosystem of independent software vendors (ISVs), and aggregate additional solutions, components, and licensing. Our Pre-Build solutions help scale public and private businesses seamlessly to support their rapidly growing cloud needs, streamline services with provisioning, management, support tools and deliver business outcomes, enabling valuable long-term relationships.

Strategic’s Pre-Build Solutions include:

End of Support for Windows Server 2008 / 2008 R2 and SQL Server 2008 / 2008 R2

In 2020, Microsoft ended support for SQL and Windows 2008 and 2008 R2 servers. Microsoft granted customers taking part in Software Assurance or Server Subscription services with Extended Security Updates (ESUs) for those servers covering only “critical” or “important” security updates. In migrating SQL and Windows 2008/2008 R2 into Cloud, customers gained 3 additional years of “critical” and “important” security patches, even after the End-of-Support (EoS) deadline.

Strategic’s team of cloud engineers roadmap lifecycle management of your Microsoft Servers in performing seamless migrations of on-premise servers into the cloud! Extend the life of your on-premises EoS Microsoft Servers while mitigating critical security breaches of your data.

RiverMeadow Cloud Migration Services

Strategic Communications partners with RiverMeadow in offering an array of robust cloud migration services for AWS, Microsoft Azure and Google Cloud! Our expanded cloud migration capabilities include:
Private Cloud Deployments
Data Seeding
Database Migration
Enhanced VMware Use Case
Block vs File Level Storage
UEFI Support
Data Only Migration
NFS Migration
CSV Mass Migration

Workload Placement and Cost Analysis Assessment

Most IT organizations are increasingly involved in determining optimal workload placement.
Should workloads stay on premise? Move to a public or private cloud or be deployed in a
hybrid environment? The top three criteria for deciding which workloads to deploy, where
and at what time are – security, performance requirements and cost. Strategic Communications offers Workload Placement and Cost Analysis Assessment services as a great starting point for understanding your “as-is” environment. Also, our services address your concerns for migrating a workload that will reduce costs and increase business agility.

How the assessment service works:

  • Conduct comprehensive workload analysis to discover system elements and
  • Leverage best practices and proprietary/ 3rd party tools to simplify the process.
  • Document the migration project specifications.
  • Analyze costs based on migration options and determine the right destination.
  • Gain newfound perspective and next steps for achieving goals.

Well Architected Reviews with CloudCheckr

Strategic Communications partners with CloudCheckr in offering Well Architected Reviews for AWS, Microsoft Azure, and Google Cloud customers! With CloudCheckr CMx, Strategic’s cloud engineers delivers total visibility into infrastructures and organizational management—by individuals, teams, and roles. With the ability to unify disparate data sources across an enterprise, businesses achieve immediate and actionable insights on how to run and scale public cloud infrastructure.

Compliance Audits & Remediation in Preparation for New CMMC Requirements

The Cybersecurity Maturity Model Configuration (CMMC) framework is a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. The CMMC is the DoD's response to significant compromises of sensitive defense information located on contractors' information systems. Strategic Communications provides products and solutions (both on-premises and cloud-hosted) meeting CMMC requirements for DoD agencies.

The CMMC framework consists of 5 cumulative certification levels:

Level One

Basic Cyber Hygiene

Level One: Basic Cyber Hygiene:

Includes basic cybersecurity appropriate for small companies utilizing a subset of universally accepted common practices. The processes at this level would include some performed practices, at least in an ad hoc manner. This level has 35 security controls that must be successfully implemented.

Level Two

Intermediate Cyber Hygiene

Level 2: Intermediate Cyber Hygiene

Includes universally accepted cybersecurity best practices. Practices at this level would be documented, and access to CUI data will require multi-factor authentication. This level includes an additional 115 security controls beyond that of Level 1.

Level Three

Good Cyber Hygiene

Level Three: Good Cyber Hygiene:

Includes coverage of all NIST SP 800-171 Rev. 1 controls and additional practices beyond the scope of current CUI protection. Processes at this level are maintained and followed, and there is a comprehensive knowledge of cyber assets. This level requires an additional 91 security controls beyond those covered in Levels 1 and 2.

Level Four

Proactive

Level Four: Proactive:

Includes advanced and sophisticated cybersecurity practices. The processes at this level are periodically reviewed, properly resourced, and are improved regularly across the enterprise. In addition, the defensive responses operate at machine speed and there is a comprehensive knowledge of all cyber assets. This level has an additional 95 controls beyond the first three Levels.

Level Five

Advanced / Progressive

Level Five: Advanced / Progressive:

Includes highly advanced cybersecurity practices. The processes involved at this level include continuous improvement across the enterprise and defensive responses performed at machine speed. This level requires an additional 34 controls.

Contact Us!

  • This field is for validation purposes and should be left unchanged.
Digital Transformation: Cloud-First Programs

Digital Transformation: Cloud-First Programs

Strategic Communications offers State, Local and Education (SLED) agencies an avenue for streamlined cloud procurement and digital transformation through NASPO ValuePoint! Through Strategic’s NASPO ValuePoint Cloud Catalog, SLED agencies have the capability to order and deploy a multitude of cloud solutions in supporting their IT infrastructure, platforms, and applications. These solutions cover a very broad range of services such as cloud-based phone systems, unified communications, enterprise resource planning (ERP) modules, network and email security, and desktop as a service.
To learn more about NASPO ValuePoint Cloud Solutions contract and how your agency can participate please visit https://www.yourstrategic.com/naspo-valuepoint/.

CAPEX vs OPEX with Buy-Back of On-Premises Assets

For CIOs and CFOs, comparing CAPEX (on-premises hardware expenses) against OPEX (pay-as-you-go cloud model) has both performance and financial implications effecting mission-critical processes. As uncertainty of the recent pandemic grows, the realization for real-time autoscaling, provisioning and deployment of IT resources takes center stage.

Both CIOs and CFOs are looking at performance, security, and long-term financial impact of migrating to a cloud-first strategy. In partnering with Tech Data, Strategic Communications transforms your CAPEX into OPEX with our IT Asset Disposition Services! It’s really simple, we buy-back your existing on-premises data center equipment, maximize product life value, and re-purpose the funds in going toward your cloud-first initiatives.

Our IT Asset Disposition Services include:

▸ Refurbishment Services

Refurbishment Services
Certified technicians provide comprehensive repair and refurbishment services for the full spectrum of IT products down to the component level, including:

Servers
Storage
Networks
Hard drives
Circuit boards
Desktop and laptop computers
Computer peripherals
Telecommunications, broadband and point-of-sale products

By repairing more parts, you reduce the amount you need to manufacture and have fewer in circulation at end of life. You work with a single provider who handles the full IT lifecycle of their technology assets.

▸ E-Cycling

Our core environmental protection policy calls for zero landfill, zero incineration and zero export of non-functioning assets or e-waste. We use a vertically-integrated and closed-loop Environmental Management System to ensure that assets are disposed of properly, which features:

De-manufacturing
Parts harvesting

▸ Data Erasure and Security

Strategic Communications works to deliver a solution customized to your needs satisfying compliance regulations specific to your organization, country and/or industry. We’ll certify that data has been completely removed from retired equipment or that the equipment has been completely destroyed through:

On-site data erasure
Off-site data erasure
Physical destruction

▸ On-site Services

We provide on-site professional services at offices and data center locations nationwide. Our on-site services include:

Packaging and shipping
Inventory
Data erasure
De-installation

▸ Inventory Management and Reporting

Through Tech Data, Strategic Communications provides a comprehensive disposal program that starts with picking up retired equipment at the source and ends with a certificate of data destruction, as well as:

Secure online portal
Asset reporting
Inventory tracking

▸ Account Management

We provide you with an experienced and dedicated account management team and secure customer portal login. Our customer-centric operations deliver complete visibility into all equipment and sales results, as well as a single point of contact for scheduling, tracking and reporting on nationwide activities. We work collaboratively to develop services for designing and implementing strategic ITAD solutions that are tailored to your needs. Your account management team will:

Provide trade-in or buyback quotes
Manage the revenue share program
Deliver reporting associated with the revenue share program
Monitor end-to-end solution payments
Work with the project managers who are quoting and selling the product
Oversee the auditing

Pre-Build Solutions (AWS and Microsoft)

Strategic’s AWS and Microsoft Azure Cloud Pre-Build solutions are part of Tech Data’s Cloud Solutions Factory which includes a broad set of IT and business solutions practices. These solutions leverage leading cloud providers, including Microsoft Cloud and Amazon Web Services, and its vast ecosystem of independent software vendors (ISVs), and aggregate additional solutions, components, and licensing. Our Pre-Build solutions help scale public and private businesses seamlessly to support their rapidly growing cloud needs, streamline services with provisioning, management, support tools and deliver business outcomes, enabling valuable long-term relationships.
Strategic’s Pre-Build Solutions include:

▸ Veeam Cloud Connect on Azure, AWS and Google Cloud

Our Veeam Cloud Connect is a preconfigured, pre-built solution, meaning it is immediately ready to be deployed once provisioned. Strategic gives customers the flexibility of the Veeam Cloud Connect for the Enterprise software with the security, high availability, and quality of service of Azure, AWS and Google all bundled in a pay per use package.

▸ SQL Server on Red Hat Linux Enterprise

Strategic’s SQL Server on RHEL is a high-performance solution combination for consolidating current, and new generation applications and their respective data management stacks It provides the accelerated database performance critical for meeting modern demands.
With this solution comes lower total cost of ownership and a quicker return on investment. All required features are built in, including memory capabilities, security, migration tools, and high availability/disaster recovery at no extra cost you can avoid extra licenses, training time, and hardware costs while ensuring that your initial investment in SQL Server pays off.

▸ SQL on Windows

Tech Data SQL on Windows is a preconfigured, pre-built solution, meaning it is immediately ready to be deployed once provisioned. This solution is a fully compatible, secure, and cost-effective solution specifically designed to transform and secure your SQL database environment. Now you can easily and confidently migrate SQL workloads to the Cloud or extend and improve on premises capabilities.

▸ NetApp Cloud Volumes ONTAP on AWS, Azure and Google Cloud

Strategic’s NetApp Cloud Volumes ONTAP is a preconfigured, click to run solution all bundled in a pay per use package. NetApp’s Cloud Volumes ONTAP is a powerful, cost effective and easy to use solution for enterprise cloud storage Cloud Volumes ONTAP takes the same enterprise data management software and data protection capabilities that businesses have depended on for years and brings them into the cloud.

End of Support for Windows Server 2008 / 2008 R2 and SQL Server 2008 / 2008 R2

In 2020, Microsoft ended support for SQL and Windows 2008 and 2008 R2 servers. Microsoft granted customers taking part in Software Assurance or Server Subscription services with Extended Security Updates (ESUs) for those servers covering only “critical” or “important” security updates. In migrating SQL and Windows 2008/2008 R2 into Cloud, customers gained 3 additional years of “critical” and “important” security patches, even after the End-of-Support (EoS) deadline.
Strategic’s team of cloud engineers roadmap lifecycle management of your Microsoft Servers in performing seamless migrations of on-premise servers into the cloud! Extend the life of your on-premises EoS Microsoft Servers while mitigating critical security breaches of your data.

RiverMeadow Cloud Migration Services

Strategic Communications partners with RiverMeadow in offering an array of robust cloud migration services for AWS, Microsoft Azure and Google Cloud! Our expanded cloud migration capabilities include:

Private Cloud Deployments

Data Seeding

Database Migration

Enhanced VMware Use Case

Block vs File Level Storage

UEFI Support

Data Only Migration

NFS Migration

CSV Mass Migration

Workload Placement and Cost Analysis Assessment

Most IT organizations are increasingly involved in determining optimal workload placement.
Should workloads stay on premise? Move to a public or private cloud or be deployed in a
hybrid environment? The top three criteria for deciding which workloads to deploy, where
and at what time are – security, performance requirements and cost. Strategic Communications offers Workload Placement and Cost Analysis Assessment services as a great starting point for understanding your “as-is” environment. Also, our services address your concerns for migrating a workload that will reduce costs and increase business agility.

How the assessment service works:

Conduct comprehensive workload analysis to discover system elements and
Leverage best practices and proprietary/ 3rd party tools to simplify the process.
Document the migration project specifications.
Analyze costs based on migration options and determine the right destination.
Gain newfound perspective and next steps for achieving goals.

Well Architected Reviews with CloudCheckr

Strategic Communications partners with CloudCheckr in offering Well Architected Reviews for AWS, Microsoft Azure, and Google Cloud customers! With CloudCheckr CMx, Strategic’s cloud engineers delivers total visibility into infrastructures and organizational management—by individuals, teams, and roles. With the ability to unify disparate data sources across an enterprise, businesses achieve immediate and actionable insights on how to run and scale public cloud infrastructure.

▸ Log Intelligence

CloudCheckr CMx unifies AWS CloudTrail logs, AWS VPC Flow logs, AWS Config, Azure Security and Audit Logs, and more.

▸ Best Practice Checks & Alerts

Ensure compliance and security with pre-built Best Practice Checks.

▸ Perimeter Assessment

Mitigate risks by continuously scanning for accessible resources and open ports and protocols.

▸ Configuration Assurance

Fulfill PCI, HIPAA, FISMA, and other major compliance frameworks.

▸ User Permissions

Track and manage user permissions with automatic mapping and grouping across AWS and Microsoft Azure.

▸ Continuous Compliance

Strategic Communications works to deliver a solution customized to your needs satisfying compliance regulations specific to your organization, country and/or industry. We’ll certify that data has been completely removed from retired equipment or that the equipment has been completely destroyed through:

On-site data erasure
Off-site data erasure
Physical destruction

Compliance Audits & Remediation in Preparation for New CMMC Requirements

The Cybersecurity maturity Model Configuration (CMMC) framework is a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. The CMMC is the DoD’s response to significant compromises of sensitive defense information located on contractors’ information systems. Strategic Communications provides products and solutions (both on-premises and cloud-hosted) meeting CMMC requirements for DoD agencies.
The CMMC framework consists of 5 cumulative certification levels:

Level OneBasic Cyber HygieneLevel One: Basic Cyber Hygiene:Includes basic cybersecurity appropriate for small companies utilizing a subset of universally accepted common practices. The processes at this level would include some performed practices, at least in an ad hoc manner. This level has 35 security controls that must be successfully implemented.

Level TwoIntermediate Cyber HygieneLevel 2: Intermediate Cyber HygieneIncludes universally accepted cybersecurity best practices. Practices at this level would be documented, and access to CUI data will require multi-factor authentication. This level includes an additional 115 security controls beyond that of Level 1.

Level ThreeGood Cyber HygieneLevel Three: Good Cyber Hygiene:Includes coverage of all NIST SP 800-171 Rev. 1 controls and additional practices beyond the scope of current CUI protection. Processes at this level are maintained and followed, and there is a comprehensive knowledge of cyber assets. This level requires an additional 91 security controls beyond those covered in Levels 1 and 2.

Level FourProactiveLevel Four: Proactive:Includes advanced and sophisticated cybersecurity practices. The processes at this level are periodically reviewed, properly resourced, and are improved regularly across the enterprise. In addition, the defensive responses operate at machine speed and there is a comprehensive knowledge of all cyber assets. This level has an additional 95 controls beyond the first three Levels.

Level FiveAdvanced / ProgressiveLevel Five: Advanced / Progressive:Includes highly advanced cybersecurity practices. The processes involved at this level include continuous improvement across the enterprise and defensive responses performed at machine speed. This level requires an additional 34 controls.

Contact Us!

Name*

First

Last

Agency Name*Phone*Email*

Let Us Know Your Needs

jQuery(document).ready(function($){gformInitSpinner( 19, ‘https://yourstrategic.com/wp-content/plugins/gravityforms/images/spinner.gif’ );jQuery(‘#gform_ajax_frame_19’).on(‘load’,function(){var contents = jQuery(this).contents().find(‘*’).html();var is_postback = contents.indexOf(‘GF_AJAX_POSTBACK’) >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find(‘#gform_wrapper_19’);var is_confirmation = jQuery(this).contents().find(‘#gform_confirmation_wrapper_19’).length > 0;var is_redirect = contents.indexOf(‘gformRedirect(){‘) >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery(‘html’).css(‘margin-top’), 10) + parseInt(jQuery(‘body’).css(‘margin-top’), 10) + 100;if(is_form){jQuery(‘#gform_wrapper_19’).html(form_content.html());if(form_content.hasClass(‘gform_validation_error’)){jQuery(‘#gform_wrapper_19’).addClass(‘gform_validation_error’);} else {jQuery(‘#gform_wrapper_19’).removeClass(‘gform_validation_error’);}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery(‘#gform_wrapper_19’).offset().top – mt); }, 50 );if(window[‘gformInitDatepicker’]) {gformInitDatepicker();}if(window[‘gformInitPriceFields’]) {gformInitPriceFields();}var current_page = jQuery(‘#gform_source_page_number_19’).val();gformInitSpinner( 19, ‘https://yourstrategic.com/wp-content/plugins/gravityforms/images/spinner.gif’ );jQuery(document).trigger(‘gform_page_loaded’, [19, current_page]);window[‘gf_submitting_19’] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find(‘.GF_AJAX_POSTBACK’).html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery(‘#gform_wrapper_19’).replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery(‘#gf_19’).offset().top – mt);jQuery(document).trigger(‘gform_confirmation_loaded’, [19]);window[‘gf_submitting_19’] = false;}, 50);}else{jQuery(‘#gform_19’).append(contents);if(window[‘gformRedirect’]) {gformRedirect();}}jQuery(document).trigger(‘gform_post_render’, [19, current_page]);} );} ); jQuery(document).bind(‘gform_post_render’, function(event, formId, currentPage){if(formId == 19) {jQuery(‘#input_19_4’).mask(‘(999) 999-9999’).bind(‘keypress’, function(e){if(e.which == 13){jQuery(this).blur();} } );} } );jQuery(document).bind(‘gform_post_conditional_logic’, function(event, formId, fields, isInit){} ); jQuery(document).ready(function(){jQuery(document).trigger(‘gform_post_render’, [19, 1]) } );