Services delivery efficiency based on dedicated resources
Complete integration of 3 lines of services
Our services delivery organization efficiently provides comprehensive SAP administration and hosting solutions through the operational integration of 3 lines of services – Hosting, 24/7 monitoring and SAP Basis administration. The teams in charge of each line of services are physically located together at our data centers and support centers in order to seamlessly integrate the services provided for the management of critical SAP systems.
oXya maintains a team of SAP experts to assist our 3 lines of services with the resolution of incidents or complex customer requests.
The organization of our services delivery model is fully compliant with ITIL guidelines. In particular all key processes are based on ITIL concepts and recommendations to guarantee application availability and efficient management of situations such as change requests and incident resolution.
The quality of services produced by our integrated services delivery organization is the foundation of the satisfaction and loyalty of our clients.
“Follow the incident” or “follow the sun”?
24 by 7 organizations can be based on either a single team in one location working in shifts around the clock or multiple teams in multiple locations working as a relay and following the sun around the globe.
At oXya, our 24 by 7 organization is based on the concept of “follow the incident”; each level 2 customer support team is responsible and accountable for the escalation and resolution of incidents related to their allocated customer systems. This approach avoids incident handovers from team to team and offers the benefit of efficient continuity of incident resolution services under the responsibility of one team.
SAP endorses that quality of services delivered by oXya
oXya obtained renewed Certified SAP Hosting partner status, in recognition for its know-how and the quality of its hosting resources and ITIL compliant services delivery processes.
SAP awarded oXya Certified SAP Hosting Partner status after an in-depth audit of our two data centers and complete service delivery organization.
The number and quality of our customers added positive conclusions to the audit and further confirmed oXya’s status of SAP Certified Hosting Partner.
With almost 100 technical services and hosting SLAs in place and over 40 SAP upgrades and other consulting projects completed in partnership with SAP, oXya is a well respected player in the SAP ecosystem.
SOC 1 - SSAE 16: Worldwide recognition
Organizations regularly perform internal audit procedures to validate that their business practices are compliant with Sarbanes Oxley or other industry specific regulatory requirements. To validate that services out-sourced to external services providers are also compliant organizations often required that their services providers are SOC 1 (SSAE 16) audited.
An SOC 1 audit (Service Organization Controls Report) is a report issued upon by independent and certified auditors and expresses an opinion on the procedures and controls in place within a services provider’s organization to provide services on behalf of its clients. The SOC 1 Report is what you would have previously considered to be the standard SAS70, but falls under the SSAE 16 guidance.
The SOC 1 audit report is intended to be used by other auditors - those of its clients in particular. It addresses the necessity for service companies to show that they have relevant controls in place for when they host or process data belonging to their clients.
The entire oXya organization is SOC1 compliant
oXya has started the ambitious SOC 1 (SSAE 16) audit process, covering the entire scope of our outsourcing services:
- Data centers
- Monitoring / operations
oXya USA has already successfully completed it SOC 1 (SSAE 16).
In Europe, our SOC 1 (SSAE 16) audit is scheduled to be completed in the last quarter of 2012
Our operational delivery model lends itself to be ITIL compatible
On a daily basis our customers perceive oXya as a dedicated team in charge of support and administration services operating as an extension to their internal IT team. Our dedicated teams operate as integrated service desks allocated to individual customers. Under the responsibility of a Services Delivery Manager each support team provides daily support, plans and anticipates change request, analyzes and resolves incidents.
Stable, competent, responsive, each Services Delivery Team work uses our internal services monitoring tools – Koaly - to track and document every action performed on customers’ systems.
In particular Koaly offer functionalities to create and manage services delivery procedure and associated documentation that precisely follow ITIL incident/problem/change cycle and CMBD (Configuration Management Data Base) recommendations. All procedure definitions and documentation are accessible to authorized stakeholders through a secure web connection to Koaly.
Koaly – IT infrastructure and operation monitoring framework designed for SAP
Designed for services delivery teams in charge of the support and administration of IT infrastructures supporting SAP applications, Koaly is a web based portal that provide a complete set of features compliant with ITIL recommendations;
- Management of incidents and problems
- Management of requests and changes
- Management of infrastructures and configurations
- Supervision of equipments and applications
- Electronic management of documents
- Management of recurrent tasks
- Management of passwords
- Publication of reports.
Koaly offer the benefits of complete traceability of service center actions, standardization of exchanges among clients, management, technicians and constant update of administration and support knowledge database.
Our support teams and customers see Koaly as an efficient tools to support their daily IT monitoring and administration activities and particularly appreciate its key characteristics;
- Access through a web portal (Intranet and/or Extranet)
- Easy set up, deployment and administration
- Intuitive features which don’t require extensive training
- Rapid access to information
- Security and performance.
Security, a major expectation
In today’s business environment, the security of their IT systems is a major for every organization and a key aspect of the selection process of the hosting solutions vendor.
At oXya, we have a team of security specialists to work with our customers to fully understand and meet their IT security requirements in terms of;
- Permanent integrity of their IT system
- Guaranteed confidentiality of information.
Permanent integrity of the IT system
Our mission includes a key objective which is to guarantee the permanent availability and optimal operating conditions of the IT systems we host and managed for our customers. We meet this objective by investing time and talent in the design and implementation of;
- Resilient and redundant data center infrastructure and resources
- Operation and administration procedures in line with the requirements of individual customers.
Data Center Infrastructure
Our Hosting data centers are interconnected via broadband connections and offer state of the art features in line with industry best practices;
- Physical security 24/7
- Completely redundant electrical and air conditioning systems
- Sophisticated fire detection and extinction system
- Multiple range of telecoms operators
- Ability to implement Camper Cluster solutions between 2 rooms
- DRP Solution more than 200Km apart
- Operations, monitoring and maintenance 24/7 for installations and technical equipments.
Operation and Administration procedures
- The solution’s robustness
- The redundancy of the components
- The security of the technical architecture (cluster, data replication…)
- Possible dispersion over multiple data centers
- The implementation or not of DRP
- Network security policy (restored access, insulation)
- A redundant network access
- Follow up of changes.
Guaranteed confidentiality of information
One of our most fundamental responsibilities is to protect the confidentiality of the information located on the systems we host for our customers, both in terms of physical and logical access. The increased mobility of users can present, for example, a danger for the confidentiality of information exchanged over the network. Our main challenge is to constantly guarantee that only authorized personnel securely access to data, based on their user rights maintained in their user profile.
Our vigilance focuses mainly on following points;
- Control and monitoring of access to the hosting site as well as the hosting rooms
- Security of backup medias externally in a vault room
- Establishment of leak proof networks and isolation of servers within demilitarized networks (DMZ)
- Monitoring of networks and intrusion attempts
- System administration and management of user accounts and rights.