Services

Welcome to our Services

1. HARDWARE AND SOFTWARE SALES
We have a Sales team that swiftly delivers and assists in the supply of: Servers, Desktop PCs, Printers, PABXs, Routers, Point Of Sale equipment, Medical Equipment, Accessories and Consumables -Software for various applications including Operating Systems, Office Suites, ERP Systems, Anti-Virus, Point of Sale, Medical Software. -Networking Equipment: - Routers, Fiber-Optic cables, Convertors, Accessories, Unified Threat Management Appliances, Wireless Networking Kits -Some of the brands that we deal in include: HP Servers, Desktops, Notebooks, Printers, Dell, IBM, Microsoft, Symantec, Kaspersky, ESET, McAfee, Avira, Canon, Acer, and CISCO, 4Pos, Palladium,Sage Erp Software




2. TECHNICAL SUPPORT SERVICES
Providing direct support through installation and equipment handling (Servers, Desktops, Networks, Printers) -General maintenance and repairs -Standby Support and servicing of equipment. -Service Level Agreements.
Networking (LANs and WANs), designs and installations including wireless networking solutions -Software support and installations. This includes Billing software, Security, Point Of Sale, Server software -Data recovery and extraction We think you need time to focus on your core business whilst we expertly handle your IT systems. We are offering you the peace of mind from increased uptime at less expensive long run and short run costs. When the internet service provider (ISP) gives an organization its feed of bandwidth, what next? 3.1 Internet Consultancy Zodzo Global comes in and takes over from there, for the design and implementation of: - Routers, -Firewalls -Domain Registrations -Corporate e-mail -Website Design -E-Business Strategies & Implementations -Fiber installation and termination -VPNs -Vlans -Routing -Domain Registrations 3.2 IT Security Consultancy This involves the design of security, policies and procedures. It also involves the design and implementation of both logical and physical security that organization are prone to: * External - Intruders - Hackers - Spies - Intrusion Prevention Systems - Identity Based firewalls * Internal - Viruses - Hackers - Malice & Sabotage - Spam - Indiscriminate surfing that exposes the network to various network threats - Time based web and application filters to manage bandwidth usage. A structure for giving rights and permission has to be designed, and it should only give the correct people the correct access to just what they require in order to execute their jobs. Prevention, Monitoring and Control are the emphasis and the necessary instruments should be in the right places.

3.1 Internet Consultancy 
Zodzo Global comes in and takes over from there, for the design and implementation of: - Routers, -Firewalls -Domain Registrations -Corporate e-mail -Website Design -E-Business Strategies & Implementations -Fiber installation and termination -VPNs -Vlans -Routing -Domain Registrations

3.2 IT Security Consultancy 
This involves the design of security, policies and procedures. It also involves the design and implementation of both logical and physical security that organization are prone to: * External - Intruders - Hackers - Spies - Intrusion Prevention Systems - Identity Based firewalls * Internal - Viruses - Hackers - Malice & Sabotage - Spam - Indiscriminate surfing that exposes the network to various network threats - Time based web and application filters to manage bandwidth usage. A structure for giving rights and permission has to be designed, and it should only give the correct people the correct access to just what they require in order to execute their jobs. Prevention, Monitoring and Control are the emphasis and the necessary instruments should be in the right places.


4. CONSULTANCY SERVICES 
4.1 IT Consultancy
 -Gap Analyses -Due Diligence Exercises -Formulation of IT Strategies IT Policy and Procedure Formulation and Documentation -Preparation of Responses to Tender -Tender Evaluations -Contract Negotiations -Project Scoping, Product Specification Project Charters and Project Plans -Internet Security 

4.2 Project Management 
Independent Project Management Coordination of all the contractors necessary for a complete project i.e. I) Site Preparation -Computer Rooms -Networking and Cabling -Power Conditioning -Physical & Logical Access & Security ii) Acquisition of Equipment
















Search