Selecting a Technology Partner

You should never award business by default. The experts at Gartner Consulting Group say that the best way to receive value from your technology partners is to obtain outside input, competitively bid projects, understand your business requirements and most importantly, avoid proprietary solutions.

Our design plans provide your organization with the following information:

  • Key system security attributes required
  • Detailed engineering specifications and diagrams
  • Key system performance attributes required
  • Key system security attributes required
  • Support for key network standards
  • Detailed engineering resource schedule
  • Detailed project schedule

Plans, Assessments and Proof of Concepts (POC)

Microsoft Exchange Email Design Plan

Datalink Networks is a Microsoft certified Exchange design and planning partner. We have deep experience delivering enterprise designs for commercial, academic and public sector clients. Clients can leverage Microsoft Software Assurance Services to fund 3, 5, and 10 day design engagements. Our plans provide detailed engineering drawings, server and storage requirements and project engineering resource requirements.

Our engineering and project management teams work in tandem with your internal teams, to help deliver the technology solution that makes the most sense for your business.

Microsoft Lync 2013 Design Plan

Datalink Networks is a Microsoft Certified Lync design and planning partner. We have extensive experience delivering enterprise designs for commercial, academic and public sector clients to support a legacy PBX to Lync migration strategy. Clients can leverage Microsoft Software Assurance Services to fund 3, 5, and 10 day design engagements. Our plans provide detailed engineering drawings, server and storage requirements, and project engineering resource requirements.

Microsoft Lync 2013 Proof of Concept (POC)

Datalink Networks can build an Enterprise Lync 2013 System to support up to 5,000 users. Our POC provides the hardware, software and Lync phone devices along with engineering services in one bundle that integrates Microsoft Lync 2013 into your environment.

For public agencies and education we provide these bundles under a GSA schedule.

  • IM/Presence
  • Enterprise voice/video
  • Audio and video conferencing services
  • Mobile device integration
  • Legacy PBX integration
  • Unified messaging

Microsoft Redundant Lync 2013 Bundle

Datalink Networks will extend your Enterprise Lync 2013 System to support a highly available (H/A) clustered environment. Our bundle provides the hardware, software, and engineering services in one bundle that can prepare Microsoft Lync to replace your existing legacy PBX environment.

For public agencies and education we provide these bundles under a GSA schedule.

  • IM/Presence
  • Enterprise voice/video
  • Audio and video conferencing services
  • Mobile device integration
  • Legacy PBX integration
  • Unified messaging

Private Cloud Migration Plan

Many organizations still have data centers that are still running legacy applications on aging physical servers with inefficient direct attached storage. Our private cloud migration plans provide a comprehensive roadmap to take your data center from the physical to virtual world. We catalogue hardware, storage and network data center resources along with applications and create a physical to virtual schedule to move them.

Security Assessments

Network and data security is essential to operating today's modern data center. Datalink Networks provides comprehensive security assessment services to commercial and public sector clients. Our services include:

Security Scan – External and internal security assessment. (1-2 days)

Security Assessment – External and internal scan with security engineer review, network infrastructure review with analysis and assessment. (3-5 days)

Network Penetration Test – External and internal scan with security engineering review, network infrastructure review and application scans included. A network engineer will attempt to compromise the network. (5-10 days)