Technical Expertise

Open Innovations Technical Expertise is vast. The following is a partial list of our knowledge foundation that we bring to your business.

  • System Administration using Windows, Mac OSX, Linux, FreeBSD, Solaris, and other platforms, not to mention the operating systems of days gone by, such as DOS, NeXTStep/OpenStep, IRIX, Digital/Tru64 UNIX, OS/2, BeOS, Netware, just to name a few.

    • Our experience with Windows dates back to version 1.0 back in 1985 to Windows 8 of today. Microsoft's Servers from Windows NT 3.5 to Windows Server 2012. We have worked with pretty much all of Microsoft's technologies, such as Exchange from version 5.5 to 2010, SQL from 2000 to 2012. We have the experience to help you with every part of Microsoft's vast product line.

    • Apple operating systems all the way back from the Apple ][+ to OS X 10.8 of today. We also fully understand Apple's particular type of network protocols AppleTalk and Apple Filing Protocol (AFP).

    • GNU/Linux since kernel 1.74 (1993) to the 3.x series of today. We work with a variety of Linux distributions and we are very familiar with RedHat, Debian, Ubuntu, Gentoo, and Slackware. We know the technologies that make these platforms so useful, such as Apache, Postfix, MySQL, PostgreSQL, Nagios, MRTG, IPTables, Samba, Snort, Bacula, Maia MailGuard, Amavis, SpamAssassin, DansGuardian, Asterisk, and everything else that lets you leverage the capabilities that GNU/Linux can bring to your business.

    • Then there is the true Unix platforms such as FreeBSD 2.1 (1995) to version 9. Solaris 2.1 (1993) to version 11. We have spent a lot of time with these true Unix platforms and can leverage the power that they have to offer to your business.

  • Networking design and implementation, using hardware, software, and other technologies from a variety of vendors.
    • Hardware Routers and Layer 3 Equipment from vendors such as Cisco, Juniper, HP, Foundry. Software based routers using Linux and FreeBSD. Routing protocols such as BGP, EIGRP, OSPF, RIP, etc.

    • Firewalls and Intrusion Detection/Prevention Systems from Fortinet (Fortigate), Cisco PIX/ASA, Juniper, Sonicwall, Netscreen, Checkpoint, Raptor, Linux IPTables / IPChains / FWBuilder, FreeBSD IPFilter (IPF).

    • Virtual Private Networks (VPN) using IPSec IKEv1/IKEv2, PPTP, L2TP, OpenVPN, Fortigate SSL, Cisco VPN, SSH. Using hardware VPN appliances from Cisco, Fortinet, and other vendors. Linux software VPN stacks such as StrongSWAN, OpenSWAN, Racoon, KAME, PPTP, OpenVPN, etc.

    • Load Balancers using Layer 4/5 from F5, Foundry, Cisco, Coyote Point, Linux and FreeBSD.

    • Networking Protocols such those based on IP (TCP, UDP, AH, ESP, GRE, etc), IPv4, IPv6, SMB, CIFS, Samba, NFS 2/3/4, AppleTalk, AFP, NetBIOS,

  • Security is a very large and encompassing set of technologies, techniques, procedures, and design implementations. We are also extremely familiar with and do auditing for PCI/CSS and HIPAA compliance. These are a few of the variety of methods that Open Innovations uses when deploying secured environments.
    • Proper Firewall deployment with built in Intrusion Prevention System (IPS), Anti-Virus, Anti-Malware, Content Monitoring/Filter. The Fortinet line of Fortigate firewalls fulfill all of these requirements.

    • Hardening of the Operating Systems being used through the use of common set of procedures to lock down Windows, Linux, Solaris, FreeBSD, Mac OSX operating system. These include items such as password strength and complexity, disabling services provided by the operating system, running an operating system specific firewall.

    • Creation of a specialty logging and security server. This is a specialty server set up to provide a network logging end point for all the servers and devices in the secured network, instant alerts of abnormalities or errors in the system logs, File Level Intrusion Detection which monitors changes to any internal system files on the servers, daily network scans, etc. The server is set up with very long and complex unique password all to itself, and if possible, network authentication and layer 3 routing is disabled. We usually use Linux or FreeBSD, Syslog-NG, OSSEC, Snare, NMap, and other software to perform this task.