Telesma

Telesma is a managed services provider for data center infrastructure, cloud, networks and cybersecurity.

Connect with this company Image arrow more

Contact

Name: Jorge Rubén Macías López

Area: Operaciones

Email: marketplace@telesma.mx

Phone: 5580689171

KIO data center where our infrastructure is located

Our primary/production infrastructure is located in the KIO Querétaro 1 data center, while our secondary infrastructure is located in the KIO MEX1 data center.

Technology Management

Managed services for infrastructure and technology platforms, adhering to best practices such as ITIL, ISO 27001, NIST, and COBIT, are supported by service level agreements that apply to our proactive maintenance, upgrade, capacity and configuration management, as well as to handling issues generated by our clients.Our management services apply regardless of the technology delivery method, whether they are provided on loan or for sale, and whether it is technology the client already owns, has purchased, or has contracted with a third party.Management services are based on a portfolio of predefined policies according to the type and dimensions of the technological assets, with the possibility of customizing the scope for specific technologies, configurations or volumes.

Monitoring and Event Management

Managed services for monitoring infrastructure and technology platforms, adhering to best practices such as ITIL, ISO 27001, NIST, and COBIT, are covered by service level agreements that apply to our proactive functions of:

  • Implementation of monitoring, detection and alerting rules,
  • Configuration of dashboards and reports,
  • Analysis, logging, classification, notification, and escalation of alerts,

as well as handling cases generated by our clients.

portfolio of predefined policies according to the type and size of the technology assets, with the possibility of customizing the scope for specific technologies, configurations, or volumes.

Managed network perimeter security

Network perimeter security with physical or cloud-based firewalls, in systems designed for multiple branches, remote offices, headquarters, or data centers, implementing redundant architectures that securely enable business operations by protecting user internet activity and the communication required for applications.

We work with recognized manufacturers to provide comprehensive solutions and can also work with the client's existing security technology.

Managed Endpoint Security

Endpoint security—for personal computers, mobile devices, servers, and SaaS—with threat protection, detection, and response capabilities.It allows us to protect the activity, identity, devices, and data of users and the organization across diverse architectures that combine physical devices, logical identities, and data transferred over communication networks and stored in local repositories or the cloud.Comprehensive solution with market-leading technologies.

Managed continuity and disaster recovery

Business continuity solutions implemented through backup and replication mechanisms for physical and virtual servers, databases, files, and cloud services (SaaS), enabling us to provide the recovery levels required to support the business and ensure compliance with each client's regulatory requirements.We integrate industry-leading technologies with our own physical and virtual infrastructure, public clouds, and the client's or third-party infrastructure.

Hypercon Cloud Services

Virtual servers with management, monitoring, and security, delivered on our Nutanix hyperconverged platform.
  • We consider security as part of the initial architecture, integrating endpoint security with EDR and perimeter security.
  • We have additional security components such as SASE, WAF, and event correlation to provide 360-degree security.
  • We design business continuity plans based on business criticality, guaranteeing recovery capabilities in the event of any contingency.
  • We offer customized monitoring and observability services so that clients always have relevant information about their business processes.
  • Our expert ethical hackers perform complementary vulnerability analysis, penetration testing, and code analysis, scheduled according to business and regulatory requirements.