Technologies

INFINITUM is a sophisticated company aimed at implementing the latest developments in the client service and project management business processes.

The following is implemented at INFINITUM:

  • Centralised process of technological changes
  • Complex approach to software
  • Integrated solutions
  • Project activities
  • Knowledge data base and legislative change monitoring system
  • Updated tree of business processes

All INFINITUM management systems comply with international standards:

  • Service Administration Management System (SAMS) – ISO/IEC 20000-1:2011.
  • Information Security Management System (ISMS) – ISO/IEC 27001:2013.
  • Quality Management Systems (QMS) – ISO 9001:2008.

In 2015-2016 INFINITUM successfully passed the recertification audits of all management systems; we show consistency and unfailing commitment to high professional standards and requirements every year.

The main software includes 32 specialised programs, some programs were developed by third party contractors, and some programs relate to our in-house developments.

INFINITUM has well-developed IT infrastructure including:

DATA PROCESSING CENTRE

  • Advanced automatic fire suppression system
  • Room conditions monitoring and support system controlled by security and SMS notification in case of near-critical conditions
  • Standby uninterruptible power supply

STANDBY DATA PROCESSING CENTRE (DPC)

In case of failure of one or more servers of the main DPC all services are fully restored in the standby DPC within one hour.

SERVER HARDWARE

Each critical system is served by at least 2 clustered servers

DATA STORAGE SYSTEM, INFORMATION BACKUP

  • Industrial data storage system: 100% of information backup and maintaining continuity of IT services operation
  • The expected level of information availability is 98%, which is equivalent to the maximum downtime of 7 days in a year

NETWORK INFRASTRUCTURE, SOFTWARE AND HARDWARE INFORMATION SECURITY SYSTEMS

  • Three-level network architecture. Fault tolerance is due to the mutual backup of the root routers
  • Information security systems prevent the use of the documents related to the intellectual property outside the Company’s local area network