Information Technology Consulting
Information Technology is the use of computers and software to manage the information. Computers play the important role in information technology. We can say IT is a technology to maximize the efficiency and production and improves the working efficiency. The world has become a Global HUB due to developments of IT.
Data Analytics Service (8/20/2019) - Data Analytics Services provides Buyers the capability to analyse large volume of business data, transform the data into intelligence and insight, and deliver this intelligence and insight to their business processes and business users. Such a comprehensive Data Analytics Module allows the Buyer to customize notification of certain indicators that Continue Reading
Virtual Machine (Compute) (8/20/2019) - Virtual Machines (VM) provide the basic IT Infrastructure that can be used by the Government Organizations to run their variety of workloads such as compute-intensive workload, memory-intensive workload, general-purpose workload, etc. All Virtual Machine packages, listed below, are Managed Virtual Machines. CSPs are required to list their prices on GeM Continue Reading
Storage Services (8/20/2019) - The Storage services can be defined in various categories Object Storage, File Storage, Block Storage, and Archival Storage. The Managed Storage Services is a storage infrastructure that is provisioned keeping the user needs in mind. Service Scope The Storage services can be defined in various categories Object Storage, File Storage, Continue Reading
Office productivity suite (8/20/2019) - This service provides Office coverage for desktop, laptop, tablets and smart phones (Android, iOS and Windows) with per user subscription install rights. There is no need to pay for version upgrades; updates are included in the subscription along with new features roll out regularly.
Identity and Access Management – Security Services (8/20/2019) - This service may be used to authenticate and authorize users and computing resources within a network by assigning and enforcing security policies
Firewall (Virtual/ Physical) (8/20/2019) - This service is used to monitor and control the incoming and outgoing traffic of a subnet by configuring some rules.
Product Maintenance Service (8/20/2019) - The scope of Product Maintenance Service covers upkeep & smooth working of the equipment within the user department. Service provider shall deploy trained, experienced and competent technical personnel for carrying out required Preventive Maintenance for the equipment as per bench marked maintenance practices / OEM manuals and to Provide and maintain proper Continue Reading
Networking and Data Center Specialists (8/20/2019) - Networking and Data Centre Specialists facilitates the hiring of Agencies to provide resources for high level consultancy and other IT related solutions. The scope of “IT Professional Outsourcing Services” is to provide specified number of IT professional manpower resources with requisite and prescribed qualifications and experience, to function and perform Continue Reading
Software Support Service (8/20/2019) - Software Support Services are utilized for healthy upkeep and maintenance of the Portfolio of Software Products that Buyer has implemented within their environment. The Broad Scope of work has been defined in the SLA under- Proactive Services Reactive Services Dedicated Support Engineer
Managed Database as a Service (Advance) (8/19/2019) - Database as a Service is a managed service offering by the Cloud Service Providers wherein in operating system and all low level components such as drivers, I/O, network, etc. are managed and optimized by the Cloud Service Providers. All objects created using "Database as a Service" are transparent to the underlying operating system. Activities Continue Reading
Log Analysis (8/19/2019) - This service may be used to generate insights from of the logs, by running queries against these logs. The service must retain the log for at least 30 days.
Hardware Security Module (8/19/2019) - This service can be used where a dedicated hardware security module is required to create, manage and control keys. The HSM must comply with FIPS 140-2 Level 3 requirements.
Database Licences (8/19/2019) - Siddhast offer database licenses to Government Organizations which they can use in that particular CSP’s Cloud environment. These are unmanaged databases. All these databases would have enterprise support included.
Container computer service (8/19/2019) - Containers are the lightweight alternatives to Virtual Machines. Containers allow to encapsulate an application’s code, libraries, configuration and other dependent files into one single package. This packaging of the application and its dependent files offers improved developer productivity and environmental neutrality. The developers can continue focusing on improving/updating their applications Continue Reading
Web Application Firewall (8/19/2019) - This service may be used to create rules to protect web applications from unwanted web traffic, hacks, brute force attacks, cross-site scripting, SQL injection, and other common exploits. The WAF must also provide protection against the OWASP top ten risks.
VPN Gateway (8/19/2019) - This service may be used to establish secure site to site connectivity between the subnets in Siddhast environment and Government Organization’s on-premises IT infrastructure. It can also be used to provide site to site connectivity two different subnets within the CSP’s Cloud environment.
Public IP (8/19/2019) - This service can be used to assign Public IP(s) to resources within a subnet in the Cloud environment.
Storage Services (8/19/2019) - Storage Services The Storage services can be defined in various categories Object Storage, File Storage, Block Storage, and Archival Storage. The Managed Storage Services is a storage infrastructure that is provisioned keeping the user needs in mind. Service Scope The Storage services can be defined in various categories Object Storage, Continue Reading
Load Balancer (8/19/2019) - Load Balancer Load balancer as a service has to act as a proxy and distributes networks of application traffic across a number of virtual servers. Virtual load balancer shall be capable to increase the capacity i.e. (concurrent users and reliability of the application across the virtual machines (VMs) ). The Continue Reading
Managed Database as a Service (Basic) (8/19/2019) - Managed Database as a Service (Basic) Database as a Service is a managed service offering by the Cloud Service Providers wherein in operating system and all low level components such as drivers, I/O, network, etc. are managed and optimized by the Cloud Service Providers. All objects created using "Database as Continue Reading
Basic Cloud Services (Load Balancer) (8/19/2019) - Basic Cloud Services, Load Balancer Load balancer as a service has to act as a proxy and distributes networks of application traffic across a number of virtual servers. Virtual load balancer shall be capable to increase the capacity i.e. (concurrent users and reliability of the application across the virtual machines Continue Reading
Basic Cloud Services (Identity and Access Management – Security Services) (8/19/2019) - Basic Cloud Services Identity and Access Management - Security Services This service may be used to authenticate and authorize users and computing resources within a network by assigning and enforcing security policies
Human resources Outsourcing Service (8/19/2019) - Technical Manpower Outsourcing Service Technical Manpower Service includes manpower with expertise in the fields of IT and operation, maintenance of equipment and machines, inspection, testing and quality control with assurance. Job responsibilities # Category (Office) Scope of Work 1 Administrative Operator or Office Assistant or Executive Assistant Create and manages Continue Reading
Product Lease Service (8/19/2019) - Product Lease Service Product Lease Service is a Service under which one party agrees to rent a new product owned by another party. It guarantees the lessee, use of the product and guarantees the lessor, regular payments from the lessee for a specified number of months or years It guarantees Continue Reading
AMC Networking Devices (8/19/2019) - Siddhast will provide AMC services for networking equipment as per details given below:-. The work includes the following: 1. Technical support and diagnosis in case of failure of network equipments. 2. Supplying the replacement spare parts to the location where the faulty equipment is located and part will be replaced Continue Reading
CDN Service (8/19/2019) - CDN Service Content Delivery Network (CDN) Service helps in reducing the load of hits on the Server by providing the distributed dissemination points for accessing the information or content in selected geographical locations across the globe. Content Delivery Network (CDN) achieve following: On-Demand Scalability – Delivery of live streaming with websites/on-demand/Archived Videos/Audio/Podcasting Continue Reading


IT Support Professional Certificate (8/18/2019) - IT Support Professional Certificate A job in IT can mean in-person or remote help desk work, either in a small business or at a global company. By earning an IT Support Professional Certificate, you can go from beginner to job ready in as little as eight months. Through a mix Continue Reading
Solr (8/18/2019) - Solr is an “open source search platform built upon a Java library called Lucene. Solr is a popular search platform for websites because it can index and search multiple sites and return recommendations for related content based on the search query’s taxonomy.” Solr product features include “full-text search, hit highlighting, Continue Reading
Training IR(Information Retrieval) (8/18/2019) - Siddhast® is known worldwide for Information Retrieval consulting services and we are now helping others to become more proficient in Information Retrieval via 1 and 2-day training workshops.In all workshops attendees go through several sequences of short lectures followed by interactive, group, hands-on exercises. All training are delivered by one Continue Reading









