{"id":503,"date":"2023-10-26T13:10:27","date_gmt":"2023-10-26T18:10:27","guid":{"rendered":"https:\/\/bgsolutions.tech\/?post_type=portfolio&#038;p=503"},"modified":"2023-11-07T19:05:47","modified_gmt":"2023-11-08T00:05:47","slug":"implementacion-de-infraestructura-windows-y-despliegue-de-solucion-de-transcripcion","status":"publish","type":"portfolio","link":"https:\/\/bgsolutions.tech\/en\/portfolio\/implementacion-de-infraestructura-windows-y-despliegue-de-solucion-de-transcripcion\/","title":{"rendered":"Windows Server Infrastructure Implementation with Integrated Authentication Token"},"content":{"rendered":"<h3 class=\"wp-block-heading\" style=\"font-size:1rem\">Description<\/h3>\n\n\n\n<p>Implementation of Windows infrastructure and Deployment of transcription solution.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Challenge<\/strong><\/h3>\n\n\n\n<p>Implementation of a highly available Windows server infrastructure, in addition to the integration of a cryptographic token for the authentication process, and the configuration of the necessary communication network components.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Solution <\/strong><\/h3>\n\n\n\n<p>The network design was carried out, applying an approach of segmentation and microsegmentation to cover different aspects such as servers, CCTV monitoring systems, logistics, and transcription of information. Furthermore, the installation and configuration of a Storage Area Network (SAN) dedicated to data storage were carried out.<\/p>\n\n\n\n<p>Additionally, the installation and configuration of Windows Server operating systems were executed, and the necessary configurations for services such as Active Directory, DNS, Certificate Authority, and DHCP were performed.<\/p>\n\n\n\n<p>Finally, the transcription solution for records developed by the client was implemented, which incorporated cryptographic tokens integrated into the Active Directory Certificate Authority service as part of the authentication process.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Sector<\/strong><\/h3>\n\n\n\n<p>Private<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Service<\/strong><\/h3>\n\n\n\n<p>Implementation of IT Solutions <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Client<\/strong><\/h3>\n\n\n\n<p>Technology Provider <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Location <\/strong><\/h3>\n\n\n\n<p>Germany<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Audience <\/strong><\/h3>\n\n\n\n<p>B2B<\/p>","protected":false},"excerpt":{"rendered":"<p>Descripci\u00f3n Implementaci\u00f3n de infraestructura Windows y Despliegue de soluci\u00f3n de transcripci\u00f3n&nbsp; Desaf\u00edo Implementaci\u00f3n de infraestructura de servidores Windows, altamente disponible, adem\u00e1s de la integraci\u00f3n de token criptogr\u00e1fico para el proceso de autenticaci\u00f3n, y la configuraci\u00f3n de los componentes de red de comunicaci\u00f3n necesarios. Soluci\u00f3n Se llev\u00f3 a cabo el dise\u00f1o de la red, aplicando un [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":514,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_mo_disable_npp":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_vp_format_video_url":"","_vp_image_focal_point":{"x":0.57,"y":0.65},"footnotes":""},"portfolio_category":[18],"portfolio_tag":[],"class_list":["post-503","portfolio","type-portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/types\/portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/comments?post=503"}],"version-history":[{"count":4,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/503\/revisions"}],"predecessor-version":[{"id":523,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/503\/revisions\/523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/media\/514"}],"wp:attachment":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/media?parent=503"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio_category?post=503"},{"taxonomy":"portfolio_tag","embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio_tag?post=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}