433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351
Poseidon provides Managed Services (Operations & Maintenance) offerings through our KRONOS™ solution within an on-premise, hybrid, and/or cloud data center on a per monthly basis.  KRONOS™ provides assessments, monitoring, and maintenance solutions for Active Directory (AD), Exchange/O365, Virtualization, and Network environments.

KRONOS™ enhances the availability, performance, maintainability, and agility of the Data Center technology and operations through the combination of System Development Life Cycle (SDLC), Network Development Life Cycle (NDLC), Project Management Institute (PMI) Project Management Body of Knowledge (PMBOK) and ITILv3 methodologies to include Service-Level Targets (SLT) and/or Service-Level Agreement (SLA) support.

Poseidon has a team of Enterprise Active Directory (AD)/Exchange Architects that provide in-depth technical O&M solutions allowing domains to efficiently work together and provide streamline requests.  Additionally, this team is well versed in Exchange/O365, Virtualization architectures (VMware and Hyper-V) from site-to-site or on-premise to the Cloud (Azure, AWS, Oracle, HP Greenlake, and OnX); drastically improving the reliability, efficiency, and availability of server resources and applications for Small, Medium, and Enterprise Environments Virtualization Design and Deployment, Server Provisioning, Backup & Recovery, Disaster Recovery/Business Continuity, Virtual Desktop Infrastructure, Best Practices Review, and Performance Tuning Maintenance and Upgrades.

Poseidon provides Enterprise Network O&M through the implementation of Secure, Effective, and Efficient configurations within virtualization, cloud, on-premise, and hybrid environments using CISCO, Palo Alto, HP, and Ubiquiti solutions, to name a few.  We understand the business needs of having a fast and reliable network and specialize in implementation of firewalls, network switches, hubs, routers, and most importantly, security of your environment based on best practices, Defense Information Systems Agency (DISA), and Department of Defense (DoD) Standards.