MANAGED SERVICES
“Your IT Infrastructure Is Safe with ITSS Managed Services!”
IT is an invisible force that keeps companies running and gives them a competitive edge! And as long as it remains invisible, everything is great. However, if you are constantly preoccupied with IT needs and issues instead of focused on your core business, this force is probably not operating optimally.
![]()
As your Managed Services provider, ITSS can either complement your IT department or be your IT department as your strategic IT partner. This simplifies your IT operations, reduces your costs and allows you to focus on your core business.
![]()
ITSS undertakes the entire process of selecting, procuring, installing, operating and managing the most suitable technology for your business needs. Just specify your business needs—ITSS will meet them by providing you with suitable SLAs.

IT STRATEGY IDENTIFICATION AND PLANNING SERVICE
With our consultants, who have many years of executive-level IT management experience, we help you identify and select the right technologies for your digital transformation process, in line with your business needs.

24/7 OPERATION SERVICE
ITSS provides the operation service of the information technologies infrastructure in a flawless manner, in line with the methods determined by your organization.
Within the scope of the 24/7 Operation service:
– We monitor warning messages from the data center’s sound, light, or monitoring applications.
– We perform backup and recovery checks.
– We monitor the backup of databases and directories that you determine.
– We perform rollback operations from backups when you need them.
– We store backups outside your data center in case of any emergency.
– We carry out operational services.
– We monitor and automate applications, systems and communication networks and perform manual operational checks.
– We check critical applications.

OPERATING SYSTEM MANAGEMENT
This covers the management services of Microsoft Windows, Linux and IBM’s AIX and AS/400 operating systems according to our customers’ IT policies and industry compliance and standards.
Within the scope of Operating System Management service:
– We check and repair operating system errors.
– We monitor performance and report possible bottlenecks.
– We regularly monitor and analyze manufacturers’ security service packages and patches and apply them to the required systems.
– We tighten operating system configurations at regular intervals.
– We monitor and test manufacturers’ new versions and apply them to the required systems.

MICROSOFT ACTIVE DIRECTORY MANAGEMENT
This includes the installation of the Microsoft Active Directory infrastructure or the management services of the installed infrastructure alongside the creation of user and authorization designations for customers to access the assets in their IT infrastructures in line with the corporate information security policies.
Within the scope of Microsoft Active Directory Management service:
– We create and install Active Directory design (Site, Services, Organizational Units).
– We create users in the system by making user definitions.
– We create security authorization groups and user memberships according to the Role, Authorization and Access matrix.
– We create group policies and implement them in the system.
– We add, delete and modify users.
– We perform password changes.
– We configure and regularly examine Active Directory logs (Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), etc.).
– We make third-party applications and Lightweight Directory Access Protocol (LDAP) integrations if necessary.
– We configure and manage Microsoft services required for Active Directory operation, such as DHCP, DNS and LDAP.

24/7 MONITORING SERVICES
This service plays an important role in the uninterrupted operation of your critical business applications. With proactive monitoring tools, we detect problems in advance that may occur in your IT infrastructure and applications and we take measures to solve them.
Within the scope of the 24/7 Monitoring service:
– We register your critical IT components to the system-monitoring infrastructure.
– We create the impact matrix of your service IT components.
– We examine alerts from IT components and initiate the first response to potential problems.
– We record in the service management infrastructure those problems that we cannot solve at the first level and forward them to the second-level support team or to you.

VIRTUALIZATION MANAGEMENT
This covers the management services of VMware, Hyper-V and KVM virtualization platforms.
Within the scope of the Virtualization Management service:
– We check and repair virtualization system errors.
– We monitor performance and report possible bottlenecks.
– We regularly monitor and analyze manufacturers’ security service packages and patches and apply them to the required systems.
– We monitor and test manufacturers’ new versions and apply them to the required systems.

DATA STORAGE SYSTEM MANAGEMENT
This service manages data storage systems that ensure the continuity, efficient accessibility and secure storage of critical data in line with the requirements of companies’ business needs.
Within the scope of the Data Storage System Management service:
– We regularly monitor data storage systems.
– We monitor data storage systems’ performance metrics and adjust data storage system disk configuration if necessary.
– We create capacity plans by following data storage capacity utilization statistics.
– We analyze and report performance and capacity utilization.
– We keep data storage system logs and analyze them for error detection and troubleshooting.
– We follow and apply new manufacturer-recommended versions of hardware firmware, drivers and applications.

MICROSOFT EXCHANGE MANAGEMENT
This service covers the Microsoft Exchange messaging system management for users’ internal and external messaging needs in line with the customer organization’s information security policies.
Within the scope of Microsoft Exchange Management service:
– We design and install the exchange server in line with customer IT policies.
– We define user email addresses and make necessary arrangements for users to access their email inboxes securely.
– If needed, we create shared mailboxes and make necessary authorizations.
– We define email distribution groups and create memberships.
– We perform user mailbox migration and closure operations.
– We regularly review exchange system logs.
– We regularly follow and apply new versions, service packs and security patches that Microsoft publishes.