The Solution

An industrialized IT platform, delivered as a service


24/7 monitoring and error handling

An industrialized approach to platform, service and application monitoring ensures end-to-end visibility throughout the value chain. Intility’s monitoring platform is continuously updated with new functionality, which enables Intility to identifand handle error situations before they affect end users or service quality. 

Intility is the Single Point of Contact for all types of error situations and performs error handling in collaboration with system owners and service providers as an included part of the service. 


End-to-end support

A 24/7 support service, with deep operational insight through real-time data from the underlying platform, clients and network, is central to supporting employees through their IT workday. 

The support platform on Intility is continuously developed. Machine learning models, automation and portal interfaces that aggregate increasingly more data from different platforms help enhancing the precision in handling inquiries, errors and interaction between Intility, system suppliers and each companys own IT resources. 


Network services

Network delivered as a service from Intility supports Intility’s overall responsibility for the establishment, operation, monitoring and life cycle management of each company’s cloud-based network platform and integrations with external cloud services as well as communication lines, mobile data communication and local network. 

Intility’s network platform is fully virtualized and software defined. Automation, micro-segmentation and 24/7 monitoring and handling of all types of error situations on the network ensure stability, scalability and security throughout the network delivery. 


Security and compliance

Today’s dynamic threat landscape imposes the need for a security architecture that is constantly updated and developed. Therefore, all companies on Intility are protected by an industrialized security platform, delivered as a service. 

Intility’s Security Operation Center (SOC) is an integral part of Intility’s built-in platform security, and conducts continuous threat intelligence, detection and handling of security incidents 24/7 in close collaboration with leading security actors. 

The security platform is supported by an information security and compliance service that simplifies the work of ensuring compliance with internal and external audits by issuing regular audit reports to all companies on Intility. 


Documentation and portal tools

Intility’s portal services provide extensive self-service features as well as access to detailed documentation and operational insight into each company’s own IT environment. 

The portal contains customized interfaces for each company’s employees, with information about their own equipment and applicationsas well as guides and support featuresEach company’s IT resources have access to complete inventory overviews for clients, networks and systems, tools for automatic provisioning of users, access and services, real-time health status information and much more. 

The interfaces are continuously updated and are central to the interaction between each company’s internal IT resources and Intility in the further development of the company’s IT environment on Intility. 


Application operations and DevOps

Applications on Intility are handled by a set of industrialized services and technologies that together form a comprehensive “system cradle” for the applications. 

These services include detailed 24/7 monitoring of applications, databases and web services, integrated identity solutions, privileged access control, self-service, high availability, code control and CI / CD. 

Intility ensures high quality in the implementation, integration, documentation and continuous development of the customer’s applications on Intility, regardless of development methodology and platform. 


Workplace and device management

The workplace services on Intility include end-to-end responsibility for everything from clients, network, security and mobility solutions to 24/7 support and operations of each company’s core systems and Microsoft 365. 

A complete lifecycle management service for PC and Mac clients, mobile devices and local infrastructure components ensures security, continuous updates, automated software deployment and efficient error handling. 


Identity and access control

Identity and access management is ensured on a hybrid identity platform that provides automated multi-cloud user provisioning and seamless access to both internal and external systems and services. The platform is tightly integrated with Azure AD, including timed privileged access, conditional access and multifactor authentication. 

User administration is fully automated and performed in comprehensive portal interfaces or via integrated HR systems, where users are created, changed and terminated to ensure efficient governance and correct licensing.