CLT

Consulting Logical Technologies

Look at our company as a think tank, a team of brilliant engineers, architects and managers with a "we will make it happen" attitude.

We provide IT project & service delivery management to our clients with many beneficial factors, to make sure we guarantee the highest quality possible, this is how we distinguish ourselves from the competition.

By creating value and engaging with both customers and our employees, we create an agile service delivery culture.

Assessment & Solution

We start with assessments to come to a solution, may be performed on a single solution or be used to compare multiple proposed solutions to recommend the best course of action to proceed. The output of this task is the assessment of the proposed solution and its purpose is to assess the value delivered by each proposed solution.

Learn More

Plan & Design

Our information technology consultants advise on plan, design and install information technology systems with strong interpersonal and communication skills to deal effectively our clients.

Learn More

Actualize

Once we have a project execution plan, we use it to define how we will execute a project. That should be obvious from the name, but it also addresses the project scheduling, monitoring and controlling needed to bring the project deliverables.

Learn More

Virtual Workspace Services

Virtual workspaces are mainly used for high-performance and low-cost remote work. They rely on virtualization software, which abstracts operating systems, applications, and data from a computing device’s underlying hardware. We can help you with design, maintenance and constant improvement of managing different Virtual Workspace Services.

Learn More

Desktop Engineering

We install, maintain, and troubleshoot required client software and hardware, whether onsite or remotely. Our desktop engineer's vital goal is to deliver support to an organization's desktop, laptop and mobile phones to ensure all computers, network connections and software are functioning smoothly.

Learn More

Helpdesk Services

We provide the expertise via software platforms (ticketing tools) that helps end-users solve their problems through a single (or multiple) point of contact. It allows our employees and IT team members to troubleshoot problems, track their issues, and get assistance regarding products, services, or processes.

Learn More

Client Delivery Management

Client Delivery Managers serve as the middleman of a business enterprise and they usually spend time at the clients' operations centers. Our managers help clients learn new software or consolidate new people, products, technologies and determine the needs of their clients while they supervise delivery.

Learn More

Operational Delivery Service Management

Our delivery managers are responsible for making sure that services are being seamlessly delivered to the clients of an organization. They are in charge of a variety of tasks, such as leading project teams, rectifying reliability issues, monitoring progress, tracking SLA's and KPIs, and managing budgets.

Learn More

Quality Assurance

Quality Assurance generally encompasses the entire development process, including standards compliance; requirement, design and code reviews; software inspections; testing; and management processes such as configuration management and process improvement.

Learn More

Cloud Security

Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. We measure and ensure user and device authentication, data and resource access control, and data privacy protection.

Learn More

Application Security

Authentication, authorization, encryption, logging, and application security testing are all examples of application security features. Our developers also use code to reduce security flaws in applications.

Learn More

Network Security

Firewalls control incoming and outgoing traffic on networks, with predetermined security rules. Network Segmentation, remote Access VPN, Email Security, Data Loss Prevention (DLP), Intrusion Prevention Systems (IPS), etc. Our information security model is made up of the three main components: confidentiality, integrity and availability.

Learn More

Transition Planning

Well-prepared transition plans will be of little value unless there is commitment to act upon the plans and to determine whether the goals are being achieved. We guide the major changes which have been made through the service transition process, provide the resources, prioritize and coordinate, so that multiple transition action items can be managed at the same time.

Learn More

Knowledge Transfer

Knowledge Transfer, often also called the discovery phase, is the process where we define the required knowledge, classifies it, assign an owner to each item and tracks its progress. The action of transferring knowledge is obviously the most important step. This is followed by a review and sign-off by the receiving team and the project subject matter expert.

Learn More

Production Phase

In the Production phase, we mainly focus on the Implementation of the project, optimization including the reduced cost and risk factors. It also involves various testing for efficient deployment of the project with an ongoing support to make the transition successful. In other words, keep the system running smoothly and show end-users how to use it.

Learn More

Service Desk Automation

Does your ITSM have an automation element? Surveys report that password resets alone contribute to 41% of IT tickets. As the capabilities of service desk automation expand, companies that are early to embrace the change will thrive while those that resist change will struggle to keep up. Plus, they will miss the opportunity to free up their IT support personnel from mundane tasks for more worthwhile and creative work. We have many ideas to automate service desk operations, such as incoming ticket processing, automated follow-ups, SLA Tracking and Compliance, etc.

Learn More

End-To-End Automation

Transform and optimize your operational processes with Hyperautomation. It is all about choosing the right processes to automate, then applying the right mix of technologies to rapidly create intelligent automation solutions on a broad scale. Combining low-code, composability, best-of-breed and process orchestration, it supports your efforts to empower knowledge workers and progress your business.

Learn More

Automated Patch Management

Automated patch management is the process of distributing patches automatically and removes as much human interaction as possible from the process. Instead of system admins spending hours distributing patches manually, systems intelligently distribute patches to targeted devices automatically. It ensures devices and systems are updated regularly. It strengthens network security by rapidly patching security vulnerabilities. Automatically downloads the latest patches from vendors. Helps administrators quickly identify vulnerable systems. And allows them time to focus their efforts on managing their networks and supporting their users.

Learn More
  • Calea Văcărești 391, Bucharest, Romania