Welcome
Enhance your IT organization with expert consulting services.
Empowering You To Excel
Empowering You To Excel
At Ted Fisher Consulting, our mission is to help organizations address their need for specialized IT skills by providing quality, expert, and reliable IT services. We strive to help our clients get the most from their technology solutions while protecting their IT operations.
Ted Fisher started working in IT systems management and event monitoring, which led him to focus on crossroads areas of IT where the network, system, application, and security interact most heavily. Our skillset is strongest in areas where advanced software (Splunk, etc.) and protocols (SAML, etc.) are necessary.
We offer a wide range of IT consulting services, including Splunk Architect and Administration, Data Integration, Identity and Access Management (IAM), Systems and Event Monitoring, Unix/Linux Administration, and more.
From designing your Splunk instance to installation and configuration, we have you covered. Cluster config of indexers, search heads, and all types of forwarders are tailored to fit your data needs We can help with all types of data ingestion including syslog, Http Event Collector, via API, etc. We also help with all Splunk config, especially parsing, development of searches, report, alerts, and dashboards. We can teach your staff how to manage their own search and reporting elements with minimal help from a Splunk specialist. Of course, performance tuning of your cluster elements and searches are also available to keep your searches optimized. Finally, if you have an upgrade or migration on your agenda we can help there too. Splunk is a powerful tool, but one that does require proper setup and config. Let us help you get the most from this incredible data tool.
IAM is definitely one of those arenas that intersect the application, network, system, and security which is critical to reliable and secure access to software services. And, as a result it requires employing complicated protocols like SAML and Oauth, etc., as well as reliable but responsive identity stores like LDAP or AD. If this is not complex enough it is also necessary to use workflows to engage APIs into your many systems the IAM integrates with. With in-depth experience in all aspects of IAM and authentication mechanisms we can help tackle your IAM and authentication / SSO needs
Since most organization have a large array of systems and services the need for integration between these many end points seems to just keep growing. Often this requires an integration mechanism to facilitate disparate systems or data structures. We can help with solutions using shell scripting combined with Perl or Python, etc. to reformat data, manage API engagement, facilitate data transfers or migrations, etc. We've worked with a variety of software tools and techniques to make data integration and automation happen. Let us help you make your data integrations work smoothly.
One of the key elements of keeping a production environment stable and accessible is monitoring events and the status of the services that provide end user access. We have worked extensively with common tools like Nagios, etc. to create custom monitoring that is beneficial to your operations. We've also done in depth service checks to assure that your the most critical services are fully operational. We also understand the need to apply proactive checks versus reactive response as well as how to integrate tools for both of them for a comprehensive monitoring system that assures accessibility and security are on point.
Having started in Unix / Linux systems we can help you keep your systems working efficiently and effectively. We excel at the very important ability to keep production systems online. If you're working through migrations or upgrades we can help keep projects moving while minimizing downtimes or disruptions.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.