About Unilogic Systems
Learn about who we are
We are a group of engineers and architects passionate about developing blueprints for IT platforms. The goal is to have blueprints that are specific and detailed so that implementers can build the necessary foundation for their network and IT infrastructure with minimal to no interaction from Architects.
Layered Infrastructure Architecture (LIA)
Architecture starts with an Idea
Before anything is brought to reality, there are discussions, brainstorming, sketches, and ideas noted. As more contributors sharpen their ideas, evaluate, add on, and collaborate, the information must be collected and organized into structured drawings, charts, documents, and notes. Architecture is bringing the idea of a “Virtual Model” into existence.
An excellent formal collection of a Model is an Overview or Assessment Diagram. Coupled with an Asset Inventory, an Overview may represent a potential working model. Assessments are excellent for reviewing an existing infrastructure to showcase the existing functional model.
Layers of Foundation
Working infrastructure needs to start with physical assets and attributes. When architecting Information Technology (IT) Networks and Systems, physical attributes must be identified, and dependent relationships must be linked. We start with physical locations, environmental controls, wiring and circuits, equipment organization, and power delivery. Examples of physical layered diagrams are Rack Elevations, Power Delivery, Wireline Diagrams (Layer 1), etc.
Virtual Overlay Layers
Once physical, tangible attributes are organized, the virtual overlay configuration is identified, organized, and structured to meet organizational goals, policies, and procedures. These virtual layers begin to segment the network infrastructure into computer network protocol broadcast domains, network segmentation, Virtual Private Networks (VPN), and tunneling. Examples of virtual diagrams are Link Layer Diagrams (Layer 2), Virtual Local Area Networks (VLAN), trunks and port aggregation, Network Diagrams (Layer 3), Tunneling, VPN overlays, etc.
Application access is consumed by employees, customers, partners, and vendors and follows the virtual overlay configuration of the network. Applications add another layer of operation over the network, and with Zero Trust security models, it must be identified and security filtering applied to limit access to systems hosting the applications. Examples of Application Layers include Load Balancing Diagrams, Application Flow Diagrams, and other application-related designs.
Dependence of Systems
Applications have an absolute dependency on the physical infrastructure to function properly. When we capture all system layers, we can utilize these diagrams to refer to systems involved in troubleshooting, upgrades, migrations, and other activities. We all collaborate and reference the existing diagrams, often called “As Built.” It provides a baseline where we may continue to change the infrastructure and keep everyone on the same page.
Improved Security Model
When all layers of the Network and Infrastructure are identified, documented, and illustrated, a security component can be referenced to each device in each layer. Being able to capture a high level of detail in our Layered Diagrams assures better security oversight, improved policies, and accountability of each system in each layer, preventing potential breaches due to human oversight.
We have designed many architectural networks, data centers, application flows, and migration strategies to help organizations organize, illustrate and communicate to everyone the agreed-upon approach, goals, and requirements.
We are a Radiant, Connected Team
We are passionate about maintaining a close relationship with our ecosystem of engineers, partners, vendors, and customers. No organization is too small for us to neglect. Each customer depends on our skilled delivery of documentation and its accuracy, so we always work toward perfection.
What We Do
We help organizations build and maintain structured, detailed, and thorough IT Network and Infrastructure diagrams. Our passion lies in applying our skills to information you can use.
We assess a network and IT infrastructure from the bottom up! We audit, review, document, and present our findings…
We design or discover your network and document detailed engineering diagrams to showcase configuration…
We design or discover your application layout, map it to a detailed diagram, and showcase traffic flows…
Following years of multiple engineers working on the infrastructure, a structured assessment has highlighted numerous potential faults and deficiencies in the network’s availability. The Network assessment provided by Unilogic Systems illustrated and offered remediation options that best meet the company and left a fantastic set of documentation for reference.
To meet compliance requirements, we undertook the task of segmenting our network and implementing firewall protection for all applications. This involved creating comprehensive application diagrams that documented the specific traffic requirements for each application. By doing so, we were able to streamline firewall rules and policies, ensuring a simplified and more efficient security framework.