Is your network optimized? Is user productivity maximized? Your IT resources are critical to the efficiency of your business and ultimately impact your bottom line. NetFidelis expert network engineers will evaluate your network security, data protection, and data availability to give you a recommendation for maintaining a reliable, cost-effective network to support your users, customers, and vendors.
Benefits of a Network Assessment
- Optimize networks and apps
- Optimize user productivity
- Expert assessment and recommendations
- Streamline IT Workflow
- Increased speed, security, and reliability
- Ensure your network is secure from current threats
Network Assessment Checklist :
- Workflow analysis: What applications/processes/systems are in use? (ERP/WMS/Back Office, Databases, etc.)
- Network Inventory: What hardware/software/licenses are in use?
- Network Utilization: How much is being used? What is the total network capacity and where are inefficiencies?
- Network Redundancy- Hardware: Do mission-critical resources have redundancy (RAID disks, dual power supplies, Uninterruptible Power Supplies (UPS), etc.)? Where are single points of failure?
- Backups: What backups do you have to recover data AND Applications and what is the RTO (Recovery Time Objective)?
- Disaster Recovery: What Disaster Recovery (DR) procedures/policies do you have in place?
- Restore: A test of backups systems will be completed (ie. Test restore, etc.)
- Network: Firewalls and policies (perimeter/server/pc, content filtering, etc.).
- Device: PC’s/Servers/Other. Malware policies (virus/spyware, inbound/outbound email filtering, etc).
- User: Directory Services (Active Directory) and Group Policy Objects.
- Data: Folder/File permissions (MBSA Audit).
- Access: User/Device access. Both physical and network including wireless and web services. What methods and policies do you have in place for internal/external access to business-critical resources? We will conduct an intrusive port scan to determine vulnerabilities.
- Analysis of findings including detailed diagrams of problems and solutions.
- High Priority: Items needing to be addressed due to immediate vulnerabilities.
- Medium Priority: Recommendations of things that would provide immediate benefit in either performance or functionality.
- Low Priority: Strategic changes to allow long-term improvements to overall network health.