Introduction to the IT Environment Assessment

Because every business is different, an IT Environment Assessment is a pivotal step in understanding the needs of your unique IT infrastructure. When FlexManage works with our clients to conduct this type of assessment, we need to grasp a thorough understanding of their IT infrastructure’s strengths and weaknesses in order to help develop the most comprehensive Business Continuity and Disaster Recovery Plan possible.

What is an IT Environment Assessment?

The IT Environment Assessment is the foundation of the Business Impact Analysis, which we discussed in this previous blog post. The review starts with a deep dive into existing documentation ranging from security and data governance policies to daily, weekly, monthly and annual procedures aimed at managing and maintaining a computing environment.

Additionally, all mission critical business applications and supporting architectures are reviewed. We also audit all licensing for applications, servers, and desktop PCs along with a thorough review of remote access requirements and capabilities.

The physical environment review starts with the actual data centers including primary and secondary power systems, cooling and layout footprints, the servers, storage devices, ISP services, firewalls, switches, routers and cabling.

A complete network analysis is performed to check for existing issues, built-in redundancy and capabilities as well as WAN traffic analysis, detailed storage analysis and storage change rates for mission-critical applications.

The review wraps up with an audit of current data protection strategies covering replication and recovery capabilities and an analysis of the environment retirement schedule to determine new equipment needs relative to production and disaster recovery systems.

All the data and information collected as a part of environment review is then evaluated, analyzed and correlated to determine risks and gaps.

The benefits of an IT Environment Assessment

  1. An IT Environment Assessment will uncover vulnerabilities you may not have been aware of (or even considered). In the age of rapid technological developments and heighted laws around data protection and security, there is no better time to review and fortify the processes you have in place to protect your business.
  2. This assessment helps FlexManage give our clients an accurate and direct estimation of the full cost of services. We are able to audit your equipment (servers, routers, desktop computers, laptops, etc.) and determine which equipment may be further utilized and what additional equipment is necessary to purchase.
  3. An IT Environment Assessment specific to your business will help us write a targeted and highly strategized proposal for next steps in securing and optimizing your IT environment.

Next steps towards an IT Environment Assessment

We are happy to answer any questions you have around how to set up an IT Environment Assessment, so please feel free to contact us. We will freely offer you our advice up front on what steps you need to take to ensure your most valuable data is protected and that you are fully prepared for any possible business emergency.

To learn more about other key elements of data security and disaster recovery planning, check out some of our related blog posts:

Understanding RTP and RPO in your Disaster Recovery Plan

The difference between a Business Impact Analysis and a Disaster Recovery Plan (and why you need both)

 

 

By | 2018-03-23T19:31:17+00:00 March 23rd, 2018|Backup & Disaster Recovery, Security|0 Comments

About the Author:

Lee Hovermale is the CEO of FlexManage and was formerly Executive Vice President of South Central Area until September 30, 2015. Lee served as Regional Director and Managing Director at FlexManage before becoming CEO. In 1995, Lee co-founded Enhanced Systems and Solutions (ESS), a leading integration firm serving the legal industry. He was a member of the ESS Board of Directors. Prior to co-founding ESS, Lee specialized in law firm integration while employed with LAN Systems in Washington, D.C. Lee's expertise in the areas of security, professional project management, computer technology, product knowledge and Disaster Recovery and Business Continuance consulting has earned him the reputation as a leader in the Information Technology industry.