fbpx

Audits and Strategic Planning

Audits

Before anything else can happen, you must know the current situation. The knowledge you gain from this will be the biggest factor in the success or failure of any other efforts. You don’t need someone telling you what you want to hear; you need the truth. From that foundation you can build a solid strategy to become resilient and proactive.

Our experience has taught us that a comprehensive approach is imperative. Consequently, we analyze all the dimensions of a company, from processes that explain how the business operates to the infrastructure that supports it, as well as the security systems in place.

Infrastructure Analysis

We offer high-level analysis of your infrastructure based on a condensed mandate with very specific objectives. Here is an overview of our various health checks.

Why is this important?

To prepare your organization to defend itself: We evaluate your security practices to confirm your chance of surviving an attack. Businesses depend on their data to be profitable, making that data more valuable than gold to a hacker

How long does it take?

Varies according to the size of the business

What do we analyze?

  • Level of awareness and knowledge of security within the business
  • Reactivity protocols
  • Current state of classification with regards to your data and your service’s criticality
  • Processes used to protect your digital assets, your data, and your customers
  • IT system’s vulnerability, including access and identity management
  • Security infrastructure
  • Ability to react quickly and effectively in the event of an attack
  • Level and quality of security training being given to your staff

What do I get?

A comprehensive report that includes:

  • A clear summary of the current situation
  • An outline of all areas of concern
  • A detailed roadmap for you to follow that addresses every weakness

Why is this important?

To reduce risks: access to your systems, your data, as well as your operations depends on how well your company’s credentials vault is managed. Active Directory contains the keys to your kingdom and is a primary target for ransomware and hackers.  

 

How long does it take?

3-5 days


What do we analyze?

  • Directory structure
  • Structure of the core enterprise sites
  • Use of privileged accounts
  • Inactive accounts and password age
  • Each service, including DDNS, DHCP and Replication
  • Domain controller stability
  • Risk of attack and ability to recover
  • Security practices (Group policies)
  • High-level catalogue of AD objects

What do I get?

A comprehensive report that includes:

  • Architectural recommendations for AD
  • A health score for each service
  • A plan of action for making AD secure
  • A mitigation plan>
  • An analysis of the impact in the event of an outage or breach

Why is this important?

To reduce support costs a careful analysis at the start of any project can reduce support costs by a factor of 10 both during and after project delivery.

How long does it take?

5 days

 

What do we analyze?

  • Business requirements
  • Existing services and communication systems
  • Security of credentials management
  • Services to be migrated
  • Stability of existing infrastructure
  • Policies and audit definitions within MS 365
  • Steps needed to bring your entire user base up to speed on the new platform
  • Files and data to be migrated
  • File services and related risks

What do I get?

A comprehensive report that includes:

  • The key steps you need to take to secure your Microsoft 365​ installation
  • A clear roadmap for migration to the cloud
  • A list of risks that must be addressed prior to migration
  • A thorough cost analysis of a cloud migration

Why is this important?

To assess the readiness of your infrastructure: whether you’re migrating your server farm, monitoring your infrastructure, managing virtual workstations, or just creating site redundancy, we can assess the true cost of Azure to your business.

How long does it take?

5 days

What do we analyze?

  • Business requirements
  • Existing services, including communications systems
  • Security and credentials management
  • Servers requiring migration
  • Server stability

What do I get?

A comprehensive report that includes:

  • Our conclusions concerning the mitigation of risks associated with a cloud migration(based on our discussion with your stakeholders)
  • Full set of actions needed to bring your system administrators up to speed
  • The key steps you need to take to prepare for Azure
  • A clear roadmap for migration to the cloud
  • A list of risks that must be addressed prior to migration
  • A thorough cost analysis of your transformation

Strategic Planning

 

We support companies in critical planning stages, collaborating on strategic aspects such as:

  • Establishing objectives, costs, and risks
  • Developing business cases
  • Communicating with stakeholders

Over the years, we developed a holistic approach to strategic planning. We firmly believe that it is essential to consider businesses to be multi-dimensional; processes tell the story of how they operate, infrastructure tells us how and on what they run, and cybersecurity tells us how well protected they are.

Examining all these aspects simultaneously allows us to:

  • Identify precisely what issues need to be resolved
  • Provide strategic recommendations that lead to a concrete action plan and timeline
  • Evaluate expected costs versus benefits (return on investment)
  • Assess any risks.

A solid business case based on concrete data allows stakeholders to make an informed decision, increasing tenfold the chance of a successful implementation.