SlideShare a Scribd company logo
1 of 8
Download to read offline
A GUIDE TO EVALUATING
YOUR IT NETWORK
W W W . J E N L O R . C O M
Evaluating an IT network can be a daunting task that many companies would simply prefer to
ignore due to its complexity, and possibly because they dread what such an assessment might
turn up. In today’s competitive business world however, this is an area that just has to be done, in
order to determine if the business is being adequately supported in its objectives by the computing
power of all the physical and virtual components comprising its local and wide-area networks.
When the time comes for such an evaluation, it should be formalized and more in-depth than
simply relying on feedback from the user community about response time, and it should not be
assumed that security is adequate because no one has reported virus attacks. There are criteria
for evaluation that should be used for evaluating the health and effectiveness of any network
which can provide a much clearer and much more accurate idea of how well it is configured to
meet the needs of the company.
It is well known that data is the lifeblood of any business, and without it daily
operations would come to a screeching halt. Imagine an online store losing its
database of products and inventory for sale, or losing its customer database to a
sudden massive crash of the system. A plan for data backup and recovery must be
formalized in terms of its time-of-recovery because time is money in business, and
also in terms of its recovery point, i.e. how far back in time was the last backup?
The concept of backup and recovery should be tied in with Disaster Recovery too,
and the plan for disaster recovery should be tested periodically to ensure its true
viability.
DATA BACKUP AND RECOVERY.
IT Network Evaluation Criteria
W W W . J E N L O R . C O M
It is essential to have the most current anti-virus and anti-malware security in place
on the network, because not a day goes by without new malware being created.
This means that the network must be adequately insulated against attacks by its
firewall configuration and by internal anti-virus software. Evaluating effectiveness
entails gauging your security software’s ability to update, scan, and quarantine
suspect files immediately. A secondary aspect of security evaluation is ensuring
that all hardware and software patching is up to date with the latest versions.
SECURITY IMPLEMENTATIONS.
W W W . J E N L O R . C O M
Does the network setup take advantage of cloud storage where it makes sense?
There are some huge benefits to cloud storage, chief among them the fact that
enormous amounts of data can be resident on physical servers located off the
premises and on a network connected to your own. By now, most businesses have
overcome their security fears of having data stored off-site, and cloud storage has
proven itself to be a sensible, economic advantage. The cost of purchasing and
maintaining a server farm on-site should be measured against the cost of reliable
cloud storage from a reputable vendor.
CLOUD STORAGE SOLUTIONS.
W W W . J E N L O R . C O M
Is the network capable of providing high-performance access to all clients as well
as having sufficient bandwidth to satisfy access between all user locations online?
The importance of connectivity and performance across all internal and external
users has exploded because of the much greater passing of huge files that take
up bandwidth, e.g. video files, that can quickly suck up bandwidth and bog down
communications.
CONNECTIVITY.
W W W . J E N L O R . C O M
W W W . J E N L O R . C O M
The physical health of all the components comprising your network is just as critical
as the health of the software and performance issues. All servers, routers, LAN
switches, PC’s, operating systems, rules & processes, wiring cabinets, and all the
other pieces that comprise the hardware and software of the network must be up-
to-date in terms of warranty life and functionality.
INFRASTRUCTURE HEALTH.
W W W . J E N L O R . C O M
W W W . J E N L O R . C O M
This is a kind of catch-all area that may be considered a composite evaluation of
all the other areas rolled into one. Does your network in any way hinder business
objectives or prevent them from being realized? Or is the network an enabler of
business objectives, supporting and even enhancing them because of its superior
health and performance?
ACHIEVABLE RESULTS.
W W W . J E N L O R . C O M
The Ultimate Evaluation
In a progressive, modern company, the I.T. Department and the network it maintains
should be a driver of the business, leading the way to greater achievements and results.
It should not be struggling to keep up with the pace of business, barely able to support its
current goals, much less its goals for the future. By ignoring the health of the I.T. network,
a company might quickly find itself in the latter category, unable to compete with rivals.
No matter how you look at it, evaluating your network is an exercise that simply must be
done for the good of the company.
jenlor.com
606 Washington Ave.
Bridgeville, PA 15017
412.220.9330

More Related Content

What's hot

Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Peter Reynolds
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebook
Tiffany Hamilton
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Matthew Dahl Resume
Matthew Dahl ResumeMatthew Dahl Resume
Matthew Dahl Resume
Matthew Dahl
 

What's hot (20)

行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Ambesh
AmbeshAmbesh
Ambesh
 
Noc help desk services
Noc help desk servicesNoc help desk services
Noc help desk services
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
Future of Software Analysis & Measurement_CAST
Future of Software Analysis & Measurement_CASTFuture of Software Analysis & Measurement_CAST
Future of Software Analysis & Measurement_CAST
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
ca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebookca_nimsoft_monitor_snap_ebook
ca_nimsoft_monitor_snap_ebook
 
5 Traits of a Proactive Guard Tour System
5 Traits of a Proactive Guard Tour System5 Traits of a Proactive Guard Tour System
5 Traits of a Proactive Guard Tour System
 
Accenture Customer Story_CAST
Accenture Customer Story_CASTAccenture Customer Story_CAST
Accenture Customer Story_CAST
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 
New IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & MeasurementNew IDC Research on Software Analysis & Measurement
New IDC Research on Software Analysis & Measurement
 
Matthew Dahl Resume
Matthew Dahl ResumeMatthew Dahl Resume
Matthew Dahl Resume
 
08 july 2016
08 july 201608 july 2016
08 july 2016
 
Top 10 steps towards eliminating inside threats by paresh thakkar
Top 10 steps towards eliminating inside threats by paresh thakkarTop 10 steps towards eliminating inside threats by paresh thakkar
Top 10 steps towards eliminating inside threats by paresh thakkar
 

Viewers also liked

Viewers also liked (9)

Muzeum II Wojny Światowej - recenzja Piotr Semka
Muzeum II Wojny Światowej - recenzja Piotr SemkaMuzeum II Wojny Światowej - recenzja Piotr Semka
Muzeum II Wojny Światowej - recenzja Piotr Semka
 
Koncepcja strefy buforowej przy TPK
Koncepcja strefy buforowej przy TPKKoncepcja strefy buforowej przy TPK
Koncepcja strefy buforowej przy TPK
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Delegacje Roberta Biedronia 2015/2016
Delegacje Roberta Biedronia 2015/2016Delegacje Roberta Biedronia 2015/2016
Delegacje Roberta Biedronia 2015/2016
 
Poradnik dla rodziców dot. narkotyków
Poradnik dla rodziców dot. narkotykówPoradnik dla rodziców dot. narkotyków
Poradnik dla rodziców dot. narkotyków
 
Matura z matematyki na poziomie podstawowym 2016 - nowa wersja
Matura z matematyki na poziomie podstawowym 2016 - nowa wersjaMatura z matematyki na poziomie podstawowym 2016 - nowa wersja
Matura z matematyki na poziomie podstawowym 2016 - nowa wersja
 
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...
 
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część II
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część IIArkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część II
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część II
 
Quick sort
Quick sortQuick sort
Quick sort
 

Similar to A Guide to Evaluating Your IT Network

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
VMware_EMEA
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
Steven Cahill
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
VMware_EMEA
 

Similar to A Guide to Evaluating Your IT Network (20)

My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running
 
Data Center Networking
Data Center NetworkingData Center Networking
Data Center Networking
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Unleashing Efficiency with Japan VPS by Onlive Infotech
Unleashing Efficiency with Japan VPS by Onlive InfotechUnleashing Efficiency with Japan VPS by Onlive Infotech
Unleashing Efficiency with Japan VPS by Onlive Infotech
 
Identifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your BusinessIdentifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your Business
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
Experience Premium Hosting with Japan VPS by Onlive Infotech.
Experience Premium Hosting with Japan VPS by Onlive Infotech.Experience Premium Hosting with Japan VPS by Onlive Infotech.
Experience Premium Hosting with Japan VPS by Onlive Infotech.
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
 

Recently uploaded

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 

Recently uploaded (20)

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

A Guide to Evaluating Your IT Network

  • 1. A GUIDE TO EVALUATING YOUR IT NETWORK W W W . J E N L O R . C O M Evaluating an IT network can be a daunting task that many companies would simply prefer to ignore due to its complexity, and possibly because they dread what such an assessment might turn up. In today’s competitive business world however, this is an area that just has to be done, in order to determine if the business is being adequately supported in its objectives by the computing power of all the physical and virtual components comprising its local and wide-area networks. When the time comes for such an evaluation, it should be formalized and more in-depth than simply relying on feedback from the user community about response time, and it should not be assumed that security is adequate because no one has reported virus attacks. There are criteria for evaluation that should be used for evaluating the health and effectiveness of any network which can provide a much clearer and much more accurate idea of how well it is configured to meet the needs of the company.
  • 2. It is well known that data is the lifeblood of any business, and without it daily operations would come to a screeching halt. Imagine an online store losing its database of products and inventory for sale, or losing its customer database to a sudden massive crash of the system. A plan for data backup and recovery must be formalized in terms of its time-of-recovery because time is money in business, and also in terms of its recovery point, i.e. how far back in time was the last backup? The concept of backup and recovery should be tied in with Disaster Recovery too, and the plan for disaster recovery should be tested periodically to ensure its true viability. DATA BACKUP AND RECOVERY. IT Network Evaluation Criteria W W W . J E N L O R . C O M
  • 3. It is essential to have the most current anti-virus and anti-malware security in place on the network, because not a day goes by without new malware being created. This means that the network must be adequately insulated against attacks by its firewall configuration and by internal anti-virus software. Evaluating effectiveness entails gauging your security software’s ability to update, scan, and quarantine suspect files immediately. A secondary aspect of security evaluation is ensuring that all hardware and software patching is up to date with the latest versions. SECURITY IMPLEMENTATIONS. W W W . J E N L O R . C O M
  • 4. Does the network setup take advantage of cloud storage where it makes sense? There are some huge benefits to cloud storage, chief among them the fact that enormous amounts of data can be resident on physical servers located off the premises and on a network connected to your own. By now, most businesses have overcome their security fears of having data stored off-site, and cloud storage has proven itself to be a sensible, economic advantage. The cost of purchasing and maintaining a server farm on-site should be measured against the cost of reliable cloud storage from a reputable vendor. CLOUD STORAGE SOLUTIONS. W W W . J E N L O R . C O M
  • 5. Is the network capable of providing high-performance access to all clients as well as having sufficient bandwidth to satisfy access between all user locations online? The importance of connectivity and performance across all internal and external users has exploded because of the much greater passing of huge files that take up bandwidth, e.g. video files, that can quickly suck up bandwidth and bog down communications. CONNECTIVITY. W W W . J E N L O R . C O M
  • 6. W W W . J E N L O R . C O M The physical health of all the components comprising your network is just as critical as the health of the software and performance issues. All servers, routers, LAN switches, PC’s, operating systems, rules & processes, wiring cabinets, and all the other pieces that comprise the hardware and software of the network must be up- to-date in terms of warranty life and functionality. INFRASTRUCTURE HEALTH. W W W . J E N L O R . C O M
  • 7. W W W . J E N L O R . C O M This is a kind of catch-all area that may be considered a composite evaluation of all the other areas rolled into one. Does your network in any way hinder business objectives or prevent them from being realized? Or is the network an enabler of business objectives, supporting and even enhancing them because of its superior health and performance? ACHIEVABLE RESULTS. W W W . J E N L O R . C O M
  • 8. The Ultimate Evaluation In a progressive, modern company, the I.T. Department and the network it maintains should be a driver of the business, leading the way to greater achievements and results. It should not be struggling to keep up with the pace of business, barely able to support its current goals, much less its goals for the future. By ignoring the health of the I.T. network, a company might quickly find itself in the latter category, unable to compete with rivals. No matter how you look at it, evaluating your network is an exercise that simply must be done for the good of the company. jenlor.com 606 Washington Ave. Bridgeville, PA 15017 412.220.9330