Whether you prefer to have thorough documentation of your network environment or audits are requiring you to do so, we can support your efforts with any of the following services:
- Complete LAN/WAN assessment
- Hardware inventory
- Software inventory
- Infrastructure inventory
- Telecom assessment
- External vulnerability scans
- Internal vulnerability scans
- End of life plans for hardware and software
- End of life plans for data
- Storage assessment
- Acceptable use policy review
- Power assessment
- IT Roadmap and budget recommendations
These services can be provided to a business owner or as third party validation to an IT support team. |