SlideShare ist ein Scribd-Unternehmen logo
1 von 14
INSPACE TECHNOLOGIES
IT audit(informationtechnologyaudit)
An IT audit is the examination and evaluation of an organization's information
technology infrastructure, policies and operations.
Information technology audits determine whether IT controls protect corporate
assets, ensure data integrity and are aligned with the business's overall goals.
IT auditors examine not only physical security controls, but also overall
business and financial controls that involve information technology systems.
Because operations at modern companies are increasingly computerized, IT
audits are used to
ensure information-
related controls and
processes are working
properly. The primary
objectives of an IT
audit include.
Evaluate
the systems and
processes in place that
secure company data.
Determine risks to a company's information assets, and help identify methods to
minimize those risks.
Ensure information management processes are in compliance with IT-specific
laws, policies and standards.
Determine inefficiencies in IT systems and associated management.
IT Infrastructure
IT infrastructure refers to the composite hardware, software, network resources
and services required for the existence, operation and management of an
enterprise IT environment. It allows an organization to deliver IT solutions and
services to its employees, partners and/or customers and is usually internal to an
organization and deployed within owned facilities.
Techopedia explains IT Infrastructure
IT infrastructure consists of all components that somehow play a role in overall
IT and IT-enabled operations. It can be used for internal business operations or
developing customer IT or business solutions.
Typically, a standard IT
infrastructure consists of the
following components:
Hardware: Servers, computers,
data centers, switches, hubs and
routers, and other equipment
Software: Enterprise resource
planning (ERP), customer
relationship management (CRM),
productivity applications and
more
Network: Network enablement,
internet connectivity, firewall and security
Meat ware: Human users, suchas network administrators (NA), developers,
designers and end users with access to any IT appliance or service are also part
of an IT infrastructure, specifically with the advent of user-centric IT service
development.
Network Auditing
Network auditing is a must for any organization. Networks are dynamic
entities; they grow, shrink, change and divide themselves continuously.
Network administrators cannot even assume this process is entirely under their
control. Users add devices and sometimes even new hardware to the network
infrastructure. Even worse, it is not the first time a user would install software
they need without informing the administrator. These activities can have drastic
repercussions on network security. To solve this, an administrator needs to
perform regular network auditing and monitor any changes to the preset
baseline.
Network auditing is a process
in which your network is
mapped both in terms of
software and hardware. The
process canbe daunting if
done manually, but luckily
some tools can help automate
a large part of the process.
The administrator needs to
know what machines and
devices are connected to the
network. He should also know what operating systems are running and to what
service pack/patchlevel. Another point on the checklist should be what user
accounts and groups are on each machine as well as what shares are available
and to whom. A good network audit will also include what hardware makes up
each machine, what policies affect that machine and whether it is a physical or a
virtual machine. The more detailed
the specification the better.
Once the machines running on our
network are mapped, the
administrator should then move to
audit what software is running on
each of the machines. This can be
done manually, through an
application, or simply asking each
machine owner to run a script that
would automatically catalogue applications and send the administrator an email
with a report of the software installed. After the software inventory is done, the
process canthen catalogue the services which are installed, which are running
and which are stopped. Theaudit for the machines can be finalized by noting
which ports each machine listens on
and what software is actually running
at the time of the audit.
Once the administrator concludes
auditing the computers on the network,
s/he can move on to cataloguing the
devices. These can include printers,
fax machines, routers, access points,
network storage and any other device
that has connectivity with the network.
Once this is done, the network audit
would be complete, but the data will
now need to be analyzed. Is any machine running unauthorized software or
hardware? Is any machine lacking necessary patches? After these and other
relevant questions to each specific network are addressed and machines that
weren’t up to standard are brought in line, the administrator now has an
effective security/inventory baseline for all machines on the network.
ERP Software Consulting Implementation Project Management
Inspace ERP & software orIT consulting and IPM service is a full-fledged
hand holding program which encompassesthe following:
Identifying the Product/vendor based on business need/budget
Creating a roadmap for implementation
Create a Project Management Office Team (PMO) to implement as per roadmap
Facilitate and train the users on the adoption of new technology through Change
Management process
What is ERP Consulting ?
Inspace selects a few ERP products and
solutions that are available in the market,
suitable for the clients business needs and
evaluate them to be used by the client,
based on the technological environment.
Process
The IT infrastructure is studied and the
business process oftheclient is understood
before implementation. Requirements are
analysed and documented. The project scopeis defined. Then different products
and solutions are analysed meticulously and the process for the chosen products
goes through several steps before implementation. The basic functionality of the
product and the technology on which the product is based are considered.
The vendor who supplies the product/solution is minutely scanned and checked
for efficiency and reliability of productdelivery. The prices of different products
and solutions are also examined in great detail and the best deal is obtained for
the clients for implementation.
Technology Audit
What is Technology Audit?
Technology Audit which is an auditing service
done to understand the present technology
utilization level of an organization. This is very
similar to an Accounting Audit that is conducted
in almost every company. It provides a
benchmark for, where the business is now, in
terms of technology. The audit can help identify
strengths and weaknesses. It's really a snapshot
of the organization's technology infrastructure. The evaluation of the collected
evidence determines if the information technology is operating effectively and
efficiently to achieve the organization's business goals or objectives.
Why we need to do Technology Audit?
The Technology Audit for organizations from any domain is a MUST to ensure
optimum performance in the day to day operations and decision making. It helps
the organization to understand and
utilize technology MORE
EFFECTIVELY. The success of
this Audit is that it does not
recommend investing more; rather
it helps to get more out of existing
technology investments.
Our Technology Audit includes
various components and addresses
the critical and major pain points of
different IT areas as detailed
below:
Power Infrastructure Audit
 Sudden power failure of UPS
 Over-utilisation and under-
utilisation of UPS capacity
 UPS power cabling issues
 Battery backup for the load
applied
 Climate controlmeasures taken
up for the UPS and Battery
placement
 Fire Hazards that posea potential threat to the environment.
Audit Recommendations
 Safe and Climate
controlled placement of
UPS & Batteries
 Overloading or Under
loading of UPS
 Possible resolution of
UPS issues
Network Infrastructure Audit
 Network speed drops
 Sudden connectivity failure with
devices
 Wireless signal strength issues
 Network architecture and design
 Cable routing and type of cables
being utilised
 Active and passive network
components
Audit Recommendations:
 Network architecture &design as per bestpractices
 Cabling standards and routing
 Network equipment safe placement & environment
 Active & Passive (wired & wireless) components maintenance
 High-availability setup for minimal downtime
 Possible resolution of network performance issues
Internet/Intranet Connectivity Audit
 Internet connectivity speed drops
 Failover and load-balancing setup
 Bandwidth utilisation
 Unauthorised usage of internet services
 Content filtering to avoid certain categories of websites
 Firewall setup (policies for
allowing/disallowing the users access to
websites)
 Email services (unauthorised sending of
emails, blocking of attachments,
controlling size or type of attachments).
Audit Recommendations:
 Internet bandwidth usage & requirements
 Restriction of Unauthorised bandwidth
usage
 Load balancing& failover configuration
 Email filtering for data monitoring
 Firewall policies for optimal security
Server, Storage & Backup Infrastructure Audit
 Increased downtime of servers,
 Recovery from crash (both physical and
virtual),
 Storage space management,
 Operating system compatibility issues,
 Automated backup and restoration of the
backed-up data
 Performance of server, storage and backup
equipment for optimum operations
Audit Recommendations:
 Optimal configuration for servers based on the user load
 Storage technology and space based on usage and forecast
 Best practices Backup and Restoration process
 Maintenance of Server equipment for minimal downtime
 Possible resolution of server, storage and backup issues
Desktop, Laptop & Thin Clients Audit
 Recovery from crashes and minimising the downtime
 Repair / replacement and upgrade spares availability
 Standard hardware configuration across the organisation
 End-to-end audit or sampling audit
can be scoped as required.
Audit Recommendations:
 Optimal configuration for
desktops/laptops based on the usage
parameters
 Maintenance of desktop/laptop
including spares as per bestpractices
 Asset tagging & maintenance
 Possible resolution of desktop/laptop issues.
Core Application (ERP / SW) Audit
 Using MS Excel to take reports after
investing in ERP,
 Utilisation levels of the Application by
users (module-wise)
 Scope for improvement areas
 Functional audit on the mapping the
business requirement with the
functionality
 Technical audit on the coding (coding
standards and best practices).
Audit Recommendations:
 Fitment of the existing application vis-à-vis the business process
 Utilisation levels of existing application department/module-wise
 Module-wise recommendations for optimal usage
 Technical architecture & design as per best practices
 Coding methodology as per best practices
SW License Compliance Audit
 Unauthorised usage of software by staff
 Legal compliance issue due to pirated
applications
 Find actual gaps in the license
 Identify open source alternatives to reduce
investments
Audit Recommendations:
 Identification of unlicensed software and gap
in available licenses
 Recommendation on open source / freeware alternatives
IT Data Security Audit
 Vulnerable network
 USB / Email data leakage
 Physical security (entry/exit
registering, CCTV surveillance)
 End-to-end Logical security
(including VA-PT audits)
 Data and equipment theft
Audit Recommendations:
 Recommendation for mitigating VA-PT Gaps
 Harden Server environment for robust security
 Firewall policy and monitoring
 Recommendations for physical security as per best practices
Key User Audit
 Collective view of the key users driving the
organisation
 Understand training requirements
 Identify the key expectations of majority
stake holders.
Audit Recommendations:
 Key User’s knowledge level for utilising
technology investment of company
 Recommendation for areas of training required by key users.
Vulnerability Assessment & Penetration Testing
Vulnerability Assessment services are a series of tests performed on a system to
identify the vulnerability of the system. This is a Security Assessmentconducted
to understand the vulnerabilities and by this process the vulnerabilities are
identified and exposed to the security experts who in turn are able to quantify and
prioritise such vulnerabilities.
Basically a vulnerability of a system refers to the inability of the system to
withstand a hostile threat to its environment and the effects that may be caused
by this hostile attack.
Vulnerability assessment has many things in
common with risk assessment. Wikistatesthat
assessmentsare typicallyperformedaccording
to the following steps:
 Cataloguing assets and capabilities (resources)
in a system
 Assigning quantifiable value (or at least rank
order) and importance to those resources
 Identifying the vulnerabilities or potential threats
to each resource
 Mitigating or eliminating the most serious
vulnerabilities for the most valuable resources
Penetration Test (PT)
Penetration Tests are different from
vulnerability assessment services, in that
they simulate an actual attack on a
computer system or network as it would
have been from an external or internal
threat. By this method we are able to
evaluate the computer or network's security
levels based on the defined objective of the
test. Thus a vulnerability penetration test
can help determine whether a system is
vulnerable to attack, if the defences were
sufficient and which defences (if any) were defeated in the penetration
test.
Why VA-PT is required?
As new technologies emerge and change the IT scenarios, newer audit security
challenges are given to be faced by corporates. Thus the business that do
transaction over the internet are at high risk, though other companies are also at
risk when being exposed to external networks. Thus many unforeseen traps with
multiple vulnerabilities and numerous threats do manifest themselves in the
least expected time and at the least
expected place. Thus in order to
take-up such challenges and
address then, a robustsystem with
appropriate security policies,
adequate controls, periodic review
and monitoring are to be in place
to protect the organisation's
information assets. Hence it is
highly recommended to carry out
an indepth Network Assessment
comprising of VA-PT audits in a
periodic manner to ensure software
compliance to controls established
and the policies set in the
organisation and further to evaluate whether they are adequate to address all the
threats.
What Do We Gain by VA-PT?
 In-depth testing of IT infrastructure leads
to understanding of the effectiveness of
security systems in place
 Testing the ability of network defenders to
successfully detect and respond to the
attacks
 Enables planned investment to secure the
IT setup resulting in better ROI
 Helps to identify the security gaps and
secure them
 Focus and prioritise high-risk and threats
rather than false encounters
 Optional Software Assessment to understand the vulnerabilities within
 Process and policy in place helps to run regular and periodic tests
 Assessing the magnitude of potential business and operational impacts of
successfulattacks

Weitere ähnliche Inhalte

Was ist angesagt?

How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
Cheng Olayvar
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based Maintenance
Frederic Baudart, CMRP
 

Was ist angesagt? (20)

The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based Maintenance
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 

Ähnlich wie Inspace technologies

Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
Arish Roy
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 

Ähnlich wie Inspace technologies (20)

Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Remote Access Device Monitoring.docx
Remote Access Device Monitoring.docxRemote Access Device Monitoring.docx
Remote Access Device Monitoring.docx
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
How to build management information system
How to build management information systemHow to build management information system
How to build management information system
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
 
The Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdfThe Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdf
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
NuvoSys Solutions, LLC
NuvoSys Solutions, LLCNuvoSys Solutions, LLC
NuvoSys Solutions, LLC
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
 

Kürzlich hochgeladen

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 

Kürzlich hochgeladen (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Inspace technologies

  • 1. INSPACE TECHNOLOGIES IT audit(informationtechnologyaudit) An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations. Information technology audits determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business's overall goals. IT auditors examine not only physical security controls, but also overall business and financial controls that involve information technology systems. Because operations at modern companies are increasingly computerized, IT audits are used to ensure information- related controls and processes are working properly. The primary objectives of an IT audit include. Evaluate the systems and processes in place that secure company data. Determine risks to a company's information assets, and help identify methods to minimize those risks. Ensure information management processes are in compliance with IT-specific laws, policies and standards. Determine inefficiencies in IT systems and associated management.
  • 2. IT Infrastructure IT infrastructure refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment. It allows an organization to deliver IT solutions and services to its employees, partners and/or customers and is usually internal to an organization and deployed within owned facilities. Techopedia explains IT Infrastructure IT infrastructure consists of all components that somehow play a role in overall IT and IT-enabled operations. It can be used for internal business operations or developing customer IT or business solutions. Typically, a standard IT infrastructure consists of the following components: Hardware: Servers, computers, data centers, switches, hubs and routers, and other equipment Software: Enterprise resource planning (ERP), customer relationship management (CRM), productivity applications and more Network: Network enablement, internet connectivity, firewall and security Meat ware: Human users, suchas network administrators (NA), developers, designers and end users with access to any IT appliance or service are also part of an IT infrastructure, specifically with the advent of user-centric IT service development.
  • 3. Network Auditing Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware to the network infrastructure. Even worse, it is not the first time a user would install software they need without informing the administrator. These activities can have drastic repercussions on network security. To solve this, an administrator needs to perform regular network auditing and monitor any changes to the preset baseline. Network auditing is a process in which your network is mapped both in terms of software and hardware. The process canbe daunting if done manually, but luckily some tools can help automate a large part of the process. The administrator needs to know what machines and devices are connected to the network. He should also know what operating systems are running and to what service pack/patchlevel. Another point on the checklist should be what user accounts and groups are on each machine as well as what shares are available and to whom. A good network audit will also include what hardware makes up each machine, what policies affect that machine and whether it is a physical or a virtual machine. The more detailed the specification the better. Once the machines running on our network are mapped, the administrator should then move to audit what software is running on each of the machines. This can be done manually, through an application, or simply asking each machine owner to run a script that
  • 4. would automatically catalogue applications and send the administrator an email with a report of the software installed. After the software inventory is done, the process canthen catalogue the services which are installed, which are running and which are stopped. Theaudit for the machines can be finalized by noting which ports each machine listens on and what software is actually running at the time of the audit. Once the administrator concludes auditing the computers on the network, s/he can move on to cataloguing the devices. These can include printers, fax machines, routers, access points, network storage and any other device that has connectivity with the network. Once this is done, the network audit would be complete, but the data will now need to be analyzed. Is any machine running unauthorized software or hardware? Is any machine lacking necessary patches? After these and other relevant questions to each specific network are addressed and machines that weren’t up to standard are brought in line, the administrator now has an effective security/inventory baseline for all machines on the network. ERP Software Consulting Implementation Project Management Inspace ERP & software orIT consulting and IPM service is a full-fledged hand holding program which encompassesthe following: Identifying the Product/vendor based on business need/budget Creating a roadmap for implementation Create a Project Management Office Team (PMO) to implement as per roadmap Facilitate and train the users on the adoption of new technology through Change Management process
  • 5. What is ERP Consulting ? Inspace selects a few ERP products and solutions that are available in the market, suitable for the clients business needs and evaluate them to be used by the client, based on the technological environment. Process The IT infrastructure is studied and the business process oftheclient is understood before implementation. Requirements are analysed and documented. The project scopeis defined. Then different products and solutions are analysed meticulously and the process for the chosen products goes through several steps before implementation. The basic functionality of the product and the technology on which the product is based are considered. The vendor who supplies the product/solution is minutely scanned and checked for efficiency and reliability of productdelivery. The prices of different products and solutions are also examined in great detail and the best deal is obtained for the clients for implementation. Technology Audit What is Technology Audit? Technology Audit which is an auditing service done to understand the present technology utilization level of an organization. This is very similar to an Accounting Audit that is conducted in almost every company. It provides a benchmark for, where the business is now, in terms of technology. The audit can help identify strengths and weaknesses. It's really a snapshot of the organization's technology infrastructure. The evaluation of the collected evidence determines if the information technology is operating effectively and efficiently to achieve the organization's business goals or objectives.
  • 6. Why we need to do Technology Audit? The Technology Audit for organizations from any domain is a MUST to ensure optimum performance in the day to day operations and decision making. It helps the organization to understand and utilize technology MORE EFFECTIVELY. The success of this Audit is that it does not recommend investing more; rather it helps to get more out of existing technology investments. Our Technology Audit includes various components and addresses the critical and major pain points of different IT areas as detailed below: Power Infrastructure Audit  Sudden power failure of UPS  Over-utilisation and under- utilisation of UPS capacity  UPS power cabling issues  Battery backup for the load applied  Climate controlmeasures taken up for the UPS and Battery placement  Fire Hazards that posea potential threat to the environment.
  • 7. Audit Recommendations  Safe and Climate controlled placement of UPS & Batteries  Overloading or Under loading of UPS  Possible resolution of UPS issues Network Infrastructure Audit  Network speed drops  Sudden connectivity failure with devices  Wireless signal strength issues  Network architecture and design  Cable routing and type of cables being utilised  Active and passive network components Audit Recommendations:  Network architecture &design as per bestpractices  Cabling standards and routing  Network equipment safe placement & environment  Active & Passive (wired & wireless) components maintenance  High-availability setup for minimal downtime  Possible resolution of network performance issues
  • 8. Internet/Intranet Connectivity Audit  Internet connectivity speed drops  Failover and load-balancing setup  Bandwidth utilisation  Unauthorised usage of internet services  Content filtering to avoid certain categories of websites  Firewall setup (policies for allowing/disallowing the users access to websites)  Email services (unauthorised sending of emails, blocking of attachments, controlling size or type of attachments). Audit Recommendations:  Internet bandwidth usage & requirements  Restriction of Unauthorised bandwidth usage  Load balancing& failover configuration  Email filtering for data monitoring  Firewall policies for optimal security Server, Storage & Backup Infrastructure Audit  Increased downtime of servers,  Recovery from crash (both physical and virtual),  Storage space management,  Operating system compatibility issues,  Automated backup and restoration of the backed-up data  Performance of server, storage and backup equipment for optimum operations Audit Recommendations:  Optimal configuration for servers based on the user load  Storage technology and space based on usage and forecast
  • 9.  Best practices Backup and Restoration process  Maintenance of Server equipment for minimal downtime  Possible resolution of server, storage and backup issues Desktop, Laptop & Thin Clients Audit  Recovery from crashes and minimising the downtime  Repair / replacement and upgrade spares availability  Standard hardware configuration across the organisation  End-to-end audit or sampling audit can be scoped as required. Audit Recommendations:  Optimal configuration for desktops/laptops based on the usage parameters  Maintenance of desktop/laptop including spares as per bestpractices  Asset tagging & maintenance  Possible resolution of desktop/laptop issues. Core Application (ERP / SW) Audit  Using MS Excel to take reports after investing in ERP,  Utilisation levels of the Application by users (module-wise)  Scope for improvement areas  Functional audit on the mapping the business requirement with the functionality  Technical audit on the coding (coding standards and best practices). Audit Recommendations:
  • 10.  Fitment of the existing application vis-à-vis the business process  Utilisation levels of existing application department/module-wise  Module-wise recommendations for optimal usage  Technical architecture & design as per best practices  Coding methodology as per best practices SW License Compliance Audit  Unauthorised usage of software by staff  Legal compliance issue due to pirated applications  Find actual gaps in the license  Identify open source alternatives to reduce investments Audit Recommendations:  Identification of unlicensed software and gap in available licenses  Recommendation on open source / freeware alternatives IT Data Security Audit  Vulnerable network  USB / Email data leakage  Physical security (entry/exit registering, CCTV surveillance)  End-to-end Logical security (including VA-PT audits)  Data and equipment theft
  • 11. Audit Recommendations:  Recommendation for mitigating VA-PT Gaps  Harden Server environment for robust security  Firewall policy and monitoring  Recommendations for physical security as per best practices Key User Audit  Collective view of the key users driving the organisation  Understand training requirements  Identify the key expectations of majority stake holders. Audit Recommendations:  Key User’s knowledge level for utilising technology investment of company  Recommendation for areas of training required by key users. Vulnerability Assessment & Penetration Testing Vulnerability Assessment services are a series of tests performed on a system to identify the vulnerability of the system. This is a Security Assessmentconducted to understand the vulnerabilities and by this process the vulnerabilities are identified and exposed to the security experts who in turn are able to quantify and prioritise such vulnerabilities. Basically a vulnerability of a system refers to the inability of the system to
  • 12. withstand a hostile threat to its environment and the effects that may be caused by this hostile attack. Vulnerability assessment has many things in common with risk assessment. Wikistatesthat assessmentsare typicallyperformedaccording to the following steps:  Cataloguing assets and capabilities (resources) in a system  Assigning quantifiable value (or at least rank order) and importance to those resources  Identifying the vulnerabilities or potential threats to each resource  Mitigating or eliminating the most serious vulnerabilities for the most valuable resources Penetration Test (PT) Penetration Tests are different from vulnerability assessment services, in that they simulate an actual attack on a computer system or network as it would have been from an external or internal threat. By this method we are able to evaluate the computer or network's security levels based on the defined objective of the test. Thus a vulnerability penetration test can help determine whether a system is vulnerable to attack, if the defences were sufficient and which defences (if any) were defeated in the penetration test.
  • 13. Why VA-PT is required? As new technologies emerge and change the IT scenarios, newer audit security challenges are given to be faced by corporates. Thus the business that do transaction over the internet are at high risk, though other companies are also at risk when being exposed to external networks. Thus many unforeseen traps with multiple vulnerabilities and numerous threats do manifest themselves in the least expected time and at the least expected place. Thus in order to take-up such challenges and address then, a robustsystem with appropriate security policies, adequate controls, periodic review and monitoring are to be in place to protect the organisation's information assets. Hence it is highly recommended to carry out an indepth Network Assessment comprising of VA-PT audits in a periodic manner to ensure software compliance to controls established and the policies set in the organisation and further to evaluate whether they are adequate to address all the threats. What Do We Gain by VA-PT?  In-depth testing of IT infrastructure leads to understanding of the effectiveness of security systems in place  Testing the ability of network defenders to successfully detect and respond to the attacks  Enables planned investment to secure the IT setup resulting in better ROI  Helps to identify the security gaps and secure them  Focus and prioritise high-risk and threats rather than false encounters
  • 14.  Optional Software Assessment to understand the vulnerabilities within  Process and policy in place helps to run regular and periodic tests  Assessing the magnitude of potential business and operational impacts of successfulattacks