Services

Data Centre and Cybersecurity Assessments

Data Centre Assessment

A data centre risk assessment includes a review of your data centre ‘s reliability and points of failure, a review of past and projected growth, floor space, power, and cooling needs for optimal performance. Included is an analysis of your existing infrastructure to ensure maximum reliability and availability, prevention of outages that lead to downtime, effective day-to-day IT management and recommendations for risk and cost reduction. High Availability Infrastructure dictates that the many different data centre components and data centre technologies are working in sync, driving efficient operations. Keeping every component healthy, efficient, and secure is imperative to achieving good performance at optimal costs. The assessment is input to the co-development of a data centre strategy and roadmap with cost/benefit analysis for implementation of the recommendations with strict budgetary controls.
Data Center
We will evaluate the constraints in your facility’s power, cooling and computer room or space, as these factors can have a significant impact on the function and integrity of your infrastructure. Our infrastructure review will assess your IT environment to determine whether your data centre is following the best industry standards. We will review capacity and reliability of your key facility infrastructure systems, including Utility; Generators; Power backbone; UPS & batteries; Critical power distribution; and Cooling. Our operations review will ensure that your critical operations, such as maintenance and staffing, are in-line with your organizational goals. We will evaluate your company’s data centre Maintenance program, Staffing protocols, Organization and communication structure and Staff training programs.

Network Assessment

The current network is examined using 5 primary surveys: infrastructure, performance, availability, management, and security. When the surveys are completed, the information collected is then reviewed for trends, problems and issues that are negatively affecting the network. The surveys are reviewed and compared with best practices, business requirements and design requirements. The results from the analysis are then utilized to develop specific recommendations that focus on design, equipment configuration, security, and network management strategy improvements. The surveys examine common elements such as circuit maps, routing protocol design and Windows ADS. The office survey examines campus, WAN, applications, and facilities for access, distribution, and core offices. The performance assessment identifies the types of traffic currently running on the network and current average and peak traffic loads. The network is tested at various campus and WAN segments for response time, utilization levels and errors. Recommendations are then submitted that address the problems identified. In collaboration with and at the request of the client we then implement and validate the recommendations to ensure benefits are achieved.
Steps

Cybersecurity Assessment

A cybersecurity assessment aims to identify and close vulnerability gaps and remediate weaknesses, prioritizing issues with the highest potential for bottom-line impact. Assessments also help cybersecurity teams improve communication with upper management. To achieve your security goals, you need a clear and effective strategy. Using a security framework like NIST will help you with every phase of your security journey, and choosing integrated solutions will simplify the work while eliminating blind spots. Tri-Paragon assessments address all five functions of the NIST framework:
Identify
  • Which data is sensitive?
  • Which accounts pose risk and why?
  • What gaps leave us vulnerable to threats?
Protect
  • How can we enforce the least privilege?
  • How can we minimize the risk posed by admin accounts?
  • How can we prevent dangerous changes?
Detect
  • Who is accessing sensitive data?
  • Is there any improper user activity?
  • Were all configuration changes approved?
Respond
  • Do I have to report a data breach?
  • How can we respond to threats faster?
  • How did an incident occur?
Recover
  • What data needs to be recovered?
  • How can we revert improper AD changes?
  • How could an incident have been blocked sooner or prevented altogether?

Defending against Evolving Threats

magbo system