ARE YOU READY TO CHANGE YOUR FEATURE?

Inspace offers various IT services and provides applications for business needs and growth through specially designed IT audit and infrastructure services that helps the client explore the power of technology.

Technology Audit

Foundation For Digital Transformation…

“A Government of India (HRD Ministry) recognized service, copyrighted for Audit Methodology & Framework”

“Technology Audit – A Key Enabler for Digital Transformation Initiatives Our Information Technology Audit (TA) Services – © Inspace Business Impact Evaluator (IBIE), has been copyrighted and recognized by HRD Ministry, Government of India for its Audit Methodology and Framework. Our TA Services comprising of IT Infrastructure Audit (Network / Servers / Endpoints / Connectivity / Power) for Performance / Security / Scalability, ERP / SW Application Audit for Business Alignment. Key users interview on key issues/benefits of IT. Overall, the TA gives gaps and recommendations on IT investments have done vs. Business goals. TA is an enabler for Digital Transformation initiatives for business across various industries.”

What is Technology Audit?

Technology Audit which is an auditing service done to understand the present technology utilization level of an organization. This is very similar to an Accounting Audit that is conducted in almost every company. It provides a benchmark for, where the business is now, in terms of technology. The audit can help identify strengths and weaknesses. It’s really a snapshot of the organization’s technology infrastructure. The evaluation of the collected evidence determines if the information technology is operating effectively and efficiently to achieve the organization’s business goals or objectives.

Why we need to do Technology Audit?

The Technology Audit for organizations from any domain is a MUST to ensure optimum performance in the day to day operations and decision making. It helps the organization to understand and utilize technology MORE EFFECTIVELY. The success of this Audit is that it does not recommend investing more; rather it helps to get more out of existing technology investments.

Our Technology Audit includes various components and addresses the critical and major pain points of different IT areas as detailed below:

Power Infrastructure Audit

  • Sudden power failure of UPS
  • Over-utilisation and under-utilization of UPS capacity
  • UPS power cabling issues
  • Battery backup for the load applied
  • Climate control measures were taken up for the UPS and Battery placement
  • Fire Hazards that pose a potential threat to the environment.

Audit Recommendations:

  • Safe and Climate controlled placement of UPS & Batteries
  • Overloading or Underloading of UPS
  • A possible resolution of UPS issues

Our Technology Audit includes various components and addresses the critical and major pain points of different IT areas as detailed below:

Power Infrastructure Audit

  • Sudden power failure of UPS
  • Over-utilisation and under-utilization of UPS capacity
  • UPS power cabling issues
  • Battery backup for the load applied
  • Climate control measures were taken up for the UPS and Battery placement
  • Fire Hazards that pose a potential threat to the environment.

Audit Recommendations:

  • Safe and Climate controlled placement of UPS & Batteries
  • Overloading or Underloading of UPS
  • A possible resolution of UPS issues

Network Infrastructure Audit

  • Network speed drops
  • Sudden connectivity failure with devices
  • Wireless signal strength issues
  • Network architecture and design
  • Cable routing and type of cables being utilized
  • Active and passive network components

Audit Recommendations:

  • Network architecture &design as per best practices
  • Cabling standards and routing
  • Network equipment safe placement & environment
  • Active & Passive (wired & wireless) components maintenance
  • High-availability setup for minimal downtime
  • A possible resolution of network performance issues

Internet/Intranet Connectivity Audit

  • Internet connectivity speed drops
  • Failover and load-balancing setup
  • Bandwidth utilization
  • Unauthorized usage of internet services
  • Content filtering to avoid certain categories of websites
  • Firewall setup (policies for allowing/disallowing the user’s access to websites)
  • Email services (unauthorized sending of emails, blocking of attachments, controlling size or type of attachments).

Audit Recommendations:

  • Internet bandwidth usage & requirements
  • Restriction of Unauthorised bandwidth usage
  • Load balancing& failover configuration
  • Email filtering for data monitoring
  • Firewall policies for optimal security

Internet/Intranet Connectivity Audit

  • Internet connectivity speed drops
  • Failover and load-balancing setup
  • Bandwidth utilization
  • Unauthorized usage of internet services
  • Content filtering to avoid certain categories of websites
  • Firewall setup (policies for allowing/disallowing the user’s access to websites)
  • Email services (unauthorized sending of emails, blocking of attachments, controlling size or type of attachments).

Audit Recommendations:

  • Internet bandwidth usage & requirements
  • Restriction of Unauthorised bandwidth usage
  • Load balancing& failover configuration
  • Email filtering for data monitoring
  • Firewall policies for optimal security

Server, Storage & Backup Infrastructure Audit

  • Increased downtime of servers,
  • Recovery from a crash (both physical and virtual),
  • Storage space management,
  • Operating system compatibility issues,
  • Automated backup and restoration of the backed-up data
  • Performance of server, storage and backup equipment for optimum operations

Audit Recommendations:

  • The optimal configuration for servers based on the user load
  • Storage technology and space based on usage and forecast
  • Best practices Backup and Restoration process
  • Maintenance of Server equipment for minimal downtime
  • The possible resolution of the server, storage, and backup issues

Desktop, Laptop & Thin Clients Audit

  • Recovery from crashes and minimizing the downtime
  • Repair/replacement and upgrade spares availability
  • Standard hardware configuration across the organization
  • End-to-end audit or sampling audit can be scoped as required.

Audit Recommendations:

  • The optimal configuration for desktops/laptops based on the usage parameters
  • Maintenance of desktop/laptop including spares as per best practices
  • Asset tagging & maintenance
  • A possible resolution of desktop/laptop issues

Desktop, Laptop & Thin Clients Audit

  • Recovery from crashes and minimizing the downtime
  • Repair/replacement and upgrade spares availability
  • Standard hardware configuration across the organization
  • End-to-end audit or sampling audit can be scoped as required.

Audit Recommendations:

  • The optimal configuration for desktops/laptops based on the usage parameters
  • Maintenance of desktop/laptop including spares as per best practices
  • Asset tagging & maintenance
  • A possible resolution of desktop/laptop issues

Core Application (ERP / SW) Audit

  • Using MS Excel to take reports after investing in ERP,
  • Utilisation levels of the Application by users (module-wise)
  • Scope for improvement areas
  • Functional audit on the mapping the business requirement with the functionality
  • Technical audit on the coding (coding standards and best practices).

Audit Recommendations:

  • Fitment of the existing application vis-à-vis the business process
  • Utilisation levels of existing application department/module-wise
  • Module-wise recommendations for optimal usage
  • Technical architecture & design as per best practices
  • Coding methodology as per best practices

SW License Compliance Audit

  • Unauthorised usage of software by staff
  • Legal compliance issue due to pirated applications
  • Find actual gaps in the license
  • Identify open source alternatives to reduce investments

Audit Recommendations:

  • Identification of unlicensed software and gap in available licenses
  • Recommendation on open source/freeware alternatives

SW License Compliance Audit

  • Unauthorised usage of software by staff
  • Legal compliance issue due to pirated applications
  • Find actual gaps in the license
  • Identify open source alternatives to reduce investments

Audit Recommendations:

  • Identification of unlicensed software and gap in available licenses
  • Recommendation on open source/freeware alternatives

IT Data Security Audit

  • Vulnerable network
  • USB / Email data leakage
  • Physical security (entry/exit registering, CCTV surveillance)
  • End-to-end Logical security (including VA-PT audits)
  • Data and equipment theft

Audit Recommendations:

  • Recommendation for mitigating VA-PT Gaps
  • Harden Server environment for robust security
  • Firewall policy and monitoring
  • Recommendations for physical security as per best practices

Key User Audit

  • The collective view of the key users driving the organisation
  • Understand training requirements
  • Identify the key expectations of majority stake holders.

Audit Recommendations:

  • Key User’s knowledge level for utilizing technology investment of a company
  • Recommendation for areas of training required by key users

Key User Audit

  • The collective view of the key users driving the organisation
  • Understand training requirements
  • Identify the key expectations of majority stake holders.

Audit Recommendations:

  • Key User’s knowledge level for utilizing technology investment of a company
  • Recommendation for areas of training required by key users

The above audits can be clubbed together in a single package as Technology Audit or can be individually done and taken up in a phased manner as per the business requirement. The capstone of Technology Audit is the Audit Findings Report which includes gap analysis, recommendations pertaining to technology upgrade/downgrade, training requirements and plan of action.

Technology Audit recommendation sets the direction for organizations to optimize Return of Investment on IT

This Audit Report facilitates the clients to understand the following critical parameters,

  • Potential Security threats/gaps and their removal plan
  • Performance and Productivity inhibitors and their mitigation pointers
  • Technology utilization level in the company and its improvement road map
  • Helps the clients to take the right decision when investing in growth-oriented digital transformation initiatives