SlideShare a Scribd company logo
A GUIDE TO EVALUATING
YOUR IT NETWORK
W W W . J E N L O R . C O M
Evaluating an IT network can be a daunting task that many companies would simply prefer to
ignore due to its complexity, and possibly because they dread what such an assessment might
turn up. In today’s competitive business world however, this is an area that just has to be done, in
order to determine if the business is being adequately supported in its objectives by the computing
power of all the physical and virtual components comprising its local and wide-area networks.
When the time comes for such an evaluation, it should be formalized and more in-depth than
simply relying on feedback from the user community about response time, and it should not be
assumed that security is adequate because no one has reported virus attacks. There are criteria
for evaluation that should be used for evaluating the health and effectiveness of any network
which can provide a much clearer and much more accurate idea of how well it is configured to
meet the needs of the company.
It is well known that data is the lifeblood of any business, and without it daily
operations would come to a screeching halt. Imagine an online store losing its
database of products and inventory for sale, or losing its customer database to a
sudden massive crash of the system. A plan for data backup and recovery must be
formalized in terms of its time-of-recovery because time is money in business, and
also in terms of its recovery point, i.e. how far back in time was the last backup?
The concept of backup and recovery should be tied in with Disaster Recovery too,
and the plan for disaster recovery should be tested periodically to ensure its true
viability.
DATA BACKUP AND RECOVERY.
IT Network Evaluation Criteria
W W W . J E N L O R . C O M
It is essential to have the most current anti-virus and anti-malware security in place
on the network, because not a day goes by without new malware being created.
This means that the network must be adequately insulated against attacks by its
firewall configuration and by internal anti-virus software. Evaluating effectiveness
entails gauging your security software’s ability to update, scan, and quarantine
suspect files immediately. A secondary aspect of security evaluation is ensuring
that all hardware and software patching is up to date with the latest versions.
SECURITY IMPLEMENTATIONS.
W W W . J E N L O R . C O M
Does the network setup take advantage of cloud storage where it makes sense?
There are some huge benefits to cloud storage, chief among them the fact that
enormous amounts of data can be resident on physical servers located off the
premises and on a network connected to your own. By now, most businesses have
overcome their security fears of having data stored off-site, and cloud storage has
proven itself to be a sensible, economic advantage. The cost of purchasing and
maintaining a server farm on-site should be measured against the cost of reliable
cloud storage from a reputable vendor.
CLOUD STORAGE SOLUTIONS.
W W W . J E N L O R . C O M
Is the network capable of providing high-performance access to all clients as well
as having sufficient bandwidth to satisfy access between all user locations online?
The importance of connectivity and performance across all internal and external
users has exploded because of the much greater passing of huge files that take
up bandwidth, e.g. video files, that can quickly suck up bandwidth and bog down
communications.
CONNECTIVITY.
W W W . J E N L O R . C O M
W W W . J E N L O R . C O M
The physical health of all the components comprising your network is just as critical
as the health of the software and performance issues. All servers, routers, LAN
switches, PC’s, operating systems, rules & processes, wiring cabinets, and all the
other pieces that comprise the hardware and software of the network must be up-
to-date in terms of warranty life and functionality.
INFRASTRUCTURE HEALTH.
W W W . J E N L O R . C O M
W W W . J E N L O R . C O M
This is a kind of catch-all area that may be considered a composite evaluation of
all the other areas rolled into one. Does your network in any way hinder business
objectives or prevent them from being realized? Or is the network an enabler of
business objectives, supporting and even enhancing them because of its superior
health and performance?
ACHIEVABLE RESULTS.
W W W . J E N L O R . C O M
The Ultimate Evaluation
In a progressive, modern company, the I.T. Department and the network it maintains
should be a driver of the business, leading the way to greater achievements and results.
It should not be struggling to keep up with the pace of business, barely able to support its
current goals, much less its goals for the future. By ignoring the health of the I.T. network,
a company might quickly find itself in the latter category, unable to compete with rivals.
No matter how you look at it, evaluating your network is an exercise that simply must be
done for the good of the company.
jenlor.com
606 Washington Ave.
Bridgeville, PA 15017
412.220.9330

More Related Content

PDF
Veritas Resiliency Platform
PDF
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
PPTX
Implementing security and controls in people soft best practices - may 2017
PDF
CAST for the Architect
PDF
Getting the Most Value from VM and Compliance Programs white paper
PPTX
ISS CAPSTONE TEAM
PDF
network-host-reconciliation
DOCX
SystemAnalyst
Veritas Resiliency Platform
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
Implementing security and controls in people soft best practices - may 2017
CAST for the Architect
Getting the Most Value from VM and Compliance Programs white paper
ISS CAPSTONE TEAM
network-host-reconciliation
SystemAnalyst

What's hot (20)

PPTX
行動應用App管理 (MAM)
PPTX
How to Close the SecOps Gap
PDF
Treating Security Like a Product
DOCX
PPTX
Noc help desk services
PDF
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
PDF
Netreo whitepaper 5 ways to avoid it management becoming shelfware
PDF
Future of Software Analysis & Measurement_CAST
PDF
Ivanti New Pricing Model
PDF
ca_nimsoft_monitor_snap_ebook
PDF
5 Traits of a Proactive Guard Tour System
PDF
Accenture Customer Story_CAST
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PDF
Abb e guide3
PDF
Is Your Vulnerability Management Program Irrelevant?
PPTX
The Most Underutilized Configuration Management Features
PDF
New IDC Research on Software Analysis & Measurement
DOCX
Matthew Dahl Resume
PPTX
08 july 2016
PPTX
Top 10 steps towards eliminating inside threats by paresh thakkar
行動應用App管理 (MAM)
How to Close the SecOps Gap
Treating Security Like a Product
Noc help desk services
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Future of Software Analysis & Measurement_CAST
Ivanti New Pricing Model
ca_nimsoft_monitor_snap_ebook
5 Traits of a Proactive Guard Tour System
Accenture Customer Story_CAST
Securing your IT infrastructure with SOC-NOC collaboration TWP
Abb e guide3
Is Your Vulnerability Management Program Irrelevant?
The Most Underutilized Configuration Management Features
New IDC Research on Software Analysis & Measurement
Matthew Dahl Resume
08 july 2016
Top 10 steps towards eliminating inside threats by paresh thakkar
Ad

Viewers also liked (9)

PDF
Muzeum II Wojny Światowej - recenzja Piotr Semka
PDF
Koncepcja strefy buforowej przy TPK
PDF
Cloud Computing
PDF
Delegacje Roberta Biedronia 2015/2016
PDF
Poradnik dla rodziców dot. narkotyków
PDF
Matura z matematyki na poziomie podstawowym 2016 - nowa wersja
PDF
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...
PDF
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część II
PPTX
Quick sort
Muzeum II Wojny Światowej - recenzja Piotr Semka
Koncepcja strefy buforowej przy TPK
Cloud Computing
Delegacje Roberta Biedronia 2015/2016
Poradnik dla rodziców dot. narkotyków
Matura z matematyki na poziomie podstawowym 2016 - nowa wersja
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Transk...
Arkusze starej matury z języka angielskiego na poziomie rozszerzonym - Część II
Quick sort
Ad

Similar to A Guide to Evaluating Your IT Network (20)

PDF
Essential-Network-Hardware-for-Business-Success.pdf
PDF
Insights success the 10 most trusted networking solution provider companies 2...
PDF
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
PPTX
Tech trends
PDF
Group 4 Networks Assessment Outline
PDF
Progressive Times - May 2012
PDF
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
PDF
Networking Expertise
PPSX
Beka Technology
PDF
How to deal with the impact of digital transformation on networks
PPTX
What to expect from your IT People
PDF
Goodenough 110424192114-phpapp02
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PDF
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PDF
2011 special edition - converged infrastructure
DOCX
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
PPTX
Determining Client And Networking Requirements
PDF
Infrastructure Management Services
PDF
Business Service Management Made Easy!
Essential-Network-Hardware-for-Business-Success.pdf
Insights success the 10 most trusted networking solution provider companies 2...
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Tech trends
Group 4 Networks Assessment Outline
Progressive Times - May 2012
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Networking Expertise
Beka Technology
How to deal with the impact of digital transformation on networks
What to expect from your IT People
Goodenough 110424192114-phpapp02
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
The Secure Path to Value in the Cloud by Denny Heaberlin
2011 special edition - converged infrastructure
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Determining Client And Networking Requirements
Infrastructure Management Services
Business Service Management Made Easy!

Recently uploaded (20)

PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Types of control:Qualitative vs Quantitative
PDF
IFRS Notes in your pocket for study all the time
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
5 Stages of group development guide.pptx
PPTX
Lecture (1)-Introduction.pptx business communication
DOCX
Business Management - unit 1 and 2
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
How to Get Funding for Your Trucking Business
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
A Brief Introduction About Julia Allison
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Laughter Yoga Basic Learning Workshop Manual
Ôn tập tiếng anh trong kinh doanh nâng cao
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Euro SEO Services 1st 3 General Updates.docx
Types of control:Qualitative vs Quantitative
IFRS Notes in your pocket for study all the time
Probability Distribution, binomial distribution, poisson distribution
5 Stages of group development guide.pptx
Lecture (1)-Introduction.pptx business communication
Business Management - unit 1 and 2
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Reconciliation AND MEMORANDUM RECONCILATION
How to Get Funding for Your Trucking Business
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
A Brief Introduction About Julia Allison
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Roadmap Map-digital Banking feature MB,IB,AB
Laughter Yoga Basic Learning Workshop Manual

A Guide to Evaluating Your IT Network

  • 1. A GUIDE TO EVALUATING YOUR IT NETWORK W W W . J E N L O R . C O M Evaluating an IT network can be a daunting task that many companies would simply prefer to ignore due to its complexity, and possibly because they dread what such an assessment might turn up. In today’s competitive business world however, this is an area that just has to be done, in order to determine if the business is being adequately supported in its objectives by the computing power of all the physical and virtual components comprising its local and wide-area networks. When the time comes for such an evaluation, it should be formalized and more in-depth than simply relying on feedback from the user community about response time, and it should not be assumed that security is adequate because no one has reported virus attacks. There are criteria for evaluation that should be used for evaluating the health and effectiveness of any network which can provide a much clearer and much more accurate idea of how well it is configured to meet the needs of the company.
  • 2. It is well known that data is the lifeblood of any business, and without it daily operations would come to a screeching halt. Imagine an online store losing its database of products and inventory for sale, or losing its customer database to a sudden massive crash of the system. A plan for data backup and recovery must be formalized in terms of its time-of-recovery because time is money in business, and also in terms of its recovery point, i.e. how far back in time was the last backup? The concept of backup and recovery should be tied in with Disaster Recovery too, and the plan for disaster recovery should be tested periodically to ensure its true viability. DATA BACKUP AND RECOVERY. IT Network Evaluation Criteria W W W . J E N L O R . C O M
  • 3. It is essential to have the most current anti-virus and anti-malware security in place on the network, because not a day goes by without new malware being created. This means that the network must be adequately insulated against attacks by its firewall configuration and by internal anti-virus software. Evaluating effectiveness entails gauging your security software’s ability to update, scan, and quarantine suspect files immediately. A secondary aspect of security evaluation is ensuring that all hardware and software patching is up to date with the latest versions. SECURITY IMPLEMENTATIONS. W W W . J E N L O R . C O M
  • 4. Does the network setup take advantage of cloud storage where it makes sense? There are some huge benefits to cloud storage, chief among them the fact that enormous amounts of data can be resident on physical servers located off the premises and on a network connected to your own. By now, most businesses have overcome their security fears of having data stored off-site, and cloud storage has proven itself to be a sensible, economic advantage. The cost of purchasing and maintaining a server farm on-site should be measured against the cost of reliable cloud storage from a reputable vendor. CLOUD STORAGE SOLUTIONS. W W W . J E N L O R . C O M
  • 5. Is the network capable of providing high-performance access to all clients as well as having sufficient bandwidth to satisfy access between all user locations online? The importance of connectivity and performance across all internal and external users has exploded because of the much greater passing of huge files that take up bandwidth, e.g. video files, that can quickly suck up bandwidth and bog down communications. CONNECTIVITY. W W W . J E N L O R . C O M
  • 6. W W W . J E N L O R . C O M The physical health of all the components comprising your network is just as critical as the health of the software and performance issues. All servers, routers, LAN switches, PC’s, operating systems, rules & processes, wiring cabinets, and all the other pieces that comprise the hardware and software of the network must be up- to-date in terms of warranty life and functionality. INFRASTRUCTURE HEALTH. W W W . J E N L O R . C O M
  • 7. W W W . J E N L O R . C O M This is a kind of catch-all area that may be considered a composite evaluation of all the other areas rolled into one. Does your network in any way hinder business objectives or prevent them from being realized? Or is the network an enabler of business objectives, supporting and even enhancing them because of its superior health and performance? ACHIEVABLE RESULTS. W W W . J E N L O R . C O M
  • 8. The Ultimate Evaluation In a progressive, modern company, the I.T. Department and the network it maintains should be a driver of the business, leading the way to greater achievements and results. It should not be struggling to keep up with the pace of business, barely able to support its current goals, much less its goals for the future. By ignoring the health of the I.T. network, a company might quickly find itself in the latter category, unable to compete with rivals. No matter how you look at it, evaluating your network is an exercise that simply must be done for the good of the company. jenlor.com 606 Washington Ave. Bridgeville, PA 15017 412.220.9330