To help customers mitigate their risk with their IT systems CCS offers hardware audits, software audits, security audits and facilitates third-party independent audits.Learn More
In most organizations, over time information gets lost, updates get forgotten and support renewal dates get missed. Typically, this is a result of a change in technology, staff turnover, employee role and responsibility changes, or just a lack of attention. The risk to an organisation can be catastrophic, especially in a country as isolated as Bermuda.
To help customers mitigate their risk with their IT systems, CCS offers hardware audits, software audits, security audits and facilitates third-party independent audits. The methodology CCS employs for its audits varies slightly depending on the type of audit, but all of the services follow the same principals. CCS auditors perform the following steps:
CCS hardware audits focus on the networking, telephony, server and storage infrastructure within an organization as they are all critical to most organization’s business. The goal is to confirm that none of the infrastructure has been deemed end of life (EOL), or end of support (EOS) by the manufacturer and that the firmware is up-to-date on all hardware components. CCS will also confirm whether or not any hardware has a valid vendor support contract associated with it. While they are not usually considered critical systems, hardware can be expanded to include workstation and peripherals in addition to the company’s core equipment. This service is included on a semi-annual basis to CCS premier-level Tech Care customer as part of their annual maintenance agreement.
CCS software audits are designed primarily to help companies get a handle on the software licenses they own and how they are being used within their organization. During a software audit CCS consultants audit the software types within an organization, the release of software being utilised, the quantities owned and any upgrade entitlements the company may take advantage of. As with hardware audits, CCS will also verify that the software is up-to-date and getting updated regularly, as well as confirming the software solution being utilized is associated with a valid support contract.
Most security solutions include both hardware and software components. CCS’s security audits include all of the activities from our hardware and software audits. With security audits CCS consultants focus on architecture and the strength of the IT security solutions protecting the organization.
For more information please contact our sales department