Skip to content

Define the current situation:

  • Inventories of hardware, software, users, data and their type.
  • Structure and network diagrams
  • Internal communications (including wiring infrastructure, Wi-Fi)
  • Contracted external communications.
  • Different logs, performance reports and errors obtained from the Servers and PCs.

Special attention will also be paid in all matters related to security and its different aspects:

• Security document

• Physical security

• User access

• Hardware and software

• Network security

• Mail services (if applicable)

• Backup processes

• Data Recovery Plans (DRP)

Likewise, all that has to do with contracts, licenses and maintenance in the field of IT will be reviewed.

At K-DiagnosTic there are three main tasks to develop:

Skip to content