About | Services | Clients | Downloads | Links | Home |
Citec will carry out a check on where you are at with IT. Typically a gathering of preliminary information on software requirements, adequacy of existing hardware, data security and internal/external telecommunications interfaces. The result is a brief report listing findings, high-level recommendations and budget estimates for proposed next steps.
A detailed inventory of hardware and software, licenses, network infrastructure and security measures in place. This includes a report on identified shortcomings and recommendations for improvement.
Physical security of servers, data security, network security, workstation security, threat management, work practices, policy and procedure all come under scrutiny by a Citec consultant in order to identify weaknesses that may expose your organisation to unnecessary risks.