As a company one of our proficiencies is auditing architectures and designs from all aspects of IT. With over 100 ‘floating’ architects that help design the internet and the applications that float over it we can audit any section of the industry. These consultants are the top in the industry and can be brought in on demand, if we don’t have internal people at the time, to analyse any architecture for any weakness, cost improvements, vendor analysis and alternative choice you might have.
At a very low cost design auditing is one way a company can truly validate whether the millions they are about to spend is viable, efficient, technically sound, secure and complaint. Our design analysis is, we believe, one fo the most in-depth in the industry going into every aspect, even to configuration level if an LLD; of the design and its relative functions. For extended services we can also analyse it relative to the present operation network.
Etheria also provides, in every audit, the capability of automation design, as one of the SDN AND NFV leaders in the IT world, originating and deploying many of the live systems out there today in ISP and baking we are in a unique position to consider automation in any given environment allowing our customers to evaluate the possibilities fo removing up to 80% of their operational staff and running in an east an efficient automated environment. This is found to be incredibly valuable as it allows the customer to view his company’s purchases from a point of view of future capabilities such as Tor or netconf yang implementations. Does the CEN implement have future value and automation mechanisms builtin or roadmapped. We even liaise with your vendors for your as one extension to the service to enhance your contracts if needed.
An example audit would look something like the below
Discovery proves where the architects have calls with the owners, delivers, vendors and present operational staff to work out the present technical environmental impact and the attempted product delivery itself
List out the basic regulation and privacy compliance requirements for the particular project
Consider hardware, software and source code
Map the present operational environment
Validate the business objectives for the design
Look at cost versus revenue with OPEX and CAPEX considerations from a financial analysis point of view
Consider the present testing environment and test procedures done and for future and what they represent
All ingress, egress, and intranet data flows/protocols for E2E to allow for visibility into effect
Analysis the paper network architecture and key network components including security components, application and service relativity, operational cost and support capabilities, and over 900 other items on a single architecture
Integration touch points with core technologies integral to the operations of the organisation provers and change management
Formal reporting on the process, gap analysis, relevant findings, and mitigation roadmap. Where possible the report will also include: root cause analysis, peer-group benchmarking, good practice benchmarking, executive summaries, and technical summaries for a complete audit analysis of the given architecture and suggestions on what to change, what to enhance, with viable scientific methodologies for the customer to follow on the analysis