Network Audit

In addition to Vyom’s technical support and hardware maintenance contracts, Vyom has designed a combination of network and Internet audit modules which give you the confidence that your LAN, WAN or Internet infrastructure is operating at optimum capacity.

The modules are designed to highlight hardware faults and failures, configuration errors, network inefficiencies and bottlenecks, offering a more proactive approach to support.

Switch audit

This audit module checks, reports and makes recommendations on:

  • firmware revision
  • configuration of spanning tree
  • configuration of port speeds / duplex
  • switch topology
  • access security; e.g. web based access
  • VLAN usage and configuration
  • use of SNMP
  • evaluation of inter-switch links
  • port based errors; e.g. CRC, collisions
  • CDP – check ARP andCAM
  • ‘ease of use’ features; e.g. cluster management

Chassis switch audit

This audit module checks, reports and makes recommendations on:

  • firmware revision *
  • configuration of spanning tree
  • configuration of port speeds / duplex
  • backplane bandwidth allocation and configuration
  • RMON statistics
  • protocol filtering
  • increased redundancy and resilience options
  • access security; e.g. web based access
  • VLAN usage and configuration
  • peripherals; e.g. power
  • check any port based errors; e.g. CRC, collisions
  • CDP – check ARP andCAM
  • ‘ease of use’ features; e.g. cluster

Router audit

This audit module checks, reports and makes recommendations on:

  • IOS version and firmware revision
  • configuration
  • SNMP configuration
  • evaluation of individual ports
  • security
  • access lists
  • protocol support
  • router log set-up, evaluation and diagnosis
  • Vyomprovide paper and electronic copies of configurations.

Topology audit

This audit module checks, reports and makes recommendations on:

  • network topology design
  • design faults; e.g. bridging loops
  • cable segments that contravene ethernet standards
  • product types and specifications of all major local network devices

Traffic analysis

This audit module checks, reports and makes recommendations on:

  • levels of broadcast traffic
  • types and analysis of protocols used
  • bandwidth utilisation
  • rate of data collisions
  • levels of error packets
  • identification of bad packets; e.g. runts and jabbers
  • broad identification of any cabling problems
  • time trials between servers
  • use of AEP protocols
  • evaluation of product statistics fromrouters and switches, ICMP etc

What is a vulnerability assessment?

A vulnerability assessment is the process of assessing your information security measures via an ASP driven Internet security analysis system. It tests your web-interfaced systems (web servers, firewalls, routers, email and file services) for security vulnerabilities; results and recommendations are then delivered in a comprehensive report.

Who needs the vulnerability assessment service?

Any company with systems connected to the Internet needs to test these systems for vulnerabilities. On an average, we find vulnerability in system that a hacker could directly exploit, by either for example, deleting, modifying or stealing data, or even taking control of the system.

 A vulnerability assessment will Identify:-

  • The threats facing your organization’s information assets so that you can quantify your information risk and provide adequate information and security expenditure.
  • To Reduce your organization’s IT security costs and provide a better return on IT security investment by identifying and resolving vulnerabilities or weaknesses.
  • To Provide your organization with peace of mind – a thorough and comprehensive assessment of your security systems which covers policy, procedure, design and implementation

 Citrix Thin client solution

 Thin client systems involve a solution where minimal processing takes place on the client machine, and the server does most of the work. This simplifies application deployment and reduces your licensing costs, giving you the best way to deliver heavy client-server applications over wide area networks.  These thin client solutions will help you:

  • Deploy and update applications in minutes instead of months
  • Give remote offices access to full enterprise resources
  • Mobilize your workforce
  • Keep information and applications secure and available, no matter what.
  • Let employees and partners find and organize information and collaborate more effectively
  • Use familiar standard Windows technologies.

Access information on demand

Using Citrix Thin Client solutions, Vyomwill help you make information and applications accessible in real-time fromany device, anywhere, over any connection.

Simplify and streamline integration

Citrix remote office connectivity solutions enable application access fromone centralized location, reducing the cost of provisioning branch offices individually.

Speed up deployment and increase efficiency

Citrix Application Deployment solutions can accelerate delivery of a full range of applications and data across the enterprise.