{"id":1726,"date":"2016-10-24T19:35:44","date_gmt":"2016-10-24T19:35:44","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1726"},"modified":"2021-07-07T05:04:04","modified_gmt":"2021-07-07T09:04:04","slug":"technologyassessments","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1726","title":{"rendered":"What is The Difference Between an Information Technology Audit and a Technology Assessment?"},"content":{"rendered":"<p style=\"text-align: justify;\">The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization\u2019s existing network.\u00a0 However, this could not be further from the truth.\u00a0 It is important to remember that a formal Technology <em>Assessment<\/em> is not a Technology <em>Audit<\/em>.\u00a0\u00a0 The use of terminology is not just about semantics, but rather expectations. An audit is a required procedure conducted to validate a process established by an organization for instance, a financial audit, a tax audit, an HR audit, etc.<span id=\"more-1523\"><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Assessment vs. Audit:<\/strong><\/span>\u00a0\u00a0In the IT world, audits are required of organizations that are subject to compliance or are regulated by State or Federal agencies (Banks, Credit Unions, Hospitals, Publicly Traded Companies).\u00a0 We are all too familiar with HIPAA and Sarbanes Oxley, however, in some other cases, organizations can also be subjected to industry-specific requirements such as PCI-DSS (credit card payments).\u00a0 PCI-DSS requires strict validation and compliance reports on a quarterly\/annual basis.<\/p>\n<p style=\"text-align: justify;\">Other contrasts between a technology assessment and audit is the ultimate goal achieved.\u00a0 An assessment focuses on discovering and providing information related to the state of an organization\u2019s IT, not validating their compliance.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Identifying the Need:<\/strong><\/span>\u00a0\u00a0Interestingly enough, based on our 25+ years\u2019 experience with conducting technology assessments, the demand for technology assessments are normally driven by executive leadership who recognize their business is expanding, but unsure if the existing technology is scalable to support their growth.\u00a0 Other common situations involve conducting an assessment as part of a potential business merger or even diagnosing technical problems plaguing an organization\u2019s productivity.<\/p>\n<p style=\"text-align: justify;\">Rarely are requests driven from the organization\u2019s IT Staff (if any); perhaps there is concern that a negative assessment could reflect poorly on their performance, despite the fact that most cases reveal they are not responsible for the lack of interest in technology investments for the organization.<\/p>\n<p style=\"text-align: justify;\">A frequent misconception is that a technology assessment is an assessment of the software applications that a client is using. Application software is selected by a client based on their business needs and costs.\u00a0 The role of the technology assessment is to make sure that the technology in place is capable of supporting these applications, not the other way around.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>What a <em>Real<\/em> Technology Assessment Entails:<\/strong><\/span>\u00a0\u00a0A proper technology assessment will leave no stone unturned; if it is related to the company network infrastructure, this could include hundreds or thousands of computers and network devices in the end.<\/p>\n<p style=\"text-align: justify;\">With such an involved examination, the time to complete an assessment can vary; for existing TSI clients, the review can be a relatively short process because we are familiar with the organization\u2019s environment.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Step 1:<\/strong>\u00a0<\/span>\u00a0For new client engagements, the assessment can take between 1-3 days. The first step includes a questionnaire with a roughly half hour on-site visit.\u00a0 During the initial site visit, one of our highly skilled technical experts go over a series of questions so that we are able to better understand how the technology is used in the organization.\u00a0 The questions are not technical in nature, rather they are directed to the Points of Contact at the company.\u00a0 The questionnaire serves as a great tool for us and the client, establishing the parameters needed during the assessment.\u00a0 Primarily, the acting as a foundation where we can document all the concerns an organization has.\u00a0 If any questions are unanswered during the initial visit, fear not, we will be sure to address them after the assessment.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Step 2:<\/strong><\/span>\u00a0\u00a0Following the questionnaire, our team begins a physical review of the facility; including wiring closets, computer rooms, etc.\u00a0 to identify all elements of the network (cabling, servers, network devices, firewalls, as well as wireless access points).<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Step 3:<\/strong><\/span>\u00a0\u00a0The \u201cdiscovery\u201d phase involves using our computers to collect data about your entire network, inventorying all the information and storing it all on your own servers or machines.\u00a0 Discovery is an intensive process that includes three elements:<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"color: #800000;\"><strong>Physical Discovery:<\/strong><\/span> We examine and document the critical elements of the network such as connectivity (cabling), file servers, firewalls, power protection, and mission essential network devices.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"color: #800000;\"><strong>Electronic Discovery:<\/strong> <\/span>We collect data from every individual computer and network device on the network. This data includes information about computers and details pertaining to application software, versions, licenses, etc.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"color: #800000;\"><strong>Processes Discovery:<\/strong><\/span> We gather and document the existing internal processes, such as backup, disaster recovery, patch management, anti-virus, group policies, internet policies, remote access, wireless access, administrative rights for each user, etc.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Step 4:<\/strong>\u00a0<\/span>\u00a0After the discovery phase is complete, we evaluate the network performance and tabulate information to allow us to measure whether the network is performing optimally against the benchmarks set by similar industries and\/or size.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Step 5:<\/strong><\/span>\u00a0\u00a0The conclusion of the assessment includes the delivery of a final detailed report highlighting all of the findings, as well as our expert recommendations.\u00a0 Normally hand-delivered two weeks following the conclusion of the assessment and careful internal analysis.\u00a0 We have found the report to be a bit overwhelming with the level of information provided, which is why we always recommend setting aside some time while we are there to review the report and answer any questions.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Having a Trusted Partner:<\/strong><\/span>\u00a0\u00a0When providing technology assessments to existing client, Managed Service Providers (MSP) like TSI are uniquely positioned to provide regular evaluations.\u00a0 In most cases, MSP\u2019s have deployed agents to many of their client\u2019s servers, computers, and network devices that can identify, as well as report on any of the elements of their client network which doesn\u2019t meet the minimum performance specifications of their network infrastructure.<\/p>\n<p style=\"text-align: justify;\">These assessments should be conducted on a regular basis, following any major upgrade or change to the company infrastructure.\u00a0 Technology assessments conducted on a routine basis are not nearly as long or costly to conduct as some imagine; in fact, they are highly effective tools for assisting with properly allocating budgets for IT costs, as well as understanding shortcomings.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization\u2019s existing network.\u00a0 However, this could not be further from the truth.\u00a0 It is important to remember that a formal Technology Assessment is not a Technology Audit.\u00a0\u00a0 The use of terminology&hellip;<\/p>\n","protected":false},"author":3,"featured_media":8476,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[19,242,270,129,21,186,288],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is an Information Technology Audit vs. a Technology Assessment? | TSI<\/title>\n<meta name=\"description\" content=\"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Information Technology Audit vs. a Technology Assessment? | TSI\" \/>\n<meta property=\"og:description\" content=\"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1726\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-24T19:35:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gerard Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gerard Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726\",\"name\":\"What is an Information Technology Audit vs. a Technology Assessment? | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png\",\"datePublished\":\"2016-10-24T19:35:44+00:00\",\"dateModified\":\"2021-07-07T09:04:04+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc\"},\"description\":\"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1726\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1726#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is The Difference Between an Information Technology Audit and a Technology Assessment?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc\",\"name\":\"Gerard Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g\",\"caption\":\"Gerard Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=3\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an Information Technology Audit vs. a Technology Assessment? | TSI","description":"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is an Information Technology Audit vs. a Technology Assessment? | TSI","og_description":"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1726","og_site_name":"TSI Support","article_published_time":"2016-10-24T19:35:44+00:00","article_modified_time":"2021-07-07T09:04:04+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png","type":"image\/png"}],"author":"Gerard Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gerard Louise","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1726","name":"What is an Information Technology Audit vs. a Technology Assessment? | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png","datePublished":"2016-10-24T19:35:44+00:00","dateModified":"2021-07-07T09:04:04+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc"},"description":"Read this post to learn the difference between an information technology audit and technology assessment. Discover how a technology assessment can help your business.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1726"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/Technology-Assessment.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1726#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"What is The Difference Between an Information Technology Audit and a Technology Assessment?"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/1a605be66a2a332fe9bc01a23fb079dc","name":"Gerard Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/651cabbca6d70d38071fec1011b009c2?s=96&d=mm&r=g","caption":"Gerard Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=3"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1726"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1726"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8476"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}