Infrastructure Strategic Analysis and Solution (ISASE) Introduction Smith's Media Services plc has a network in need of modernisation. This report will look at the problems with their current network, the solutions to their problems, and everything they could do to improve and modernize their network.Issues1. A large amount of underutilized servers take up more space and consume more resources than can be justified by the amount of work actually performed. This is known as IT server scaling. This causes an ongoing need for additional resources to manage infrastructure, including funds, manpower and equipment for repairs.2. Parts of the network are unmanaged and risks are therefore expected.3. The company believes that the network system in place is not scalable due to the expected demand over the next 5-10 years according to the new business plan. This means they don't think the current network will be able to cope with expected future usage as the business grows.4. Due to security requirements arising from a financial contract, the internal network is divided into three physical networks: FINCON (for financial services contract), GEN (general use also for personal devices) and CORP (for corporate devices only). 5. The Organization does not currently manage personal devices in any way. This could allow viruses or other adware to access your organization's network if it is present on your device when it connects to the network.6. Sometimes there is often a need, due to a new project, to localize server resources to a particular company location. Unfortunately at the moment if a project on a company site requires localized resources, these are not provided and instead the project...... half of the document ......om/TERM/V/virtualization.html [Accessed 1 May 2014].Margaret Rouse, 2010. Cloud computing. thinktarget.com, available from: http://searchcloudcomputing.techtarget.com/definition/cloud-computing [accessed 3 May 2014]. webopedia, BYOD. webopedia.com, available from: http://www.webopedia.com/TERM/B/BYOD.html [accessed May 1, 2014]. Eli Misel, 2010. Advantages/Disadvantages: WEP/WPA Network Security. Bright hub, available from: http://www.brighthub.com/computing/smb-security/articles/78216.aspx [accessed May 2, 2014]. Bradley Mitchell, VPN Benefits. About.com, available from: http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm [accessed May 3, 2014]. Technology blog, Pros and cons of using a virtual private network. Thrivenetworks, available from: http://www.thrivenetworks.com/blog/2011/07/28/the-pros-and-cons-of-using-a-virtual-private-network/ [Accessed 3 May 2014].
tags