• Blog
  • Support Portal
  • Careers
214.297.2100
Axxys Technologies
  • About Us
  • Services
    • IT Support Services
      • Managed IT Services
      • Co-Managed IT Services
    • Backup and Disaster Recovery
      • Case Study | Financial
    • Office 365
      • Case Study | Health Care
      • Case Study | Commercial Furniture Design
      • Case Study | Financial
    • Voice & Collaboration
      • Case Study | Automotive
    • Strategic Consulting
      • Case Study | Financial Advisory
    • Cisco Meraki Wireless
      • Case Study | Private School
    • Cloud
  • Security Services
    • Managed Security Services
      • Cybersecurity Solutions
      • IT Compliance
      • Vulnerability Management
    • IT Security Assessment
  • Our Process
  • References
  • IT Research
  • Past Projects
  • Contact Us
  • Blog
  • Support Portal
  • Careers
  • Menu

Documenting Your Network – Part 4 of 5

March 6, 2012/in Networks /by Axxys Technologies

The next two critical pieces of network documentation include the IT Recovery Guide and Business Process Analysis.

IT Recovery Guide

Now, this is not 12 steps for how IT recovers from drinking too much last night, but rather, the IT Recovery Guide is used to outline various possible failure scenarios that could impact your information systems. This document includes key contacts, third party representatives, system components, and step-by-step directions and communication requirements for recovering the IT system. This is not a disaster recovery or business continuity plan; it is focused strictly on the IT components.  Copies of this guide should be on file with key officers, personnel and vendors.

Business Process Analysis

The Business Process Analysis documentation outlines the function and workflow of each department, as well as how technology is used within those departments. The purpose of this document is to provide IT with an understanding of who they are providing services to and the impact technology has to different roles within the organization.


Tags: backup, Business Process Analysis, data, disaster recovery, IT Recovery Guide, managed services, network, network assessment, security
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Google+
  • Share on Pinterest
  • Share on Linkedin
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
You might also like
HP Windows Tablets for Business There's An App for that...But?
HP Windows Tablets for Business Epsilon Data Breach gives hackers loads of emails
HP Windows Tablets for Business See just what the HP Slate can do!
HP Windows Tablets for Business Ronald McDonald House of Dallas Loves Axxys!
HP Windows Tablets for Business My 30 Day iPad Challenge
HP Windows Tablets for Business Memo from a simple email user…
HP Windows Tablets for Business IT Alert: Osama-Themed Phishing Attempts
HP Windows Tablets for Business Open House Brings Rave Reviews

Recent Posts

  • A New Era in Cybersecurity – Assume Breach Mentality
  • Is a Managed Security Services Provider (MSSP) Right for Your Organization?
  • The Long Way Up: Lessons from An Impossible Journey for Business
  • Where Do Business Owners Even Start with Cybersecurity?
  • How to Get Hacked: Security Worst Practices
Axxys logo
Call Us Today: (214) 297-2100
Customer Support
5850 Granite Pkwy #700 Plano, TX 75024 USA

Stay Connected

Be the first to know about new Axxys’ IT support and security services to help you meet your business goals

  • *We respect your privacy. We'll NEVER sell, rent or share your email address.
  • This field is for validation purposes and should be left unchanged.
© 2020 Axxys, Inc | Privacy Policy | Back to top
  • Privacy Policy
  • Privacy Policy
Wi-Fi: Control Required Observations In My First Year
Scroll to top