Feeds

On enterprise networking and administration

Is anyone actively doing anything?

Internet Security Threat Report 2014

There are some things in life that everyone just expects to function, almost without thought. You switch on the light, there will be electricity available; you turn the tap and water will flow; you pick up the phone, there will be a dial tone. Over the course of the last decade, much to the surprise of many who have long toiled in the industry, users now expect most, if not all, IT services to be similarly available whenever and wherever the need, or the whim, strikes.

Go back ten to fifteen years and things were different. Users were unsurprised when a system went down or could not be accessed. Happy no, and certainly they were quickly on the phone to demand service access resumption, even the problem was caused by one of their own actions. But people did not routinely expect any IT service to function without interruption around the clock, around the globe. And of course, if anything ever went unexpectedly amiss, the first reaction of every IT manager, without needing recourse to technology, was to blame “it on the network”.

Today, not only business users expect the IT systems they access, however infrequently, to produce the service, application or data at the drop of a hat. Much of the attention that has been dedicated to the IT infrastructure to help improve service levels has focused on the infrastructure, namely servers and storage, virtualisation capabilities and, occasionally at least, on management tools. But still, the impression I get when I talk to IT managers is that little focus is paid to the networking side of things. Outside of large organisations and specialist providers of managed services, it is fair to say that the knowledge of how to design networks for optimum performance and security is a skill set possessed by few.

Of perhaps even greater importance is that like IT in general network management tends to only become visible when something goes wrong, be that a service interruption or security breach. The fact that every organisation is at least as dependent on its networking infrastructure as on its servers and storage is not widely recognised by the application managers who think such things as the network should ‘just work’.

The technical and corresponding business reasons for good IT operational practices are, to a greater or lesser degree, now well understood by organisations of all sizes. But most of the attention tends to be paid to the patching and updating of applications, servers, desktops and laptops with storage and networking trailing far to the rear.

The critical dependency on the networking infrastructure and its active management is under-appreciated. Part of this may be due to the fact that networks are now much more highly available and have almost become taken for granted. But it is also the case that managing networks and the myriad of devices that comprise much of the network can be extremely complex to set up and manage.

As a consequence many small and mid-sized organisations often look to external suppliers to take on the burden of network infrastructure installation, configuration and sometimes even routine management. It therefore sometimes becomes what the author Douglas Adams termed an ‘SEP’, namely somebody else’s problem.

It is likely that this situation will now slowly change. As well as sound IT governance practice requiring that network devices be actively monitored and managed there is a growing raft of legislative and other external drivers making it clear that the status and configuration of such systems match pre-set standards or policies. It is, therefore, fortunate that the management tools available to help administer network devices are becoming more straightforward to use. Of course, that still leaves open the question of just what policies should be followed.

Another factor is the rapidly accelerating consolidation amongst the suppliers of network management devices and tools. To take just a few examples the last few months have seen HP acquire 3COM whilst the last few days saw IBM buy network device management specialist Intelliden. Over the same period network giants Cisco and Juniper have also been quietly adding to their capabilities and portfolio of tools.

With systems management tooling becoming available to help scan and administer network devices from a number of suppliers it will be interesting to see how actively the big vendors and their many channel partners try to educate organisations on the risks of poor network management and the potential benefits achievable through active device and network service governance. It could probably be argued that this is an area where all scales of organisations have room to improve.

How is network management achieved in your organisation? Do you have internal specialists to manage all that complex stuff or do you have an external third party manage it for you? Or does it just get looked at if there is a service disruption or when something just has to be done? Do tell.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
DOUBLE BONK: Testy fanbois catch Apple Pay picking pockets
Users wail as tapcash transactions are duplicated
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
In the next four weeks, 100 people will decide the future of the web
While America tucks into Thanksgiving turkey, the world will be taking over the net
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.