Feeds

Controlling Application Access

A network security and QoS checkpoint

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

Report

Key Points

The pressure is growing on the corporate network and the systems it supports.

When asked about their network and application access infrastructure in a recent research study, the 404 respondents who participated highlighted a range of escalating pressures. Organisations of all sizes are seeing greater demands as a result of core business growth and a general increase in the use of technology and information within the business. Overlaid on this is the additional pressure arising from home and mobile working, BYOD, and greater access of IT systems by customers, partners and suppliers.

Difficulties keeping up are negatively impacting the business.

With no sign of the growth in traffic or the appetite for broader access diminishing, keeping up with the trends is proving hard. Challenges reported include poor/unpredictable application performance and unplanned outages which undermine productivity and even interrupt the business. Changing access patterns, a range of external threats, and the unintended consequences of virtualisation are all then hampering the management of security in particular. Many also call out excessive costs to the business.

Many problems stem from shortcomings in the access infrastructure.

The trends being highlighted shine a spotlight on the corporate access infrastructure and the components within it for dealing with performance, availability and security. Piecemeal growth means that many are struggling with a complex and disjointed network environment containing lot of old technology requiring an excessive amount of manual administration to keep it running. Furthermore, the majority report significant shortfalls in capability in relation to a range of specific performance and security management functions.

Moving forward successfully has a philosophical as well as a practical dimension.

From a philosophical perspective, two mind-set shifts are required. The first is from an infrastructure to a services view of performance and availability management, and the second is to focus less on the ‘network perimeter’ approach to security and think more in terms of multi-layered protection accompanied by effective analytics. From a practical perspective, there is then a need to analyse and prioritise requirements more objectively, and make sure that the right knowledge, skills and tooling are applied appropriately.

A concerted effort must be made to break the ‘reactive investment’ habit.

Most investment intentions currently revolve around tactical requirements such as the replacement of obsolete equipment or implementation of new applications. When making architectural and technology decisions a conscious effort must be made to think of the bigger picture, and move progressively and proactively towards a more coherent access infrastructure capable of dealing with future needs.

Introduction

IT and business people are often guilty of applying dual standards when it comes to the use of technology. Encryption of business data on smartphones and tablets is regarded as critical, while laptop users have carried around sensitive information with no such protection for years. Meanwhile everyone throws their arms up in horror when a cloud service provider experiences an outage or security attack, even though frequent downtime, wild fluctuations in performance, and the occasional leakage of confidential information are simply accepted as facts of life in relation to internal systems and data.

Such dual standards are generally not the result of deliberate doublethink. New solutions are always considered in the context of the then current requirements, and are implemented using technology and techniques available at the time. The trouble is that both requirements and technology evolve continuously, and we often forget (or don’t have the time) to revisit older systems and infrastructure to make sure they are still current from a technology perspective and are still meeting business needs effectively.The result is that systems gradually fall behind in terms of fitness for purpose and operational efficiency.

This phenomenon is frequently observed in relation to the corporate access infrastructure that deals with many of the important aspects of application performance, availability and security. The chances are that in your organisation, the fundamentals of this were designed into your network five, ten or even fifteen years ago. Since then, modifications and extensions are likely to have been implemented in a piecemeal manner to deal with individual application requirements on a case by case basis. It has probably been a while, however, since you stood back, looked at the state of your access infrastructure as a whole, and asked yourself not just how well it is coping with requirements today, but how ready it is for the future.

With application and network loads increasing, access patterns evolving, and new security threats emerging almost daily, these are highly pertinent questions. In this report, with the help of input gathered from over 400 participants in a recent research study, we therefore examine the way in which requirements and expectations are changing in relation to application access and how well infrastructures are coping. Along the way, we also take a look at some of the imperatives for future proofing your environment.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.