Feeds

The State of Network Infrastructure

Does Senior Management care?

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Networks are the glue that allow users to function effectively in their daily tasks, yet a recent report by Freeform Dynamics based on a survey of readers of the Register shows many of you are using old equipment that is hard to manage. This begs the question, “does senior management really care about the state of enterprise networks, or are they happy to take it for granted until something breaks”? (Figure 1)

Figure 1

Figure 1

It is evident that a majority of the networks you operate are fragmented and difficult to manage. The odds are that many of the essentials of your networks may have been put in place over the course of the last five, ten, or perhaps fifteen years. There is even a chance that it was never really architected as a whole but has been built in a disorganized fashion to cater for individual application requirements case by case.

When we asked what problems managing the performance, availability and security of the applications on which your organisations depend, your replies were very clear. (Figure 2)

Figure 2

Figure 2

The majority of readers who took part in the survey confirm there are challenges with respect to application performance and availability. The problems are not only about slow response times or systems being unavailable, but include the question of performance consistency. Fifteen years ago most users were annoyed, if unsurprised, when network connectivity was lost or service quality deteriorated.

Today users complain if performance isn’t consistently perfect, regardless of where they are working, how they are connected or the devices and networks they are using. Perhaps more importantly, over half of Reg readers taking part indicated that unplanned outages are causing business disruption.

This takes us on the question of how good are your management capabilities, and do you see any areas where you should be looking to beef things up? (Figure 3)

Figure 3

Figure 3

The answers you gave in the survey show that you have obvious capability shortfalls evident in nearly every area of network performance and availability. The fact that a majority of readers highlight all areas as targets for improvement confirms you see a real need for them. But what might actually trigger changes to your application delivery networks and how you administer them? (Figure 4)

Figure 4

Figure 4

As can be seen in Figure 4, new ways of handling application delivery requirements can be initiated by a range of events. With nearly four out every five Reg readers acknowledging running old technology with functionality gaps (Figure 2), it is no surprise you see existing equipment reaching end of life to be the most likely initiator of change.

Other triggers for over half of you include major business application upgrades, web site development and increased security demands. Even modifications to regulatory requirements and Exchange / SharePoint upgrades are mentioned by two out of five readers.

The danger is that any modifications to the enterprise application access infrastructure resulting from the investment prompts noted above could simply lead to piecemeal implementation of new networking solutions without changing the way networks are managed as a whole. Such an approach perpetuates the fragmentation you already acknowledge to exist in your networks. It is also likely to further exacerbate any operational management difficulties you have.

A new approach is needed, one where the performance, availability and security aspects of application access for every service are assessed individually. A network then needs to be built able to handle the new demands being placed upon it, one with better management characteristics that demand less of time to keep operational and secure.

The first challenge is to convince your budget holders it’s time to invest in redesigning the corporate application access and security networks. The second, equally daunting, challenge involves how do you upgrade your network architecture and management processes without negatively impacting service levels? This is the IT equivalent of changing the tyres on a racing car while it is tearing around the circuit in the middle of a Formula One Grand Prix.

How are you going to get hold of the time and resources to make these changes and how do you plan to make the upgrades? Let us have your thoughts in the comments below. Equally, if you have already changed things, please let know how you made the transition.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
IT crisis looming: 'What if AWS goes pop, runs out of cash?'
Public IaaS... something's gotta give - and it may be AWS
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.