BYODs: Increased network density, bandwidth consumption and security risk
If you're over budget this year, your BYOD policy may be to blame.
What's Up, What's Down and What's Trending
If you're over budget this year, your BYOD policy may be to blame.
The past two weeks have been a whirlwind for the Network Management division as we launched v16. We finally have a chance to look back on all we’ve accomplished – including a fantastic PC Magazine review.
Last week Ipswitch’s IT team initiated moving its product download server to a Cloud offering with more bandwidth for growing capacity. However, before committing to this major change, IT decided to globally test the downloads of both servers, in order to determine whether or not the new Cloud platform could indeed offer Ipswitch greater resiliency and download speed – in addition to higher bandwidth to support an increase in expected download traffic. Establishing a performance baseline was IT’s first task, and was simplified with AlertFox’s ability to create 15-minute test sensors from US, Asia, and Europe. Using AlertFox, IT was able to proactively identify the minimum, average, and maximum response time with timely emails and reports.
There is a common misconception that BYOD will be the savior of IT budget troubles; however, it’s not always as cost-effective as it seems. According to Aberdeen, enterprises spend an extra $170,000 per year to deploy 1,000 mobile devices via BYOD. A typical BYOD model costs 33% more than the traditional corporate-wireless model.
When I talk about BYOD with other IT pros, I get flashbacks of 2009 when the ‘cloud’ first became a hot topic. Security and costs are the top concerns, but few people understand the importance of monitoring and measuring the impact on the network, and why it matters.
My – how research has changed in the 20 years I have been working in IT and high-tech! Normally, you would have to scour reams and reams of articles in trade rags delivered via snail mail to find information relevant to your work. Now we have the ability to set alerts, custom feeds and create targeted searches to find many more ‘diamonds in the rough’ than was even possible 10 years ago.
Hey folks, this is Brian M. Jacobs, Senior Product Manager for the WhatsUp Gold family of network management products. I would like to let you know that a security researcher (who has been a big fan of WhatsUp Gold for many years) has informed us of a SQL injection vulnerability in the WhatsUp Gold v15.0.2 product. This vulnerability involves WhatsUp Gold running in a default deployment, in which administrators have privileged access to the database instance. For customers who wish to restrict access to their database, we already provide the capability to configure WhatsUp Gold to run with reduced database privileges. Details on how to implement reduced privilege operation can be found in our Database Migration and Management Guide. Based on our customers' input, we are also working on security patches to limit all SQL injection related vulnerabilities, regardless of database privilege level.
Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? With the growing number of Wi-Fi connected devices, there have been more and more public Wi-Fi networks created. Nowadays, whether you are in a coffee shop or train station, there is probably a public Wi-Fi in your general area.
As a product manager of an integrated solution suite, it’s interesting to compare and contrast the similarities and differences between traditional systems management (OS deployment, inventory, software delivery, patching, monitoring) and its major trends (security, virtualization, cloud, efficient data centers) with network management (deployment and configuration, backup/restore, monitoring, traffic analysis, Quality of Service) and networking trends (mobile devices, cloud, virtualization, larger networking demands). There are many similarities between these two IT focus areas and I will “blog” about several aspects as I tie-in and compare systems management with network management over the next year. One similarity that is particularly easy to spot and “leaps off the page” for me relates to discovery. In fact, it ALL starts with discovery.
In my current role I speak to a lot of network engineers trying to automatically map their network topology. Actually it’s more than that, they don’t just want to discover devices, the want a port level diagram of exactly how all their switches, routers, servers, workstations, phones, firewalls . . . you get the point. Some engineers I speak to practically ask:
Maintaining a work-life balance is extremely difficult for some – especially network managers who are on-call 24/7. A great article titled Mobile Network Management Smartphone Apps for On-the-Go Engineers on SearchNetworking.com got us thinking about all the ways network management software for smartphones and tablets helps make network managers’ lives easier and achieve that work-life balance we all try so hard to maintain.
I'm sure many of you opened your browser to Google this morning to see the capitol of Kansas replace the search giant's name.
The Basics of WMI and Why You Need to Monitor It
Other's have already done it for you?
Here is a useful list of tips that network administrators can leverage in their everyday travails.
There has been a lot of buzz around WAN optimization over the past few months, with numerous mentions of what WAN optimization is and what it brings to the table. On the surface, it is certainly a cool technology, but it is a technology that requires some additional thought before implementing. It is certainly another great tool in the network managers arsenal.
Network Monitoring comes in all shapes and sizes. It can be as complex as a multi-site WAN distributed solution. Or, it could be as simple as reacting to end-users phone calls claiming that they can’t receive email.
Interesting thing virtualization, everyone is talking about it and lots of IT professionals are investigating it and quite a few are implementing it.
Breach, which is set for release in a few weeks, focuses on the true story of an FBI upstart who must investigate his boss who is suspected to be selling secrets to the Soviet Union. For those of you who read the story in paperback or in weekly new journals, a strong lesson materializes in a story early on that is applicable to the numerous breaches we have heard about at TJX and other retail and insurer organizations. Regardless of how strong and robust your physical and digital security plan is, the success or failure of the plan more likely will lie with the human capital charged with installing, managing and watching the systems.
From Network World's Network/Systems Management Newsletter:
Get our latest blog posts delivered in a monthly email.