Network Management Solutions

Several network management applications and tools are currently in use to tackle exploits, threats, and non-compliance. In some cases the solution is a standalone exploit system that is unproprietary and offered free of charge; in others, it is an off-the-shelf threat mitigation solution, often based on open-source frameworks and an open, industry-standard infrastructure for interaction. (For example, Symantec’s Norton Security, or Microsoft’s Group Policy Preferences)

But even though these management systems provide mitigation against attacks, they are often incapable of detecting or blocking the misuse of resources by malicious actors (known as a sandbox), which can result in overall increased risk, increased privilege-escalation, and higher attack surfaces.

Security enhancements

Insecurity in networks leads to a lack of cooperation among networks and points to a breakdown in trust and visibility in all directions. Those issues can lead to a loss of trust and to siloed functionality and information. As a result, the security of the system as a whole deteriorates, which can ultimately lead to security vulnerabilities, so is important to learn about network security and how to improve it, and you can read more about this here.

“It’s imperative that systems become secure on their own, independent of individual organizations, in order to make them self-supporting and self-healing, which increases security, minimizes risk, and increases agility and success,” said Eric Jones, principal consultant, Symantec Corp., in an interview with InformationWeek.

Despite these challenges, network management solutions can still offer important capabilities that are useful for operators, such as the ability to better manage resource utilization, and they can also provide a platform for performance enhancement and industry standardization, Jones said.

A solution strategy

Jones suggested five major elements for a successful security solution strategy.

First, it is important to identify a critical business unit with a role that it plays, and then identifying the security and performance components for that group, he said. Next, once a security solution strategy is set, the focus of the company should be on security and vulnerability analysis of its technology and infrastructure. The vendor can then incorporate the insights from the analysis in the next version of the software, he said.

Finally, a comprehensive solution strategy should examine all aspects of the design of the network to include the management service model, applications, infrastructure, and client device software.

“Finally, organizations should create a fully validated product roadmap and budget, leading to a secure roadmap and more dedicated resources,” Jones said.

Here are some examples of how key security problems have already been addressed:

A multi-vendor implementation of a security solution to address exploitation issues with the Windows Operating System has been developed by a team at Deloitte IT on behalf of Microsoft. Microsoft has already begun developing secure support and documentation for its Hypervisors, and a security release of Windows 8 is scheduled for this summer.

In September 2013, IBM demonstrated a flexible approach to manage security protection for the SCADA (supervisory control and data acquisition) services that fuel production facilities in the industrial sector. The new approach uses modern management practices to reduce risks associated with unplanned, unplanned, and undocumented events that can cause denial-of-service and other attacks that damage operations. The overall objective was to manage an intrusion that caused approximately $1 million in damages for a utility company. The event was to be extremely rarenothing like that had happened in the three years since the system had been in use.


Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*