spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Calling the Experts to Manage Your IT Network Infrastructure

Written by Mike Solinap
Published on June 17, 2013

An often overlooked part of IT network infrastructure management is network security. The majority of business networks, even for small businesses, have a large variety of heterogeneous devices that are working together to provide the services for the various departments including product development and product lifecycle management (PLM). This diverse range of devices can pose a security risk as each operating system and product suite needs to be updated regularly.

Even non-specialist software from companies like Microsoft or Adobe are updated monthly to fix security issues which affect their respective products. Frequently, Internet Explorer is updated to resolve issues where malware can be downloaded onto a PC just by visiting a website. Similarly, Adobe Reader is often updated to fix vulnerabilities where malware can infect a PC just by opening a malicious PDF file.

Beyond Windows and well-known tools like Adobe Reader, enterprise and server software is also frequently updated. In February 2013, Microsoft issued a critical patch for Microsoft Exchange which fixed an issue where the server could be infected with malware when certain files are converted by the mail server. Windows Server 2003, 2008 and 2012 are also often patched. Linux isn’t immune to these problems and Red Hat Linux, CentOS and Ubuntu are frequently updated to fix security related issues.

Besides traditional servers there are often other types of servers or appliances on the network including firewalls and VPN servers. As well as being updated frequently, they also need to be configured correctly — a firewall with a bad configuration is the same as no firewall at all!

If a business is hosting its own website then this offers a public point of access which attackers can try to use to circumvent security. An out-of-date or misconfigured web server can pose a significant security risk, both in terms of allowing intruders into the internal network and in exposing confidential customer data.

It is an unpleasant reality that security is often neglected by system administrators, not through incompetence but due to workload. Maintaining a complex IT network infrastructure can be time consuming and if security has become a low-priority task then a business becomes vulnerable and even customer data is put at risk.

By outsourcing different IT services, these pressures can be alleviated. First, the companies web hosting could be moved to managed hosting or to the cloud. Second, different parts of the IT infrastructure can be managed by a third party or even moved to SaaS. Or simply having a security expert on hand to manage the security related aspects of the network can reduce the pressure on the existing IT staff.

Whatever solution is chosen, being proactive is always the best course of action.

Next Steps:

Latest White Papers

A Checklist to Optimizing Cloud for Engineering Teams

A Checklist to Optimizing Cloud for Engineering Teams

Is your engineering team truly optimizing the cloud—or just getting by?The cloud holds enormous potential for accelerating innovation, streamlining workflows, and reducing time to market.  But many engineering teams struggle to navigate the complexity of cloud...

Related Resources

Ten Windchill PLM Strategies to Maximize Productivity and Reduce Costs

Ten Windchill PLM Strategies to Maximize Productivity and Reduce Costs

You will be taken to another page to registerBy submitting this form, I acknowledge receipt of SPK and Associates' Privacy Policy.Is your product lifecycle management system driving real business value—or just managing data?  In this practical and engaging webinar,...

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

Accelerating product development, improving product quality, and enhancing collaboration are all main priorities for designers and manufacturers. Achieving these goals requires the proper digital solutions for managing product data and processes. Product Lifecycle...

Open Source Due Diligence Checklist

Open Source Due Diligence Checklist

Proper open-source software management is vital to ensuring issue-free code. This checklist will explore the practices your team must take to prevent coding issues. What You Will Learn In this eBook, you will discover the best questions to ask and warning signs to...