Ten tips to help you be more efficient in network operators

First tip: Matching with network service provider (IPS)

Many people have the psychology of ' installing and forgetting ' system settings. That is dangerous, creating a hole for operators to constantly snoop around the network, waiting for an opportunity to attack.

The method of exploiting weaknesses and security vulnerabilities changes rapidly and rapidly, making firewall software, patches or manufacturers' barriers difficult to meet in time.

Network managers need to understand how exploitation works and how the Internet service provider (ISP) detects them. Also, it is necessary to regularly upgrade the protection program, update the latest version. Of course there is no universal blocking software, but continually using the latest versions will help increase network security to the maximum.

Second tip: Sell security forms from its own benefits

Selling security benefits to technology investors is the way Mandy Andress, president of Technologies ArcSec, proposed. Instead of saying how dangerous viruses are, why don't you offer ways to benefit companies with reputable services, such as spam protection barriers. Sketch for users how many times the specific effect increases when adding another layer of anti-spam control and what their benefits will be.

Picture 1 of Ten tips to help you be more efficient in network operators Third tip: Access the network and the desktop automatically

Wireless signs can be very useful for automatic desktop access control, often shared by multiple users in places such as drug testing rooms, warehouses, and counseling centers (call centers). ) .

For example, a group of memory physicists who once deployed Ensure Technologies' XyLoc MD, using 900MHz radio frequency technology to code employee IDs for validation. This method saves staff time while ensuring network access and sensitive information is not compromised by anyone else.

Tip 4: Link physical access to the enterprise application program

High-level IP-based access systems with industry-standard servers, using existing data networks provide the best performance ever. The success of this system is due to their open architecture products. The advanced point in server management technology is that systems are not only deployed by network personnel (better than physical security mode), but can also centralize management. In addition, they integrate with ERP applications and network access control systems.

Georgia Pacific, a $ 20 billion paper maker in Atlanta (USA), has released WebBrix, a product of automated management technology, a high-level access system based on IP addresses, with large range over 400 areas. IT staff used WebBrix's open application interface, wrote another customization software called Mysecurity, integrating the system with SAP. When employees track network signs to gain access, they also send data to SAP and track attendees.

Tip 5: Commit to an operating system specialist

' Configuring operating systems can be likened to an underground art ,' said Tom Henderson, an expert in fundamental issues of ExtremeLabs, a product testing firm. Setting up wrong connections can have serious consequences. As when using a large memory block move option that can affect the usage of the Cache, the operating system must stop working to handle. If memory / storage options are not properly balanced, the computer may be deactivated. By entrusting a qualified expert, mastering the manufacturer's instructions, the server easily integrates with the optimal execution for all applications. Specialists should also master the options for setting up Web Server and BIOS.

Tip 6: Use VMware smart server memory

If possible, you should increase the memory capacity on virtualized Windows 2003 physical servers. From there, increase execution speed for virtual machines. If all virtual machines on a physical box need the same source code in the same memory, such as dynamic link library (DLL), you can download each DLL into the main server's physical memory and then share DLL for all virtual machines. We will increase the benefit of large memory usage by storing each physical box instead of using the usage level.

Tip 7: Transfer applications to the Linux grid

Picture 2 of Ten tips to help you be more efficient in network operators If you have an advanced computing application for a large computer, don't be afraid to run it on inexpensive options like grid computers, because these applications are written in COBOL languages. The application will have to be redesigned a bit to suit the platform of the new hardware. Manufacturers may need more help, because they want to link on new technology.

Tip 8: WAN links can cause VoIP QoS degradation

This is a real problem in areas with aging public infrastructure in some countries, said Bruce Bartolf, chief technology officer at Gensler architecture firm in San Francisco. Having done a complete installation of 7 out of 35 VoIP sites, the director found that the error rate was very high and there were many perfection errors on many links. To provide quality phone service as well as ensure construction time, you need to design with alternate error-free lines on the WAN. Network cables may not need better. Metro Ethernet meets the requirements you need.

Tip 9: Manage IP addresses easily with one tool

Although the functionality of the tools can be replaced with the manufacturer's products, but with important activities such as IP address management, if not controlled well, you have to destroy 5-9 yourself. part. You can use Infoblox, with a multitude of operations management capabilities, such as upgrading the TFTP (Trivial File Transfer Protocol) firmware. ' Instead of handling the Microsoft distribution file system, I upload the TFTP server onto a Microsoft server, run DHCP on a Microsoft server, run SMS on top and manage everything, then I have a tool ,' Bartolf's Gensler said. He has done this method effectively and affirmed simply: ' I just need to put it in, and it works '.

Tip 10: Ignore activities that are intuitive

Experience of some companies like VistaPrint in the US indicates that visual monitoring activities should not be implemented. The company used to rely on remote monitoring to manage data centers, including one in Bermuda. They use a self-developed tool to track every activity, from CPU usage to event correlation. Visual event graphics are slow to detect and analyze, often taking 5 to 7 minutes for an event. While tools use simple colors (red, yellow, green), it takes only 1 to 2 minutes.

And do not forget to maintain the use of continuous monitoring tools 24/7, and run test activities at the same time. The most common error is to not open these tools until the event appears.