SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Using Remote Access Management     TM




to Increase Security and Improve
Efficiency in Data Centers
a white paper from Minicom
Using Remote Access Management
                                                                                                                  TM




    to Increase Security and Improve
    Efficiency in Data Centers
    a white paper from Minicom


    Executive summary                                           2. Improved operational efficiency

     In recent years, remote server access has become           With remote access, your IT staff don’t have to be
     standard for corporate data centers however, many          onsite, or even near the data center. Instead of
     data centers have adopted remote access strategies         physically driving over or walking into a server room,
     gradually, on an ad-hoc basis, as technologies have        they can fix a problem from their computer screen.
     evolved. As a result they are enjoying only partial        In today’s economy, when IT departments can be
     benefits, and may have opened up unexpected                understaffed and overworked, remote access means
     security gaps. With an overall strategy—and a              doing more with less.
     software solution for system-wide Remote Access
                                                                3. Better cooling/power efficiency
     Management , such TM AccessIT® from Minicom,
                            as
     corporations can maximize the benefits, and minimize       Cooling costs are a major component of today’s
     the risks of remote server access.                         IT budgets, and airflow planning is critical to data
                                                                center design. But one of the major causes of cooling
    The benefits of remote server access                        inefficiency is the service staff who open doors and
                                                                wander around the equipment racks, and who find
     Years ago, the idea of operating and maintaining           chilled server rooms uncomfortable. Remote access
     data centers remotely, or with “lights out” in the         allows server rooms to be isolated from physical
     server room, seemed radical. Now remote access             human interaction, for reduced energy consumption
     management is standard procedure. Why? Because             and longer equipment life
     remote server access offers three compelling
     advantages:                                               What is Remote Access?
     1. Increased data security
                                                                     Simply put, remote access is
     Remote server access reduces the number of people               the ability to log on to a network from
     who come into contact with critical data, and limits
                                                                     a remote location for data centers, it
     the number of servers that any individual has access
     to. With remote access, the data center can be locked
                                                                     means that IT personnel can connect
     tight and secured from unwanted, unattended visitors.           to and control the equipment in their
     This is a primary reason for the increase in popularity         data center from a remote location,
     of Remote Access Management solutions in security-
                                                                     generally over the Internet.
     critical sectors of business and government.




1
A Remote Access Management solution can
        dramatically cut the time needed to access and
        control servers and devices—increasing productivity,
        reducing downtime, and saving money.




Remote access tools for data centers                           multiple computers from a single desktop.
                                                               “KVM over IP” switches provide remote Access and
 For data centers and computer rooms, remote
                                                               control over multiple computers via the Internet.
 access tools fall into three general categories:
                                                               • a console server (or a console access server,
 1. In-band software: RDP, VNC, SSH, Telnetֿ
                                                               console management server, serial concentrator,
 • RDP, or Remote Desktop Protocol, is a Microsoft             or serial console server) provides remote serial
   proprietary protocol that allows a graphical view of a      access to network devices. It is, essentially, a KVM
   remote computer’s desktop.                                  switch for networking equipment.

 • VNC or Virtual Network Computing is similar to              • a PDU, or power distribution unit, distributes
   RDP, butֿ for non-Windows computers. It provides            electrical power to the servers and allows
   graphical desktop views and control of remote               remote monitoring of power-related data such
   computers.                                                  as temperature and amps used. Some IP PDUs
                                                               are switchable, meaning that the power can be
 • SSH or Secure Shell provides a secure channel for           remotely controlled.
   data sharing between remote computers.
                                                              3. Service Processors
 • TELNET is a text-based network protocol for
   two-way network communication using a                      A Service Processor is a hardware device that is either
   “virtual terminal” connection.                             plugged into a server or embedded on its motherboard.
                                                              It allows access to the server’s internal management
 These and other in-band tools are reliable, low cost or
                                                              processes; some of its features are similar to IP KVMs
 free, and in popular use. The limitation is that they are
                                                              and PDUs. Service Processors are available from the
 “in-band”—they can only access computers that are
                                                              various server manufacturers, e.g. iLO from HP, DRAC
 working properly (the operating system is running).
                                                              from Dell, RSA from IBM, and IPMI from Intel, which is
 RDP, for example, can’t view, let alone fix, a Windows
                                                              more of an open protocol.
 server with the dreaded “blue screen of death”.

 2.Out-of-band solutions: KVM, ConsoleServer,PDU
                                                             Remote Access Management tools:
                                                             maximizing the benefits, minimizing
 To go beyond the limits of in-band software, a              the risks
 hardware device is required. These devices are
 commonly available at commodity prices:                      While remote access tools are in common use, they
 • a KVM switch, (for keyboard-video-mouse) controls          have often been adopted gradually, one at a time,




                                                                                                                        2
often supplied by the manufacturers of the data           A Remote Access Management solution should
     center’s existing equipment. As a result, companies       restrict administrators to a single IP address and
     may be enjoying some gains, but they’re not likely        username—the address of the Remote Access
     to be maximizing their benefits. And they may have        Management interface itself. To access the servers,
     actually created new security risks.                      the administrator should use a web browser, where
                                                               they enter the IP and their username and password.
                                                               The system should then restrict them to only what
    What are the new security risks?
                                                               their status allows them to see.
     While remote server access can increase an
                                                               Some Remote Access Management systems go
     organization’s security, it can also create security
                                                               further, with authentication against AD or the like.
     gaps. Perhaps the most critical is in access
                                                               This allows the quick addition or deletion of approved
     management: the vast majority of organizations
                                                               users. With a spreadsheet or homegrown database,
     store their passwords, user names, IP addresses,
                                                               any change of users is a cumbersome manual process.
     server names and more in a single spreadsheet or
     homegrown database. This provides IT personnel
     with almost unrestricted access to security-critical
                                                              Measuring operational efficiency:
     data, even data that has no relevance to their           resolving critical issues faster
     tasks. Windows admins can see how to access               When a server goes down, business operations can
     Unix machines, network admins can see how to              be at risk. Resolution speed is what matters. And
     access servers etc. There is no benefit to this, and      with a spreadsheet or custom database, speed is a
     considerable security risk. All an employee, intern or    problem: first, the IT admin is notified of the issue.
     consultant needs to do is download the spreadsheet        Then they have to open the spreadsheet, locate the
     to a flash drive, and they can carry a corporation’s      name of the server, and copy and paste its IP address
     secrets out of the building.                              and password and username info. This can require
                                                               opening and closing browsers and applications—and
    The solution: task-appropriate acccess                     dozens of mouse clicks and many minutes, before a
                                                               device can be found and accessed.
     To improve corporate security, a Remote Access
     Management solution should limit servers and IT tools     Then, once the device is located they have to fix the
     to task-appropriate access. Windows admins should         problem. They may try an RDP solution and fail, and
     be able to access Windows servers only. Depending on      attempt a KVM fix—and the copy and paste process
     their tasks, one admin may only require RDP access        begins again. The downtime adds up. Over a typical
     to a server, but not power and KVM access.




3
when comparing Remote Access Management
        solutions, compare the complete costs of the
        deployment. The advantages are clear: you can
        maximize your security, increase operational
        efficiency and save on energy



 shift, the wasted minutes can add up to wasted hours         1. A centralized web-based dashboard
 of valuable work time.                                       For security and efficiency, the Remote Access
                                                              Management system should centralize access to
The solution: a minimum 6x faster                             servers and devices in a single web-based dashboard,
                                                              with a simple interface that enables one-click access
server access and resolution
                                                              to servers and devices, and restricts access to task-
 Minicom compared the mouse-clicks taken by IT                appropriate servers and tools.
 staff using RDP and a spreadsheet, to a web-based
                                                              2. Device and manufacturer agnostic
 Remote Access Management dashboard.
 In the best-case “spreadsheet” situation, it took 37         In today’s technology market, change is constant.
 clicks, simply to access a server. The Remote Access         To protect your investment, don’t choose a Remote
 Management software cut the number of clicks to six.ֿ        Access Management solution that restricts your
 That was a “test case”—the real-world situation is far       future equipment choices. You may have standardized
                                                              on one vendor’s servers, but you don’t want to be
 worse: generally, RDP is just the first line of attack. If
                                                              locked out, should a better server come on the
 the IT admin has to try KVM or iLO access and then a
                                                              market. Choose a system based on open standards,
 PDU, the number of clicks increases exponentially—           with the capability to monitor and control all major
 and if there’s a copy-and-paste error along the way,         vendors’ equipment.
 downtime jumps drastically.
                                                              3. Supports in-band, out-of- band and Service
      When a server goes down,                                Processor access
      business operations can be                              Your IT staff may use nothing but RDP today, but as
      at risk. Resolution speed                               you’ve read, there are major advantages to out-of-
      is what matters.                                        band access. Be sure that the system you choose will
                                                              allow your technical capabilities to grow, by allowing
                                                              the monitoring and control of out-of-band devices,
Critical factors for deploying a Remote                       Service Processors, and whatever new devices may
Access Management solution                                    appear in the future.
 If a company decides to adopt a Remote Access                4. Accommodates existing equipment
 Management solution, where do they begin? When
 comparing solutions and vendors, keep these                  A Remote Access Management solution does not
 “success factors” in mind:                                   necessarily require a “forklift upgrade”. Most data




                                                                                                                       4
centers are equipped various models of servers, from            Most data centers are equipped
    several manufacturers. Similarly, their PDUs, KVMs
                                                                    various models of servers, from
    and console servers have been acquired over time.
                                                                    several manufacturers.
    Some Remote Access Management systems require                   Similarly, their PDUs, KVMs
    you to replace your older gear—servers, PDUs,
    KVMs and/or console servers—or to purchase costly
                                                                    and console servers have been
    licenses in order to use the tools you already have             acquired over time.
    in place. Not only is this large-scale replacement
    costly and wasteful, it can cause massive disruption      A proven solution:
    to a company’s daily activities—for example,
                                                              AccessIT® from Minicom
    replacing PDUs could require a complete server
    shutdown, and likely a total interruption of business.    AccessIT from Minicom was designed from the ground
    And it’s not necessary. Solutions are available that      up to meet IT managers’ mission-critical requirements
    accommodate existing equipment and tools. While           for secure web-based, centralized remote access
    newer tools may add functionality, they can be brought    management.
    online in phases, without the costs and disruption of
    wholesale replacement.                                    AccessIT provides fast, secure, trouble-free access
                                                              to every aspect of a data center’s infrastructure, and
    When comparing Remote Access Management
    solutions, compare the complete costs of the              streamlines access to remote access tools such as
    deployment. The advantages are clear: you can             RDP and KVM. It supports all major manufacturers of
    maximize your security, increase operational              KVM switches, PDUs and console servers, and supports
    efficiency and save on energy. And with proper planning   the industry’s leading in-band and out-of-band remote
    a selection, you can minimize the complications and       access services, including RDP, VNC, VMWare, SSH,
    costs of the deployment, and ensure that the benefits     Telnet, HP iLO, KVM IP, and any proprietary web-based
    of Remote Access Management will continue into
                                                              or customized applications.
    the future.




5
For complete details, and to read
how major customers have deployed
Minicom solutions,
visit www.minicom.com

Mais conteúdo relacionado

Mais procurados

Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)johndorian555
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2lamcindoe
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms webhostingguy
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)sonnysonare
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderNovell
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseAcmePacket
 

Mais procurados (18)

Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Ldc
LdcLdc
Ldc
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the Enterprise
 

Destaque

Cie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiorCie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiors_mansilla
 
Wdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishWdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishJuan Carlos Cam Bernuy
 
Considerações gerais direito_ambiental
Considerações gerais direito_ambientalConsiderações gerais direito_ambiental
Considerações gerais direito_ambientalRamon Borges Figueira
 
Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.LoreDiazBaez
 
Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Martin Cardozo
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Destaque (8)

WCA Now
WCA NowWCA Now
WCA Now
 
Cie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiorCie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superior
 
Wdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishWdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanish
 
Cuadros
CuadrosCuadros
Cuadros
 
Considerações gerais direito_ambiental
Considerações gerais direito_ambientalConsiderações gerais direito_ambiental
Considerações gerais direito_ambiental
 
Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.
 
Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Fly magazine mosquero nº 32
Fly magazine mosquero nº 32
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Semelhante a Remote Access Management Increases Security and Efficiency

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Centerdavidzucker
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technologyferasfarag
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609sidramuoio
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
Client server computing
Client server computingClient server computing
Client server computingjorge cabiao
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.skarthi j
 

Semelhante a Remote Access Management Increases Security and Efficiency (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Center
 
Thin Client
Thin ClientThin Client
Thin Client
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
Client server computing
Client server computingClient server computing
Client server computing
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Remote Access Management Increases Security and Efficiency

  • 1. Using Remote Access Management TM to Increase Security and Improve Efficiency in Data Centers a white paper from Minicom
  • 2. Using Remote Access Management TM to Increase Security and Improve Efficiency in Data Centers a white paper from Minicom Executive summary 2. Improved operational efficiency In recent years, remote server access has become With remote access, your IT staff don’t have to be standard for corporate data centers however, many onsite, or even near the data center. Instead of data centers have adopted remote access strategies physically driving over or walking into a server room, gradually, on an ad-hoc basis, as technologies have they can fix a problem from their computer screen. evolved. As a result they are enjoying only partial In today’s economy, when IT departments can be benefits, and may have opened up unexpected understaffed and overworked, remote access means security gaps. With an overall strategy—and a doing more with less. software solution for system-wide Remote Access 3. Better cooling/power efficiency Management , such TM AccessIT® from Minicom, as corporations can maximize the benefits, and minimize Cooling costs are a major component of today’s the risks of remote server access. IT budgets, and airflow planning is critical to data center design. But one of the major causes of cooling The benefits of remote server access inefficiency is the service staff who open doors and wander around the equipment racks, and who find Years ago, the idea of operating and maintaining chilled server rooms uncomfortable. Remote access data centers remotely, or with “lights out” in the allows server rooms to be isolated from physical server room, seemed radical. Now remote access human interaction, for reduced energy consumption management is standard procedure. Why? Because and longer equipment life remote server access offers three compelling advantages: What is Remote Access? 1. Increased data security Simply put, remote access is Remote server access reduces the number of people the ability to log on to a network from who come into contact with critical data, and limits a remote location for data centers, it the number of servers that any individual has access to. With remote access, the data center can be locked means that IT personnel can connect tight and secured from unwanted, unattended visitors. to and control the equipment in their This is a primary reason for the increase in popularity data center from a remote location, of Remote Access Management solutions in security- generally over the Internet. critical sectors of business and government. 1
  • 3. A Remote Access Management solution can dramatically cut the time needed to access and control servers and devices—increasing productivity, reducing downtime, and saving money. Remote access tools for data centers multiple computers from a single desktop. “KVM over IP” switches provide remote Access and For data centers and computer rooms, remote control over multiple computers via the Internet. access tools fall into three general categories: • a console server (or a console access server, 1. In-band software: RDP, VNC, SSH, Telnetֿ console management server, serial concentrator, • RDP, or Remote Desktop Protocol, is a Microsoft or serial console server) provides remote serial proprietary protocol that allows a graphical view of a access to network devices. It is, essentially, a KVM remote computer’s desktop. switch for networking equipment. • VNC or Virtual Network Computing is similar to • a PDU, or power distribution unit, distributes RDP, butֿ for non-Windows computers. It provides electrical power to the servers and allows graphical desktop views and control of remote remote monitoring of power-related data such computers. as temperature and amps used. Some IP PDUs are switchable, meaning that the power can be • SSH or Secure Shell provides a secure channel for remotely controlled. data sharing between remote computers. 3. Service Processors • TELNET is a text-based network protocol for two-way network communication using a A Service Processor is a hardware device that is either “virtual terminal” connection. plugged into a server or embedded on its motherboard. It allows access to the server’s internal management These and other in-band tools are reliable, low cost or processes; some of its features are similar to IP KVMs free, and in popular use. The limitation is that they are and PDUs. Service Processors are available from the “in-band”—they can only access computers that are various server manufacturers, e.g. iLO from HP, DRAC working properly (the operating system is running). from Dell, RSA from IBM, and IPMI from Intel, which is RDP, for example, can’t view, let alone fix, a Windows more of an open protocol. server with the dreaded “blue screen of death”. 2.Out-of-band solutions: KVM, ConsoleServer,PDU Remote Access Management tools: maximizing the benefits, minimizing To go beyond the limits of in-band software, a the risks hardware device is required. These devices are commonly available at commodity prices: While remote access tools are in common use, they • a KVM switch, (for keyboard-video-mouse) controls have often been adopted gradually, one at a time, 2
  • 4. often supplied by the manufacturers of the data A Remote Access Management solution should center’s existing equipment. As a result, companies restrict administrators to a single IP address and may be enjoying some gains, but they’re not likely username—the address of the Remote Access to be maximizing their benefits. And they may have Management interface itself. To access the servers, actually created new security risks. the administrator should use a web browser, where they enter the IP and their username and password. The system should then restrict them to only what What are the new security risks? their status allows them to see. While remote server access can increase an Some Remote Access Management systems go organization’s security, it can also create security further, with authentication against AD or the like. gaps. Perhaps the most critical is in access This allows the quick addition or deletion of approved management: the vast majority of organizations users. With a spreadsheet or homegrown database, store their passwords, user names, IP addresses, any change of users is a cumbersome manual process. server names and more in a single spreadsheet or homegrown database. This provides IT personnel with almost unrestricted access to security-critical Measuring operational efficiency: data, even data that has no relevance to their resolving critical issues faster tasks. Windows admins can see how to access When a server goes down, business operations can Unix machines, network admins can see how to be at risk. Resolution speed is what matters. And access servers etc. There is no benefit to this, and with a spreadsheet or custom database, speed is a considerable security risk. All an employee, intern or problem: first, the IT admin is notified of the issue. consultant needs to do is download the spreadsheet Then they have to open the spreadsheet, locate the to a flash drive, and they can carry a corporation’s name of the server, and copy and paste its IP address secrets out of the building. and password and username info. This can require opening and closing browsers and applications—and The solution: task-appropriate acccess dozens of mouse clicks and many minutes, before a device can be found and accessed. To improve corporate security, a Remote Access Management solution should limit servers and IT tools Then, once the device is located they have to fix the to task-appropriate access. Windows admins should problem. They may try an RDP solution and fail, and be able to access Windows servers only. Depending on attempt a KVM fix—and the copy and paste process their tasks, one admin may only require RDP access begins again. The downtime adds up. Over a typical to a server, but not power and KVM access. 3
  • 5. when comparing Remote Access Management solutions, compare the complete costs of the deployment. The advantages are clear: you can maximize your security, increase operational efficiency and save on energy shift, the wasted minutes can add up to wasted hours 1. A centralized web-based dashboard of valuable work time. For security and efficiency, the Remote Access Management system should centralize access to The solution: a minimum 6x faster servers and devices in a single web-based dashboard, with a simple interface that enables one-click access server access and resolution to servers and devices, and restricts access to task- Minicom compared the mouse-clicks taken by IT appropriate servers and tools. staff using RDP and a spreadsheet, to a web-based 2. Device and manufacturer agnostic Remote Access Management dashboard. In the best-case “spreadsheet” situation, it took 37 In today’s technology market, change is constant. clicks, simply to access a server. The Remote Access To protect your investment, don’t choose a Remote Management software cut the number of clicks to six.ֿ Access Management solution that restricts your That was a “test case”—the real-world situation is far future equipment choices. You may have standardized on one vendor’s servers, but you don’t want to be worse: generally, RDP is just the first line of attack. If locked out, should a better server come on the the IT admin has to try KVM or iLO access and then a market. Choose a system based on open standards, PDU, the number of clicks increases exponentially— with the capability to monitor and control all major and if there’s a copy-and-paste error along the way, vendors’ equipment. downtime jumps drastically. 3. Supports in-band, out-of- band and Service When a server goes down, Processor access business operations can be Your IT staff may use nothing but RDP today, but as at risk. Resolution speed you’ve read, there are major advantages to out-of- is what matters. band access. Be sure that the system you choose will allow your technical capabilities to grow, by allowing the monitoring and control of out-of-band devices, Critical factors for deploying a Remote Service Processors, and whatever new devices may Access Management solution appear in the future. If a company decides to adopt a Remote Access 4. Accommodates existing equipment Management solution, where do they begin? When comparing solutions and vendors, keep these A Remote Access Management solution does not “success factors” in mind: necessarily require a “forklift upgrade”. Most data 4
  • 6. centers are equipped various models of servers, from Most data centers are equipped several manufacturers. Similarly, their PDUs, KVMs various models of servers, from and console servers have been acquired over time. several manufacturers. Some Remote Access Management systems require Similarly, their PDUs, KVMs you to replace your older gear—servers, PDUs, KVMs and/or console servers—or to purchase costly and console servers have been licenses in order to use the tools you already have acquired over time. in place. Not only is this large-scale replacement costly and wasteful, it can cause massive disruption A proven solution: to a company’s daily activities—for example, AccessIT® from Minicom replacing PDUs could require a complete server shutdown, and likely a total interruption of business. AccessIT from Minicom was designed from the ground And it’s not necessary. Solutions are available that up to meet IT managers’ mission-critical requirements accommodate existing equipment and tools. While for secure web-based, centralized remote access newer tools may add functionality, they can be brought management. online in phases, without the costs and disruption of wholesale replacement. AccessIT provides fast, secure, trouble-free access to every aspect of a data center’s infrastructure, and When comparing Remote Access Management solutions, compare the complete costs of the streamlines access to remote access tools such as deployment. The advantages are clear: you can RDP and KVM. It supports all major manufacturers of maximize your security, increase operational KVM switches, PDUs and console servers, and supports efficiency and save on energy. And with proper planning the industry’s leading in-band and out-of-band remote a selection, you can minimize the complications and access services, including RDP, VNC, VMWare, SSH, costs of the deployment, and ensure that the benefits Telnet, HP iLO, KVM IP, and any proprietary web-based of Remote Access Management will continue into or customized applications. the future. 5
  • 7. For complete details, and to read how major customers have deployed Minicom solutions, visit www.minicom.com