This website uses cookies to ensure you have the best experience. Learn more

Corporate Network Management Essay

2150 words - 9 pages

Corporate Networks in organisations can be complex structures that “requires a great deal of attention” (Clemm 2007). Even small companies can have quite complex networks that are a considerable investment to the business. The notion that corporate network management is a cost to a business rather than a continual beneficial investment is a naive assumption that requires further investigation to the benefits that network management brings. Clemm (Clemm 2007) states in his text that the ultimate goal of network management “is to reduce and minimize total cost of ownership”, improving operational efficiency and lowering cost. Clemm (Clemm 2007) also notes that “Network Management is not just related to cost and quality”, which will be an continual concept presented throughout the report. The report will address key issues with corporate network management and ultimately argue and justify that corporate network management must be seen as a positive benefit to the business and not as a continual expense. The supporting articles will also provide sound evidence that networking is crucial to a business’s processes and production which can be seen from the OpenSSL Heartbleed Security vulnerability fiasco (Nieva 2014) or the QANTAS Amadeus system failure (Heasley 2012).
Networks in organisation are dynamic and complex entities which can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout the network, thus it is crucial to monitor the network to prevent problems (Kim & Feamster 2013)
In today’s rigid and competitive market, being pro-active to customer/supplier demand is a crucial factor in the success and growth of an organisation. The network foundation within an organisation is considered to be of the most critical resources in an organisation in all fields of the public and private sector. For example Fuji Xerox Document Management Solutions utilise their network to receive and process data from customers, without network management Fuji Xerox could potentially lose clients and receive fines for not meeting SLAs. Corporate computer networks are created to provide a means of transmitting essential data, from one device to another. The capacity, accuracy, and speed of these business transactions for organisations are vital to their success. Disruptions in the network result in the failure to process business transactions which are costly to the business. The QANTAS Amadeus system failure saw many flights across the globe delayed for a period of time (Heasley 2012). The outage was not only a huge expense but also a blow to the reputation of QANTAS. The widespread use of networks extends the reach of...

Find Another Essay On Corporate Network Management

Network Security Essay

1286 words - 5 pages , inventory management, etc. (Network 1) In a world considered perfect, companies would be able to combine all of their computer systems together both new and old (Network 1). Expenses make it difficult to totally replace old systems with new ones. Beyond the purely financial costs involved, doing so often requires retraining thousands of employees and making changes to long-established systems and processes. The bad thing about many legacy systems

Attitude and Perception of Selected De La Salle Lipa Marketing Students in Networking

953 words - 4 pages More than 73 years had passed when network marketing was originated and being discovered and has proved by the time being the home-based business opportunities and a successful distribution model. It is now being used by several groups of companies as their way to anyone who aims to have achievements by the future. It is not surprising that network marketing has reputed as the fastest growing industries of all time. It was truly a success and an

Corporate Governance and Management of Small Business Enterprise: An Executive Summary

1512 words - 6 pages Shea (2006), in quoting the work of Steiner & Steiner (2006) explained that corporate governance is generally referred to overall control of activities in a corporation that involves the formulation of corporate objectives, strategies, and plans and the proper management structure in order to be responsible to its various stakeholders. Since the 1990s, the term corporate governance has become a business jargon around the world. The

Incident Handling Process of a DDoS Attack

1797 words - 7 pages flows back and forth. By limiting a hacker’s ability to identify the resources within a network and their internal addresses, their ability to carry out a successful attack is extremely limited. Non-technical solutions aimed at preventing network attacks start with a strong security policy, coupled with internal programs promoting employee security awareness. Corporate policies should be comprehensive in identifying acceptable uses of

Choosing the Correct Networking Devices

1184 words - 5 pages VLans. Switch use a combination of software and hardware to switch packets between computers and other devices on the network. When computer directly connected to switch, it can share dedicated amount of bandwidth with other device that connected to the switch. Switch are included under the Star Topology. If a failure of on devices will not stop the network under the switch device. Some switch are embedded under Simple Network Management Protocol or

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages company's information, and you need to make sure to safeguard it. If the device doesn't support passwords, it doesn't belong on your network. Recovery The next step is recovery. The extent of the damage and your chosen method for eradication will help dictate recovery. Most corporate networks simply require reformatting and reloading the systems, applying the appropriate patches, and restoring the data from a known good backup. If the problem

Virtual Private Networks

4352 words - 18 pages Area Network (LAN) and 2) Site to Site Access, which connects remote location's LAN's together in a safe and secure manner.Remote Access VPN connections allow users to connect to their corporate network via a corporate server using the routing infrastructure provided by a public network, such as the Internet. Companies that have remote salesmen who travel widely to customer sites can benefit greatly when their salesmen have immediate secure access

Intorduction To IT Security

1201 words - 5 pages potentially harmful entities. The Handbook of Information Security Management tells us that there are a number of ways to identify, analyze, and assess risk. In developing a plan to secure a network there are many areas to focus on. One of them is risk, and the potential for risks should be addressed and plans and procedures developed to mitigate such risks. Risks can come in the form of external and internal threats. Whether of a physical

Securing networks

2340 words - 9 pages . A perfect example of this would be the system administrator blocking access to regedit via the cmd.exe but forgetting about regedt32.This is where the link in the second above paragraph comes in handy. You will need to segment your network into various groups, and then decide with management what those groups of users should have access to. Take for instance the management group, which could be composed of the company's executives. One measure

Network Security Practices

810 words - 3 pages Today’s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the

The Role of Collaborative Communication

1285 words - 5 pages of relationship market. Journal of Marketing, volume 58, 20-38. Paulraj, A., Labo, A.A. and Chen I.J. (2008). Inter-organizational communication as a relational competency: Antecedents and performance outcomes in collaborative buyer-supplier relationship. Journal of Operations Management, volume 26, 45-64. Peppard, J and Rylander, A. (2006). From value chain to value network: insight for mobile operators. European Management Journal, volume 24, 128-141. Prahinski, Carol, and Benton, W.C. (2004). Supplier evaluations: communication strategies to improve supplier performance. Journal of Operations Management, volume 22, 39-62.

Similar Essays

Corporate Network Management – Where Is The Business Case? Sim Essay

2020 words - 9 pages management are commonly found in companies that utilised network in their business. Network management tools are easily accessible to corporate who wish to improve their network infrastructure. While some corporate will consider to develop their own network management system. In this case study, we will be studying about corporate network management at Cisco, which developed on their own. Oracle, which purchased the network management from other

Networks And Modern Communications Essay

3036 words - 12 pages networking possibilities. These possibilities will in turn give rise to new networking practices that will guide the evolution of the network infrastructure. The first trend is associated with the digitization of the network. Increasing the system's intelligence permits increasing differentiation of network performance, of service or application choices, and ever more intimate management and control. Of these, perhaps the most momentous has been

Remote Access Solutions Essay

1415 words - 6 pages is accomplished through a data link. The only difference between a remote user and workstations connected directly to the network is slower data transfer speeds. Remote Access is also useful when you want to connect local office computers with corporate networks. This allows the business to share resources as if all computers are connected to the same LAN. Two common methods of providing this type of remote access are dial-up and Virtual Private

Bead Bar: Computer Network Design: Network Topology And Architecture

1543 words - 6 pages associates a firmer grasp on sales•To be able to gather more data to be used for marketing campaignsEssentially, the list could be never-ending. Hence, the design of a network plan is essential for providing Bead Bar employees with the best network system that will enable Bead Bar affiliates access to the corporate network from anywhere in the country. According to Information Systems Technology (2005)…Organizations should also consider how