SlideShare a Scribd company logo
1 of 7
Download to read offline
Using Remote Access Management     TM




to Increase Security and Improve
Efficiency in Data Centers
a white paper from Minicom
Using Remote Access Management
                                                                                                                  TM




    to Increase Security and Improve
    Efficiency in Data Centers
    a white paper from Minicom


    Executive summary                                           2. Improved operational efficiency

     In recent years, remote server access has become           With remote access, your IT staff don’t have to be
     standard for corporate data centers however, many          onsite, or even near the data center. Instead of
     data centers have adopted remote access strategies         physically driving over or walking into a server room,
     gradually, on an ad-hoc basis, as technologies have        they can fix a problem from their computer screen.
     evolved. As a result they are enjoying only partial        In today’s economy, when IT departments can be
     benefits, and may have opened up unexpected                understaffed and overworked, remote access means
     security gaps. With an overall strategy—and a              doing more with less.
     software solution for system-wide Remote Access
                                                                3. Better cooling/power efficiency
     Management , such TM AccessIT® from Minicom,
                            as
     corporations can maximize the benefits, and minimize       Cooling costs are a major component of today’s
     the risks of remote server access.                         IT budgets, and airflow planning is critical to data
                                                                center design. But one of the major causes of cooling
    The benefits of remote server access                        inefficiency is the service staff who open doors and
                                                                wander around the equipment racks, and who find
     Years ago, the idea of operating and maintaining           chilled server rooms uncomfortable. Remote access
     data centers remotely, or with “lights out” in the         allows server rooms to be isolated from physical
     server room, seemed radical. Now remote access             human interaction, for reduced energy consumption
     management is standard procedure. Why? Because             and longer equipment life
     remote server access offers three compelling
     advantages:                                               What is Remote Access?
     1. Increased data security
                                                                     Simply put, remote access is
     Remote server access reduces the number of people               the ability to log on to a network from
     who come into contact with critical data, and limits
                                                                     a remote location for data centers, it
     the number of servers that any individual has access
     to. With remote access, the data center can be locked
                                                                     means that IT personnel can connect
     tight and secured from unwanted, unattended visitors.           to and control the equipment in their
     This is a primary reason for the increase in popularity         data center from a remote location,
     of Remote Access Management solutions in security-
                                                                     generally over the Internet.
     critical sectors of business and government.




1
A Remote Access Management solution can
        dramatically cut the time needed to access and
        control servers and devices—increasing productivity,
        reducing downtime, and saving money.




Remote access tools for data centers                           multiple computers from a single desktop.
                                                               “KVM over IP” switches provide remote Access and
 For data centers and computer rooms, remote
                                                               control over multiple computers via the Internet.
 access tools fall into three general categories:
                                                               • a console server (or a console access server,
 1. In-band software: RDP, VNC, SSH, Telnetֿ
                                                               console management server, serial concentrator,
 • RDP, or Remote Desktop Protocol, is a Microsoft             or serial console server) provides remote serial
   proprietary protocol that allows a graphical view of a      access to network devices. It is, essentially, a KVM
   remote computer’s desktop.                                  switch for networking equipment.

 • VNC or Virtual Network Computing is similar to              • a PDU, or power distribution unit, distributes
   RDP, butֿ for non-Windows computers. It provides            electrical power to the servers and allows
   graphical desktop views and control of remote               remote monitoring of power-related data such
   computers.                                                  as temperature and amps used. Some IP PDUs
                                                               are switchable, meaning that the power can be
 • SSH or Secure Shell provides a secure channel for           remotely controlled.
   data sharing between remote computers.
                                                              3. Service Processors
 • TELNET is a text-based network protocol for
   two-way network communication using a                      A Service Processor is a hardware device that is either
   “virtual terminal” connection.                             plugged into a server or embedded on its motherboard.
                                                              It allows access to the server’s internal management
 These and other in-band tools are reliable, low cost or
                                                              processes; some of its features are similar to IP KVMs
 free, and in popular use. The limitation is that they are
                                                              and PDUs. Service Processors are available from the
 “in-band”—they can only access computers that are
                                                              various server manufacturers, e.g. iLO from HP, DRAC
 working properly (the operating system is running).
                                                              from Dell, RSA from IBM, and IPMI from Intel, which is
 RDP, for example, can’t view, let alone fix, a Windows
                                                              more of an open protocol.
 server with the dreaded “blue screen of death”.

 2.Out-of-band solutions: KVM, ConsoleServer,PDU
                                                             Remote Access Management tools:
                                                             maximizing the benefits, minimizing
 To go beyond the limits of in-band software, a              the risks
 hardware device is required. These devices are
 commonly available at commodity prices:                      While remote access tools are in common use, they
 • a KVM switch, (for keyboard-video-mouse) controls          have often been adopted gradually, one at a time,




                                                                                                                        2
often supplied by the manufacturers of the data           A Remote Access Management solution should
     center’s existing equipment. As a result, companies       restrict administrators to a single IP address and
     may be enjoying some gains, but they’re not likely        username—the address of the Remote Access
     to be maximizing their benefits. And they may have        Management interface itself. To access the servers,
     actually created new security risks.                      the administrator should use a web browser, where
                                                               they enter the IP and their username and password.
                                                               The system should then restrict them to only what
    What are the new security risks?
                                                               their status allows them to see.
     While remote server access can increase an
                                                               Some Remote Access Management systems go
     organization’s security, it can also create security
                                                               further, with authentication against AD or the like.
     gaps. Perhaps the most critical is in access
                                                               This allows the quick addition or deletion of approved
     management: the vast majority of organizations
                                                               users. With a spreadsheet or homegrown database,
     store their passwords, user names, IP addresses,
                                                               any change of users is a cumbersome manual process.
     server names and more in a single spreadsheet or
     homegrown database. This provides IT personnel
     with almost unrestricted access to security-critical
                                                              Measuring operational efficiency:
     data, even data that has no relevance to their           resolving critical issues faster
     tasks. Windows admins can see how to access               When a server goes down, business operations can
     Unix machines, network admins can see how to              be at risk. Resolution speed is what matters. And
     access servers etc. There is no benefit to this, and      with a spreadsheet or custom database, speed is a
     considerable security risk. All an employee, intern or    problem: first, the IT admin is notified of the issue.
     consultant needs to do is download the spreadsheet        Then they have to open the spreadsheet, locate the
     to a flash drive, and they can carry a corporation’s      name of the server, and copy and paste its IP address
     secrets out of the building.                              and password and username info. This can require
                                                               opening and closing browsers and applications—and
    The solution: task-appropriate acccess                     dozens of mouse clicks and many minutes, before a
                                                               device can be found and accessed.
     To improve corporate security, a Remote Access
     Management solution should limit servers and IT tools     Then, once the device is located they have to fix the
     to task-appropriate access. Windows admins should         problem. They may try an RDP solution and fail, and
     be able to access Windows servers only. Depending on      attempt a KVM fix—and the copy and paste process
     their tasks, one admin may only require RDP access        begins again. The downtime adds up. Over a typical
     to a server, but not power and KVM access.




3
when comparing Remote Access Management
        solutions, compare the complete costs of the
        deployment. The advantages are clear: you can
        maximize your security, increase operational
        efficiency and save on energy



 shift, the wasted minutes can add up to wasted hours         1. A centralized web-based dashboard
 of valuable work time.                                       For security and efficiency, the Remote Access
                                                              Management system should centralize access to
The solution: a minimum 6x faster                             servers and devices in a single web-based dashboard,
                                                              with a simple interface that enables one-click access
server access and resolution
                                                              to servers and devices, and restricts access to task-
 Minicom compared the mouse-clicks taken by IT                appropriate servers and tools.
 staff using RDP and a spreadsheet, to a web-based
                                                              2. Device and manufacturer agnostic
 Remote Access Management dashboard.
 In the best-case “spreadsheet” situation, it took 37         In today’s technology market, change is constant.
 clicks, simply to access a server. The Remote Access         To protect your investment, don’t choose a Remote
 Management software cut the number of clicks to six.ֿ        Access Management solution that restricts your
 That was a “test case”—the real-world situation is far       future equipment choices. You may have standardized
                                                              on one vendor’s servers, but you don’t want to be
 worse: generally, RDP is just the first line of attack. If
                                                              locked out, should a better server come on the
 the IT admin has to try KVM or iLO access and then a
                                                              market. Choose a system based on open standards,
 PDU, the number of clicks increases exponentially—           with the capability to monitor and control all major
 and if there’s a copy-and-paste error along the way,         vendors’ equipment.
 downtime jumps drastically.
                                                              3. Supports in-band, out-of- band and Service
      When a server goes down,                                Processor access
      business operations can be                              Your IT staff may use nothing but RDP today, but as
      at risk. Resolution speed                               you’ve read, there are major advantages to out-of-
      is what matters.                                        band access. Be sure that the system you choose will
                                                              allow your technical capabilities to grow, by allowing
                                                              the monitoring and control of out-of-band devices,
Critical factors for deploying a Remote                       Service Processors, and whatever new devices may
Access Management solution                                    appear in the future.
 If a company decides to adopt a Remote Access                4. Accommodates existing equipment
 Management solution, where do they begin? When
 comparing solutions and vendors, keep these                  A Remote Access Management solution does not
 “success factors” in mind:                                   necessarily require a “forklift upgrade”. Most data




                                                                                                                       4
centers are equipped various models of servers, from            Most data centers are equipped
    several manufacturers. Similarly, their PDUs, KVMs
                                                                    various models of servers, from
    and console servers have been acquired over time.
                                                                    several manufacturers.
    Some Remote Access Management systems require                   Similarly, their PDUs, KVMs
    you to replace your older gear—servers, PDUs,
    KVMs and/or console servers—or to purchase costly
                                                                    and console servers have been
    licenses in order to use the tools you already have             acquired over time.
    in place. Not only is this large-scale replacement
    costly and wasteful, it can cause massive disruption      A proven solution:
    to a company’s daily activities—for example,
                                                              AccessIT® from Minicom
    replacing PDUs could require a complete server
    shutdown, and likely a total interruption of business.    AccessIT from Minicom was designed from the ground
    And it’s not necessary. Solutions are available that      up to meet IT managers’ mission-critical requirements
    accommodate existing equipment and tools. While           for secure web-based, centralized remote access
    newer tools may add functionality, they can be brought    management.
    online in phases, without the costs and disruption of
    wholesale replacement.                                    AccessIT provides fast, secure, trouble-free access
                                                              to every aspect of a data center’s infrastructure, and
    When comparing Remote Access Management
    solutions, compare the complete costs of the              streamlines access to remote access tools such as
    deployment. The advantages are clear: you can             RDP and KVM. It supports all major manufacturers of
    maximize your security, increase operational              KVM switches, PDUs and console servers, and supports
    efficiency and save on energy. And with proper planning   the industry’s leading in-band and out-of-band remote
    a selection, you can minimize the complications and       access services, including RDP, VNC, VMWare, SSH,
    costs of the deployment, and ensure that the benefits     Telnet, HP iLO, KVM IP, and any proprietary web-based
    of Remote Access Management will continue into
                                                              or customized applications.
    the future.




5
For complete details, and to read
how major customers have deployed
Minicom solutions,
visit www.minicom.com

More Related Content

What's hot

Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)johndorian555
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2lamcindoe
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms webhostingguy
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)sonnysonare
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderNovell
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseAcmePacket
 

What's hot (18)

Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Ldc
LdcLdc
Ldc
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms Virtual Server Web Hosting Supplementary Terms
Virtual Server Web Hosting Supplementary Terms
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the Enterprise
 

Viewers also liked

Cie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiorCie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiors_mansilla
 
Wdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishWdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishJuan Carlos Cam Bernuy
 
Considerações gerais direito_ambiental
Considerações gerais direito_ambientalConsiderações gerais direito_ambiental
Considerações gerais direito_ambientalRamon Borges Figueira
 
Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.LoreDiazBaez
 
Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Martin Cardozo
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Viewers also liked (8)

WCA Now
WCA NowWCA Now
WCA Now
 
Cie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superiorCie cap evaluacion_en_la_educacion_superior
Cie cap evaluacion_en_la_educacion_superior
 
Wdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanishWdrc 2008-2009-information-kit-spanish
Wdrc 2008-2009-information-kit-spanish
 
Cuadros
CuadrosCuadros
Cuadros
 
Considerações gerais direito_ambiental
Considerações gerais direito_ambientalConsiderações gerais direito_ambiental
Considerações gerais direito_ambiental
 
Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.Presentacion Las Emociones L.D.B.
Presentacion Las Emociones L.D.B.
 
Fly magazine mosquero nº 32
Fly magazine mosquero nº 32Fly magazine mosquero nº 32
Fly magazine mosquero nº 32
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to Remote Access Management Increases Security and Efficiency

Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Centerdavidzucker
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technologyferasfarag
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609sidramuoio
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
Client server computing
Client server computingClient server computing
Client server computingjorge cabiao
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.skarthi j
 

Similar to Remote Access Management Increases Security and Efficiency (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Center
 
Thin Client
Thin ClientThin Client
Thin Client
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
Client server computing
Client server computingClient server computing
Client server computing
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Remote Access Management Increases Security and Efficiency

  • 1. Using Remote Access Management TM to Increase Security and Improve Efficiency in Data Centers a white paper from Minicom
  • 2. Using Remote Access Management TM to Increase Security and Improve Efficiency in Data Centers a white paper from Minicom Executive summary 2. Improved operational efficiency In recent years, remote server access has become With remote access, your IT staff don’t have to be standard for corporate data centers however, many onsite, or even near the data center. Instead of data centers have adopted remote access strategies physically driving over or walking into a server room, gradually, on an ad-hoc basis, as technologies have they can fix a problem from their computer screen. evolved. As a result they are enjoying only partial In today’s economy, when IT departments can be benefits, and may have opened up unexpected understaffed and overworked, remote access means security gaps. With an overall strategy—and a doing more with less. software solution for system-wide Remote Access 3. Better cooling/power efficiency Management , such TM AccessIT® from Minicom, as corporations can maximize the benefits, and minimize Cooling costs are a major component of today’s the risks of remote server access. IT budgets, and airflow planning is critical to data center design. But one of the major causes of cooling The benefits of remote server access inefficiency is the service staff who open doors and wander around the equipment racks, and who find Years ago, the idea of operating and maintaining chilled server rooms uncomfortable. Remote access data centers remotely, or with “lights out” in the allows server rooms to be isolated from physical server room, seemed radical. Now remote access human interaction, for reduced energy consumption management is standard procedure. Why? Because and longer equipment life remote server access offers three compelling advantages: What is Remote Access? 1. Increased data security Simply put, remote access is Remote server access reduces the number of people the ability to log on to a network from who come into contact with critical data, and limits a remote location for data centers, it the number of servers that any individual has access to. With remote access, the data center can be locked means that IT personnel can connect tight and secured from unwanted, unattended visitors. to and control the equipment in their This is a primary reason for the increase in popularity data center from a remote location, of Remote Access Management solutions in security- generally over the Internet. critical sectors of business and government. 1
  • 3. A Remote Access Management solution can dramatically cut the time needed to access and control servers and devices—increasing productivity, reducing downtime, and saving money. Remote access tools for data centers multiple computers from a single desktop. “KVM over IP” switches provide remote Access and For data centers and computer rooms, remote control over multiple computers via the Internet. access tools fall into three general categories: • a console server (or a console access server, 1. In-band software: RDP, VNC, SSH, Telnetֿ console management server, serial concentrator, • RDP, or Remote Desktop Protocol, is a Microsoft or serial console server) provides remote serial proprietary protocol that allows a graphical view of a access to network devices. It is, essentially, a KVM remote computer’s desktop. switch for networking equipment. • VNC or Virtual Network Computing is similar to • a PDU, or power distribution unit, distributes RDP, butֿ for non-Windows computers. It provides electrical power to the servers and allows graphical desktop views and control of remote remote monitoring of power-related data such computers. as temperature and amps used. Some IP PDUs are switchable, meaning that the power can be • SSH or Secure Shell provides a secure channel for remotely controlled. data sharing between remote computers. 3. Service Processors • TELNET is a text-based network protocol for two-way network communication using a A Service Processor is a hardware device that is either “virtual terminal” connection. plugged into a server or embedded on its motherboard. It allows access to the server’s internal management These and other in-band tools are reliable, low cost or processes; some of its features are similar to IP KVMs free, and in popular use. The limitation is that they are and PDUs. Service Processors are available from the “in-band”—they can only access computers that are various server manufacturers, e.g. iLO from HP, DRAC working properly (the operating system is running). from Dell, RSA from IBM, and IPMI from Intel, which is RDP, for example, can’t view, let alone fix, a Windows more of an open protocol. server with the dreaded “blue screen of death”. 2.Out-of-band solutions: KVM, ConsoleServer,PDU Remote Access Management tools: maximizing the benefits, minimizing To go beyond the limits of in-band software, a the risks hardware device is required. These devices are commonly available at commodity prices: While remote access tools are in common use, they • a KVM switch, (for keyboard-video-mouse) controls have often been adopted gradually, one at a time, 2
  • 4. often supplied by the manufacturers of the data A Remote Access Management solution should center’s existing equipment. As a result, companies restrict administrators to a single IP address and may be enjoying some gains, but they’re not likely username—the address of the Remote Access to be maximizing their benefits. And they may have Management interface itself. To access the servers, actually created new security risks. the administrator should use a web browser, where they enter the IP and their username and password. The system should then restrict them to only what What are the new security risks? their status allows them to see. While remote server access can increase an Some Remote Access Management systems go organization’s security, it can also create security further, with authentication against AD or the like. gaps. Perhaps the most critical is in access This allows the quick addition or deletion of approved management: the vast majority of organizations users. With a spreadsheet or homegrown database, store their passwords, user names, IP addresses, any change of users is a cumbersome manual process. server names and more in a single spreadsheet or homegrown database. This provides IT personnel with almost unrestricted access to security-critical Measuring operational efficiency: data, even data that has no relevance to their resolving critical issues faster tasks. Windows admins can see how to access When a server goes down, business operations can Unix machines, network admins can see how to be at risk. Resolution speed is what matters. And access servers etc. There is no benefit to this, and with a spreadsheet or custom database, speed is a considerable security risk. All an employee, intern or problem: first, the IT admin is notified of the issue. consultant needs to do is download the spreadsheet Then they have to open the spreadsheet, locate the to a flash drive, and they can carry a corporation’s name of the server, and copy and paste its IP address secrets out of the building. and password and username info. This can require opening and closing browsers and applications—and The solution: task-appropriate acccess dozens of mouse clicks and many minutes, before a device can be found and accessed. To improve corporate security, a Remote Access Management solution should limit servers and IT tools Then, once the device is located they have to fix the to task-appropriate access. Windows admins should problem. They may try an RDP solution and fail, and be able to access Windows servers only. Depending on attempt a KVM fix—and the copy and paste process their tasks, one admin may only require RDP access begins again. The downtime adds up. Over a typical to a server, but not power and KVM access. 3
  • 5. when comparing Remote Access Management solutions, compare the complete costs of the deployment. The advantages are clear: you can maximize your security, increase operational efficiency and save on energy shift, the wasted minutes can add up to wasted hours 1. A centralized web-based dashboard of valuable work time. For security and efficiency, the Remote Access Management system should centralize access to The solution: a minimum 6x faster servers and devices in a single web-based dashboard, with a simple interface that enables one-click access server access and resolution to servers and devices, and restricts access to task- Minicom compared the mouse-clicks taken by IT appropriate servers and tools. staff using RDP and a spreadsheet, to a web-based 2. Device and manufacturer agnostic Remote Access Management dashboard. In the best-case “spreadsheet” situation, it took 37 In today’s technology market, change is constant. clicks, simply to access a server. The Remote Access To protect your investment, don’t choose a Remote Management software cut the number of clicks to six.ֿ Access Management solution that restricts your That was a “test case”—the real-world situation is far future equipment choices. You may have standardized on one vendor’s servers, but you don’t want to be worse: generally, RDP is just the first line of attack. If locked out, should a better server come on the the IT admin has to try KVM or iLO access and then a market. Choose a system based on open standards, PDU, the number of clicks increases exponentially— with the capability to monitor and control all major and if there’s a copy-and-paste error along the way, vendors’ equipment. downtime jumps drastically. 3. Supports in-band, out-of- band and Service When a server goes down, Processor access business operations can be Your IT staff may use nothing but RDP today, but as at risk. Resolution speed you’ve read, there are major advantages to out-of- is what matters. band access. Be sure that the system you choose will allow your technical capabilities to grow, by allowing the monitoring and control of out-of-band devices, Critical factors for deploying a Remote Service Processors, and whatever new devices may Access Management solution appear in the future. If a company decides to adopt a Remote Access 4. Accommodates existing equipment Management solution, where do they begin? When comparing solutions and vendors, keep these A Remote Access Management solution does not “success factors” in mind: necessarily require a “forklift upgrade”. Most data 4
  • 6. centers are equipped various models of servers, from Most data centers are equipped several manufacturers. Similarly, their PDUs, KVMs various models of servers, from and console servers have been acquired over time. several manufacturers. Some Remote Access Management systems require Similarly, their PDUs, KVMs you to replace your older gear—servers, PDUs, KVMs and/or console servers—or to purchase costly and console servers have been licenses in order to use the tools you already have acquired over time. in place. Not only is this large-scale replacement costly and wasteful, it can cause massive disruption A proven solution: to a company’s daily activities—for example, AccessIT® from Minicom replacing PDUs could require a complete server shutdown, and likely a total interruption of business. AccessIT from Minicom was designed from the ground And it’s not necessary. Solutions are available that up to meet IT managers’ mission-critical requirements accommodate existing equipment and tools. While for secure web-based, centralized remote access newer tools may add functionality, they can be brought management. online in phases, without the costs and disruption of wholesale replacement. AccessIT provides fast, secure, trouble-free access to every aspect of a data center’s infrastructure, and When comparing Remote Access Management solutions, compare the complete costs of the streamlines access to remote access tools such as deployment. The advantages are clear: you can RDP and KVM. It supports all major manufacturers of maximize your security, increase operational KVM switches, PDUs and console servers, and supports efficiency and save on energy. And with proper planning the industry’s leading in-band and out-of-band remote a selection, you can minimize the complications and access services, including RDP, VNC, VMWare, SSH, costs of the deployment, and ensure that the benefits Telnet, HP iLO, KVM IP, and any proprietary web-based of Remote Access Management will continue into or customized applications. the future. 5
  • 7. For complete details, and to read how major customers have deployed Minicom solutions, visit www.minicom.com