=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management July 2, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Take Advantage of the Nation's Leading Broadband Buying Service! http://searchNetworking.com/r/0,,15833,00.htm?speedanywhere ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Secure incoming connections on XP - MOM: Network management, Microsoft style - What's involved in risk assessment? 2. ESSENTIAL LINKS - Article: Preparing networks, and people, for times of trouble - Expert advice on network measurement/diagnostics - Chapter download: Reaping value from storage networks - The 2003 Networking Innovator Award Program - Networking Decisions Conference - Make plans to attend! ___________________________________________________________________ ****************>> Sponsored by Speed Anywhere <<****************** Take Advantage of the Nation's Leading Broadband Buying Service! If you need a T1, a T3, a VPN, or Frame Relay, you can benefit from our convenient One-Stop-Shop service. Speed Anywhere has helped over 15,000 businesses in their broadband buying decisions. We are affiliated with the leading national and regional broadband providers. Please fill-out our short form describing your needs, and receive custom quotes from multiple providers within 12 hours! Click here: http://searchNetworking.com/r/0,,15833,00.htm?speedanywhere =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP SECURE INCOMING CONNECTIONS ON XP by Barrie Sosinsky There may come a time that you want to set up remote access to a location that doesn't have a Windows 2000 or 2003 server. If that's the case, you can use Windows XP as a Remote Access Server, accepting incoming calls from outside clients. XP doesn't offer the same level of security that Windows RRAS does; you can't use call-back to authenticate a user for example. However, even simple incoming connections can be made a little more secure by using the encryption feature in XP's Incoming Connection Properties dialog box. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci912638,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= MOM: NETWORK MANAGEMENT, MICROSOFT STYLE | Robert J. Shimonski You've heard the buzz about managing your systems before. You know the big names in network management like NAI, Concord, IBM, HP, CA and their entire suites of products. What about Microsoft? The company's SMS (Systems Management Server) offers desktop and server management, but is far cry from a full-blown network management system (NMS) that catches and records traps and offers a wide range of network management utilities and services. Up until MOM, the Microsoft Operations Manager 2000, Microsoft was clearly lacking in this area. What does MOM do? Microsoft Operations Manager 2000 will provide your enterprise with quite a few helpful tools to manage your systems efficiently and effective. Let's look at some of the things MOM can help you accomplish: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci823053,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WHAT'S INVOLVED IN RISK ASSESSMENT? | Rick Cook Backing up so that you can recover in the event of untoward events, be they simple hardware failure or disasters, starts with assessment. A thorough risk assessment should point out vulnerabilities you can fix now, possibly heading off trouble, as well as providing a starting point for disaster recovery planning for the risks you can't fix. Click here to find out more about disaster recovery planning: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci888468,00.html ------------------------------------------------------------------- For more network and systems management tips and advice, visit the extensive tip library on SearchNetworking.com: http://searchnetworking.techtarget.com/tipsIndex/0,289482,sid7_tax289202_alpD_idx0,00.html ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FEATURED ARTICLE | SearchNetworking.com PREPARING NETWORKS, AND PEOPLE, FOR TIMES OF TROUBLE According to experts who spoke at CeBit America 2003, network planning and redundancy are vital in order to recover quickly from a disaster. IT organizations must also take special steps to protect their people. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci911058,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= EXPERT ADVICE | Network Measurement/Diagnostics In this recent Q&A, Loki Jorgenson, research director at jaalaM Technologies offers guidance on enterprise network monitoring requirements: http://searchnetworking.techtarget.com/ateQuestionNResponse/0,289625,sid7_cid537693_tax293255,00.html Click here to learn more about Dr. Jorgenson: http://searchnetworking.techtarget.com/ateExpertBio/0,289623,sid7_cid507001,00.html Click here to ask your network measurement/diagnostics question: http://searchnetworking.techtarget.com/ateQuestion/0,289624,sid7_cid507001_tax293255,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= REAPING VALUE FROM STORAGE NETWORKS | Chapter download The competitive business climate demands increasing data storage capabilities ranging from availability and recovery, to capacity management, to vendor aggregation. Multiprotocol storage networks serve all of these requirements in the form of block-based SANs or file-based NAS. As an enabling platform, networked storage naturally assumes a greater role in the cost and control of the overall storage infrastructure. This chapter excerpt from IP Storage Networking covers the cost component of the storage networking layer by looking at the strategic reasons to combine both defensive and offensive measures and the value achieved by doing so across a common networking platform. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci906158,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING INNOVATOR AWARDS | SearchNetworking.com Do you know someone who is an innovator in the field of networking? Take advantage of the opportunity to publicly acknowledge the networking contributions of someone you know. We are currently accepting nominations recognizing businesses that are blazing new trails in implementing and managing enterprise networks. This year we'll be focusing on two areas: 1) Network Trailblazer Award 2) Network Performance Pioneer Award The deadline for nominations for the Networking Innovator Awards is Monday, September 8, 2003. Click here for details and to submit your nomination: http://searchnetworking.techtarget.com/awards/0,293912,sid7,00.html Click here to see the profiles of the 2002 award winners: http://searchnetworking.techtarget.com/awardsPreviousWinners/0,293918,sid7,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING DECISIONS CONFERENCE | Atlanta, GA - Nov. 5-7, 2003 FEATURED SESSION: MAKE THE RIGHT DECISION OR RISK ZERO ROI If you have a network -- you should have an analyzer. Network slowdowns, outages, and security breaches can cost your organization much more than you may know. Your IT team spends precious time tracking these faults and security lapses using a hit-and-miss formula. Analyzers (such as X-Ray technology) provide your IT team with valuable visibility into the network. But you have to understand the key considerations. In this session, Laura A. Chappell, Founder, Sr. Protocol Analyst, Protocol Analysis Institute, will demonstrate the capabilities of several top analyzers and guide you through her ROI analysis to define the savings one of her top clients realized when implementing an analysis solution so you benefit from the same rewards at your own organization. Don't miss out. Register here: http://www.networkingdecisions.com/html/registration.htm ___________________________________________________________________ For more network and systems management tips and advice, visit the extensive tip library on SearchNetworking.com: http://searchnetworking.techtarget.com/tipsIndex/0,289482,sid7_tax289202_alpD_idx0,00.html ___________________________________________________________________ **************** SEARCHNETWORKING.COM CONTACTS ***************** SUSAN FOGARTY, Site Editor ([EMAIL PROTECTED]) >> Send your suggestions for tips and articles. ___________________________________________________________________ KARA GATTINE, Associate Site Editor ([EMAIL PROTECTED]) >> Send white papers, tips and best Web link recommendations. ___________________________________________________________________ ERIC B. PARIZO, News Editor ([EMAIL PROTECTED]) >> Send your product announcements and poll ideas. ___________________________________________________________________ JIM RENDON, News Writer ([EMAIL PROTECTED]) >> Send your press releases and story ideas. ___________________________________________________________________ GABRIELLE DERUSSY ([EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2003, All Rights Reserved. If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchNetworking.techtarget.com/register and adjust your subscriptions accordingly.If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.