test

Create: mer 20/12/2023 - 09:12
Author: admin

The Network Gear forms a complex ecosystem comprising various components, each serving distinct functions and roles. This includes Routers, which act as traffic directors, connecting and facilitating communication between different networks. Switches optimize local network efficiency by forwarding data only to the intended devices based on MAC addresses. Wireless Access points extend network connectivity wirelessly to devices such as laptops and smartphones. Additionally, Load Balancers contribute to the orchestration by distributing incoming network traffic across multiple servers. This optimizes resource utilization, enhances performance, and ensures high availability, among other functions etc.

On the other hand, Network Security is composed of an array of components that collaborate to fortify digital environments against potential threats, each serving distinct functions and roles. Firewalls, for instance, primarily enforce access policies and inspect traffic for anomalies, thus erecting a resilient barrier against unauthorized access. Proxy add an additional layer of protection with their intermediary capabilities, filtering content, controlling access, and safeguarding user identities. These devices, integral to the security apparatus, are intricately tailored to meet the unique security demands, contributing to the creation of a fortified network infrastructure that prioritizes both connectivity and defense. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) act as vigilant guardians, detecting and responding to suspicious activities and bolstering the network against emerging cyber threats, among other functions etc.

All components are detailed in the glossary of information entities section, which is dedicated to this particular area.

/!\ It should be noted that, unlike ServiceNow, we have conceptualized Network Security to clearly define its functions and roles. As a reminder, in ServiceNow everything Network and Security Device falls under the Network Gear component, and network devices are differentiated at the attribute level.

---

• We start this description by focusing on requirements (1) that can be classified into two distinct categories: Business requirements, which related to project-specific needs, and Datacenter Capacity Planning requirements.

• These requirements act as triggers for Network Capacity devices (2), which are materialized through IT Ticket (3) in ServiceNow.

• These IT tickets for capacity requirements are linked to procurement information (supplier, manufacturer) and aligned with standard technologies

• The Network device has an Order information and encompass all the information from procurement process.

• Le network devise qui est soit un software ou hardware donc un it asset est inventorise dans Easynet (NW) avec un contrat de maintenanace, des vulnerability suivi , et osuivi de ‘obsolescnce

• Une organisation est assignée a ce security devie ; une propritéirs, etc.

Désactivé