Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Liberating network management: Your first line of cyber defense

By Todd Rychecky
Understanding the Distinct and Dependent Roles of Data, Privacy and Cybersecurity Professionals
November 10, 2020

Cybersecurity breaches are an all-too-common and ever-evolving threat that every organization should be prepared for. But as digital ecosystems evolve to support new innovations and an increasing number of connected devices, so does the complexity of managing and securing critical network infrastructure.

Each new remote data center or SD-WAN router brings with it a new vector for attacks that could hijack an entire ecosystem and hold it hostage. This means that while malicious actors continue to grow in sophistication, the chances for them to exploit common vulnerabilities like config errors, bad updates or clicked ransomware links also multiply exponentially.

If organizations and their networks are not resilient, they can find themselves suddenly scrambling when a breach occurs. Adding fuel to the fire, the costs of an outage can be catastrophic. In fact, a recent Opengear survey revealed that nearly 1/3 of organizations lose over $1 million due to network outages each year.

This year alone, we’ve already seen many major incidents impacting enterprises, critical industries and major social movements alike. For instance, hackers exploited a major directory traversal bug, massive breaches to healthcare systems sent them back to paper-based operations, and election data sharing software has been targeted by phishing scams.

What can be done to prevent attacks and protect sensitive data and critical infrastructure? One of the first and most critical steps to improving security is to ensure network management operates independently from the production network.

This practice not only ensures the keys to the kingdom remain safe and only in the hands of those who should have access, but also can help future-proof an organization’s entire network, reduce operational costs such as truck rolls, and greatly increase resilience across the network to reduce outages and improve uptime.

 

The case for liberating networks

Managing the network on the primary production network is a recipe for disaster, yet all too often is an afterthought for those managing a network. When network management is housed alongside user data traffic and control commands, organizations expose themselves to attacks from anywhere or anyone that can connect to a vulnerable device. Making matters worse, management can quickly get locked out during disruptions and cyber-attacks, meaning outages last longer and have a greater impact on total costs. Even something as simple as a malicious Twitter link, for example, can open the door for data theft, malicious code or lengthy downtime periods.

By implementing a separate network management connection to reach console ports, called out-of-band (OOB) management, network admins or engineers can reach any edge or core location in a network, no matter the status of the production network. This simple step can improve visibility into the status of devices, enable real-time problem resolution to improve remediation, and ultimately thwart a security breach.

 

“Is LTE right for me?”

When establishing a separate management plane, one of the most common questions stakeholders ask is, “Should I use a cellular connection or not, and if I use a cellular connection, will it be secure?” The answer is yes, a cellular connection can be highly secure, as long as precautionary measures are taken, such as IPsec VPN tunnels and other protocols.

Of course, there are other options too. Some might use a cable modem, while others might use a second Ethernet interface built on a separate network entirely. However, a cellular network is generally more flexible, especially for geographically dispersed networks, and is simpler to use and scale. By utilizing a 4G LTE connection, organizations can also benefit from a plethora of smart capabilities, such as proactive monitoring and alerts, automatic failover and near-instant remediation.

Cellular also enables instantaneous setup, especially when compared to other methods. For instance, it could take weeks to install an MPLS circuit for your independent management plane, but a cellular, data plan is very easy to activate and can be done in hours from a remote location.

 

A “smart” management plane

Separating the management plane to protect core data center operations has always been critical for network security and management. But as IoT and other innovations increase the need for edge computing, organizations now have to manage a plethora of geographically dispersed network nodes which can act as additional points of failure or vectors for a malicious actor to breach.

A more edge-heavy environment also means the costs of downtime and truck rolls will rise, while vulnerabilities increase. Therefore, those who can implement a separate management plane with smart capabilities will have a competitive advantage.

These capabilities include the ability to implement and quickly improve upon network automation functions – a key factor in costs savings and reducing human error. This can be done on a separate management plane with the inclusion of tools that support NetOps (or DevOps for networking), like Ansible, GitHub, Puppet and Chef for configuration; Docker and Kubernetes for storage; Splunk for monitoring and alerting; Google, Microsoft Azure and AWS for cloud management; and Python and other APIs for coding.

By providing these tools on a separate management plane, organizations can rapidly and securely roll-out applications for always-on remote provisioning and NetOps automation. This means continuous event logging and back-up procedures can all be automated, and new site configurations can be completed instantaneously via processes like zero-touch provisioning, which eliminates needs for on-site setup.

 

What are you waiting for?

While a capable separate network management plane greatly increases network resilience, there are still those who haven’t adopted such an approach. For many, the value of the technology is not evident until its need is necessitated by crisis. For others, they may try to make do with a legacy OOB server that is not scalable, has very limited capabilities, or relies on outdated firmware.

Large organizations and small to mid-sized enterprises alike can all fall prey to complacency in regard to network resilience. Hacker sophistication and our dependence on digital environments continually increases, so why open the door for downtime and breaches that can spell disaster? Those who act sooner rather than later will be better equipped to handle today’s and tomorrow’s security vulnerabilities.

 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security data breach ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Todd rychecky

Todd Rychecky is VP of Americas for Opengear, responsible for developing and executing sales strategies, multiple business initiatives, hiring and talent development, setting performance goals and growing the business. He joined the company in 2008 and was the first sales and marketing hire. Rychecky earned a bachelor’s degree in biology from Nebraska Wesleyan University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • code-enews

    Don't Shift Left, Start Left: Why Developers Should Be the First Line of Defense

    See More
  • enterprise wide cybersecurity training

    The first line of defense: Why employees are the key to stronger cybersecurity

    See More
  • executive

    Defense is Your Best Offense: Understanding the Fundamentals of Risk-Based Security

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!