Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Liberating network management: Your first line of cyber defense

By Todd Rychecky
Understanding the Distinct and Dependent Roles of Data, Privacy and Cybersecurity Professionals
November 10, 2020

Cybersecurity breaches are an all-too-common and ever-evolving threat that every organization should be prepared for. But as digital ecosystems evolve to support new innovations and an increasing number of connected devices, so does the complexity of managing and securing critical network infrastructure.

Each new remote data center or SD-WAN router brings with it a new vector for attacks that could hijack an entire ecosystem and hold it hostage. This means that while malicious actors continue to grow in sophistication, the chances for them to exploit common vulnerabilities like config errors, bad updates or clicked ransomware links also multiply exponentially.

If organizations and their networks are not resilient, they can find themselves suddenly scrambling when a breach occurs. Adding fuel to the fire, the costs of an outage can be catastrophic. In fact, a recent Opengear survey revealed that nearly 1/3 of organizations lose over $1 million due to network outages each year.

This year alone, we’ve already seen many major incidents impacting enterprises, critical industries and major social movements alike. For instance, hackers exploited a major directory traversal bug, massive breaches to healthcare systems sent them back to paper-based operations, and election data sharing software has been targeted by phishing scams.

What can be done to prevent attacks and protect sensitive data and critical infrastructure? One of the first and most critical steps to improving security is to ensure network management operates independently from the production network.

This practice not only ensures the keys to the kingdom remain safe and only in the hands of those who should have access, but also can help future-proof an organization’s entire network, reduce operational costs such as truck rolls, and greatly increase resilience across the network to reduce outages and improve uptime.

 

The case for liberating networks

Managing the network on the primary production network is a recipe for disaster, yet all too often is an afterthought for those managing a network. When network management is housed alongside user data traffic and control commands, organizations expose themselves to attacks from anywhere or anyone that can connect to a vulnerable device. Making matters worse, management can quickly get locked out during disruptions and cyber-attacks, meaning outages last longer and have a greater impact on total costs. Even something as simple as a malicious Twitter link, for example, can open the door for data theft, malicious code or lengthy downtime periods.

By implementing a separate network management connection to reach console ports, called out-of-band (OOB) management, network admins or engineers can reach any edge or core location in a network, no matter the status of the production network. This simple step can improve visibility into the status of devices, enable real-time problem resolution to improve remediation, and ultimately thwart a security breach.

 

“Is LTE right for me?”

When establishing a separate management plane, one of the most common questions stakeholders ask is, “Should I use a cellular connection or not, and if I use a cellular connection, will it be secure?” The answer is yes, a cellular connection can be highly secure, as long as precautionary measures are taken, such as IPsec VPN tunnels and other protocols.

Of course, there are other options too. Some might use a cable modem, while others might use a second Ethernet interface built on a separate network entirely. However, a cellular network is generally more flexible, especially for geographically dispersed networks, and is simpler to use and scale. By utilizing a 4G LTE connection, organizations can also benefit from a plethora of smart capabilities, such as proactive monitoring and alerts, automatic failover and near-instant remediation.

Cellular also enables instantaneous setup, especially when compared to other methods. For instance, it could take weeks to install an MPLS circuit for your independent management plane, but a cellular, data plan is very easy to activate and can be done in hours from a remote location.

 

A “smart” management plane

Separating the management plane to protect core data center operations has always been critical for network security and management. But as IoT and other innovations increase the need for edge computing, organizations now have to manage a plethora of geographically dispersed network nodes which can act as additional points of failure or vectors for a malicious actor to breach.

A more edge-heavy environment also means the costs of downtime and truck rolls will rise, while vulnerabilities increase. Therefore, those who can implement a separate management plane with smart capabilities will have a competitive advantage.

These capabilities include the ability to implement and quickly improve upon network automation functions – a key factor in costs savings and reducing human error. This can be done on a separate management plane with the inclusion of tools that support NetOps (or DevOps for networking), like Ansible, GitHub, Puppet and Chef for configuration; Docker and Kubernetes for storage; Splunk for monitoring and alerting; Google, Microsoft Azure and AWS for cloud management; and Python and other APIs for coding.

By providing these tools on a separate management plane, organizations can rapidly and securely roll-out applications for always-on remote provisioning and NetOps automation. This means continuous event logging and back-up procedures can all be automated, and new site configurations can be completed instantaneously via processes like zero-touch provisioning, which eliminates needs for on-site setup.

 

What are you waiting for?

While a capable separate network management plane greatly increases network resilience, there are still those who haven’t adopted such an approach. For many, the value of the technology is not evident until its need is necessitated by crisis. For others, they may try to make do with a legacy OOB server that is not scalable, has very limited capabilities, or relies on outdated firmware.

Large organizations and small to mid-sized enterprises alike can all fall prey to complacency in regard to network resilience. Hacker sophistication and our dependence on digital environments continually increases, so why open the door for downtime and breaches that can spell disaster? Those who act sooner rather than later will be better equipped to handle today’s and tomorrow’s security vulnerabilities.

 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security data breach ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Todd rychecky

Todd Rychecky is VP of Americas for Opengear, responsible for developing and executing sales strategies, multiple business initiatives, hiring and talent development, setting performance goals and growing the business. He joined the company in 2008 and was the first sales and marketing hire. Rychecky earned a bachelor’s degree in biology from Nebraska Wesleyan University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-protection-freepik1170x658v47.jpg

    The last line of defense against data exfiltration

    See More
  • cyber-threat-freepik1170x658v56.jpg

    Cyber warfare: How to empower your defense strategy with threat intelligence

    See More
  • cyber-security.jpg

    The next evolution of cyber defense: Ransomware-proof object storage

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!