IT systems are commonly used for performing business activities. Maintaining their continuing availability and reliability are the task IT branches are wrestling with. This is a good practice to use software of renowned vendors, brand-name devices and computer hardware, as well as purchasing technical support services. In solutions which require undisturbed operation devices equipped with redundant components (e.g. two power supply adapters, disk arrays) are used or cluster configurations composed of many devices are built.
Availability of IT system services operating in network environment depends upon many
factors (e.g. network devices, communication links, security systems). From technical point of view, the widest aspect is protection against security systems failures. It results from the complexity of their configuration as well as functions conducted. In the first place, the security system element which is subject to protection against failures is a firewall system. This is so because Firewall failure means blocking user access to the network and its resources. Configurations equipped with facilities for protection against failures are described as High Availability (HA) systems.
Availability of IT system services operating in network environment depends upon many
factors (e.g. network devices, communication links, security systems). From technical point of view, the widest aspect is protection against security systems failures. It results from the complexity of their configuration as well as functions conducted. In the first place, the security system element which is subject to protection against failures is a firewall system. This is so because Firewall failure means blocking user access to the network and its resources. Configurations equipped with facilities for protection against failures are described as High Availability (HA) systems.
Comments