Wide Area NetworkingThis newsletter is sponsored by PacketeerNetwork World's Wide Area Networking Newsletter, 09/27/07How do you enforce acceptable network use?By Steve Taylor and Jim MetzlerAlmost every week, we write about how to make the most effective use of your WAN and the topics often center on how to keep unauthorized traffic off your network. For instance, we recently wrote about whether it’s a good idea and/or possible to block traffic in certain ports, especially with the ability of applications like Skype to find a way though most firewalls and application performance appliances. Today, we’d like to take a moment to consider to what extent tight control is possible – or even desirable. For instance, recently reports in the popular press focused on lost productivity from employees accessing their “fantasy football” accounts while at work, reporting that many people spend up to an hour a day – while allegedly “at work” - managing their teams. And there seems to be virtually no way to stop personal e-mails at work. Even if corporate e-mail is used for work purposes only, Web-based access to services like Google’s Gmail make it almost impossible to stop access to e-mail services. So the basic question becomes to what extent it is reasonable to try to curtail this use – or possible abuse – of corporate resources with technology? Yes, we can – and should - continue to use various devices for traffic shaping and to ensure that sufficient bandwidth is available for mission critical applications and that personal communications do not cause a bottleneck. At the same time, perhaps this is best addressed with a combination of technology and policy, after all, with increasing bandwidth and lower bandwidth costs the strain of corporate networks is becoming more and more a productivity issue than a corporate bandwidth issue. And while policy can’t always be strictly enforced, there at least is a baseline expectation as to what is and isn’t acceptable network use.
So we’d like to hear from you on this. Do you have an acceptable network use policy in your organization? Are there strict limits as to how many hours per day may be spent on personal communications? If so, how are these policies enforced? Let us hear from you, and we’ll be sharing the results.
|
Contact the author: Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. For more detailed information on most of the topics discussed in this newsletter, connect to Webtorials, the premier site for Web-based educational presentations, white papers, and market research. Taylor can be reached at taylor@webtorials.com Jim Metzler is the Vice President of Ashton, Metzler & Associates, a consulting organization that focuses on leveraging technology for business success. Jim assists vendors to refine product strategies, service providers to deploy technologies and services, and enterprises evolve their network infrastructure. He can be reached via e-mail. This newsletter is sponsored by PacketeerARCHIVEArchive of the Wide Area Networking Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
1 comment:
Stick with Riverbed for accelerating applications. They are the best of breed solution out there. I work for a Cisco Partner that is also partnered with Riverbed because they have the best WAN optimization technology. I have a lot of comparison data on all the competitors if anyone is interested.
Justin Lofton
Systems Engineer
Tredent Data Systems, Inc.
WAN Optimization Specialists
justinl@tredent.com
http://www.tredent.com
Post a Comment