You are here:

IT administration

Network and infrastructure management
Virtualisation and automation
Hardware and software management
Security management

Network and infrastructure management

Network segmentation: Division of the network into different segments (e.g. using VLANs)
Redundant networks: setting up redundant network connections (availability and reliability)
VPN deployment: Implementation of secure Virtual Private Networks (VPNs)
Network monitoring: Use of monitoring tools (e.g. Nagios, Zabbix) to monitor network performance in real time and recognise potential problems at an early stage
Firewall management: setup and continuous monitoring of firewalls (access monitoring)
Disaster recovery for networks: development and implementation of a disaster recovery plan
Load balancing: Implementation of load distribution to different servers for performance optimisation

Virtualisation and automation

Support with the containerisation of applications and processes using technologies such as LXC/LXD
Use of snapshot and replication technologies for rapid recovery in the virtualised environment
Backup and recovery support specifically for virtualised environments with automated processes
Virtualisation of the production infrastructure to use hardware resources more efficiently (improve scalability)
Automation of patch management for virtual machines and containers
Support for using Network Function Virtualisation to run network functions such as firewalls, load balancers and routers on virtualised platforms to increase the flexibility and scalability of the network infrastructure
Implementation of automation tools such as Ansible, Puppet or Terraform (provision of VMs)

Hardware and software management

Automated software distribution: Use of tools for the automatic installation and updating of software
Patch management: regular and automated provision of patches and security updates
Remote management: Use of remote management tools to access IT resources remotely
End-of-life (EOL) management: identification and planning for the replacement of hardware and software that have reached the end of their life cycle in order to avoid security risks
Protection of hardware devices with security measures such as encryption, password protection, device tracking
Monitoring and performance monitoring: Regular monitoring of hardware and software performance
Driver and firmware updates: Regular updates of hardware drivers and firmware

Security management

Security audits: Carrying out regular security audits and penetration tests
Intrusion detection/prevention (IDS/IPS): Implementation of systems for detecting/preventing attacks
Two-factor authentication (2FA): Introduction of 2FA for access to important IT systems
Use and regularly update firewalls to block unwanted network traffic
Backup and disaster recovery: setting up regular backups and disaster recovery plans
Security guidelines: development and enforcement of clear IT security guidelines for employees and systems
Patch management: Regular updates of operating systems, applications and devices to close security gaps