What is network management? | IBM

In network management, tasks include:

Pushing software updates to devices across the network

Depending on the capability of the organization’s IT and the network management system, updates can be pushed to devices that are integral to the operation of an enterprise network—such as routers—as well as end-user devices that include printers and phones.

Performing network maintenance

Network maintenance involves performing tasks necessary to fix issues as they occur and upgrade software and hardware vital for the continued operation of the network.

Network performance monitoring

Network performance monitoring is done to ensure optimal performance, continuous performance of network resources.

Identifying security threats and addressing network vulnerabilities

Network administrators monitor the network for signs of potential threats or breaches and use AI tools that alert them to attacks or possible security risks, which can then be mitigated or prevented. Types of network security threats include ransomware and distributed denial of service (DDoS) attacks. Some examples of network vulnerabilities include hardware that wasn’t installed properly, insecure passwords and exploitable design flaws in an operating system.

Enhancing network security

Enhancing network security includes tasks such as creating firewalls that block suspicious activity on the network and the enforcement of multifactor authentication (MFA).

IP address management

Network administrators maintain an inventory of unavailable and available IP addresses needed for devices that reside on the network. They assign and unassign IP addresses as devices are provisioned or de-provisioned from the network. IP addresses are sometimes assigned dynamically through a dynamic host configuration protocol (DHCP) server, which is often found in large enterprise networks.

Network provisioning

Network administrators will provision a network infrastructure with IT system resources such as bandwidth and transport channels (cable, broadband, 5G, LTE, satellite, etc.) to enable access between users, end-user devices, IoT devices, applications and data at desired performance levels.

Setting network access controls

This is done to regulate how devices on the edge and applications in cloud environments access data via the network. For example, an access control may be in place to prevent sensitive data from being transferred over the network into a public cloud environment.