By: Soren "Frank" Munch, CEO, U5com Co Ltd.
Peer-to-Peer network (no server) |
Server-based network |
Safety of users private data |
The users save their own e-mail, documents etc. on their harddisk. So the company must safeguard the data on all computers. In praxis this is very hard to do properly so any disk crash or virus attack will mean loss.
|
All users store all data on the server. The server is equipped with built-in automated routines to ensure back-up of data. Losses are rare.
|
Safety and availability of shared data |
If files need to be shared they are put in a shared folder on a users computer. If this computer goes down no users have access to the file.
|
Shared files are on the server and independent of any PCs fate.
|
Management's Availability of PCs "Shared Folders" |
The management has access only to shared data and only if the users PC is turned on.
|
The management has access to all data, anytime.
|
Management's Availability of non-shared Data |
The only access to such data is by going to the computer and turning it on and operate the PC.
|
The management has access to all data, anytime.
|
Stability of Shared Data |
A Windows PC is not a stable environment to host shared data. User errors, virus and harddisk-failures are common, and immediately result in lost data.
|
The server is an extremely robust and stable environment. A U5 Confidence server does not get attacked by virus. Harddisk-failures are not something "hoped never to happen", it is a practical (though very rare) reality against which elaborate measures are taken.
|
Upgrading/Repairing a PC |
When a PC needs repair or upgrade it has to be serviced while it contains files. Any accident during this process will result in lost data. In addition there is an obvious security problem.
|
The PC does not hold important files company files as they are on the server. It can be serviced with no risk for loss or theft.
|
Deleted files |
Deleted files are still accessible using special tools, unless the deleting user takes precautions. Often this results in confidential information being accessed when a disk is replaced.
|
Deleted files on the server is truly gone for good. Of course, the server back-up system protects against loss.
|
Connecting a new PC |
The new PC will have to be set up specifically for the user that is supposed to use it and the role it has in the network. Shares and pheriperals need to be installed. This strongly complicates the installation.
|
Acquiring a new PC is a matter of installing software on it and connecting it. No special network-functions for the PC need to be added.
|
User out-of-work when PC breaks down |
The users files are on the PC with problems. This user can not access any files while repair is going on.
|
The user can use another PC. All work done from the other PC is on the server.
|
User slowed down/halted when his PC performs double roles |
The user with shared resources will experience slow operation when other access these resources on his PC. If several users request services at the same time the PC can
malfunction due to overload. To ensure that this does not happen, each resource-sharing PC needs to be purchased
with overcapacity.
|
No user uses any other users PC. The server is delivered and optimized for taking care of many users at the same time.
|
Peripherals are down when the serving PC is down |
If e.g. a printer is connected to the PC of another user no users can print if this PC is down. |
All peripherals are connected to the server. Downtime of a PC only affect the unlucky user.
|
Privacy and security of data |
Company data are spread on different PCs, where it is hard to control what happens to it. In praxis true privacy of files are non-exsistent.
|
Company data are on a server specifically designed for security.
|
If PCs or harddisks are stolen |
A stolen harddisk will give full access to all data on it.
|
Stealing a U5 Confidence server or its disk gives no access to data, which are stored with military-grade strong encryption.
|
Encrypted Backups |
The difficulty of performing any sufficient back-up routines at all at users' PCs are discussed above. But
if and when data is backed up it the backup is a security risk by itself. Only trusted individuals can handle
the backup.
|
U5 Confidence server delivers encrypted backups. Any person can be involved in the process.
|
Attacks from the internet |
Each PC connected directly to the internet is open to attack, anytime, regardless of the users action. The cost and difficulty of keeping up firewalls on each PC is high and in praxis it is not done. In addition, the Windows XP firewalls are not industrial strenght.
|
The server has an industrial strenght firewall, IPFW. Attacks against users' PC (without 'help' from the user) is for a large part impossible, for the rest very difficult.
|
Multi-dependencies increases the risk of problems |
When several PCs (serving shared peripherals) are needed to work correctly to have the network fully functioning the chance of network failure are proportionally increased. In addition users' PCs are not too stable.
|
All functions are up as long as the server is up. The server is specifically designed for extreme stability.
|