The most common infrastructure management types

OS management
Supervise environments running the same OS by providing content, patch, provisioning, and subscription management.
Virtualization management
Interfaces with VMs and underlying physical hardware to simplify resource administration, enhance data analyses, and streamline operations.
Container orchestration
Automates the deployment, management, scaling, and networking of containers.
Configuration management
Maintains servers, storage, networks and software in a desired, consistent state.
Antivirus management
Prevents, searches for, detects, and removes software viruses, and other malicious software.
All the components we have to create for this infrastructure
Server Solutions
Advanced software-defined, servers for edge, data center, cloud, enterprise and big data. HCI and SDS are driving the need for storage density, while HPC, analytics and AI are driving the need for accelerating quantum technologies.
Storage Solutions
High-availability scale-up and scale-out unified file, block, and object storage array systems and expansion solutions, software integrated, built-for-cloud data protection delivering unparalleled backup, archive and disaster recovery for your enterprise apps.
Network Solutions
Switching for data center and cloud environments, wired, wireless networks, software-defined and application delivery built on enterprise cybersecurity platforms which provides network, cloud security, endpoint protection and various cloud-delivered security services.
Backup Solutions
Backup and recovery softwares designed to provide business continuity and prevent critical data loss. They cover physical and virtual servers, databases, enterprise applications (i.e., SaaS products), mobile endpoints and public infrastructure platforms (like AWS).
Firewalls Security
Management software supports monitoring and configuration of firewalls from a central dashboard. The software monitors firewalls, physical and virtual, routers, load balancers and switches. Through real-time event tracking the software can correlate network behavior to likely threats.
Threat Intelligence Platforms
Cloud or on-premise system to facilitate management of threat data from a range of existing security tools such as a SIEM, firewall, API, endpoint management software or intrusion prevention system. The primary purpose is to understand the risks and protect against a variety of threat types most likely to affect their environments.
SASE Platforms
Secure Access Service Edge, is a cybersecurity offering that encompasses enterprises security across all edges. In doing so, SASE platforms are unifying networking, via an SD-WAN foundation, with security features placed as close to the end-user as possible without existing on the end-user device.
Zero Trust Network Access solutions
ZTNA is a software-defined perimeter and is used to provide secure access to private applications without allowing users access to enterprise networks. They may replace VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications.
Email Encryption Software
Software disguises content within email messages so they cannot be read by anyone apart from the intended recipient. Emails are encrypted and then decrypted by a digital signature mechanism that uses public and private keys. The public key is shared with everyone while the private key is kept private.
Endpoint Encryption Software
Software protects data residing on a computer hard drive (personal computer or a server) and other network endpoints such as USB flash drives, external hard drives, SD memory cards, etc. Software protects data on a given endpoint by making it unreadable without using the proper decryption key.
Mobile Device Management (MDM)
Cloud security tools built to secure employee personal mobile devices, by providing a broad range of security capabilities so that they are safe to use for business. Adding to protecting devices from malware attacks and viruses, they protect data stored on mobile devices and specific applications.
Identity Management Solutions
Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal is to improve security and employee productivity. They also lower costs while managing user identities and credentials.
Intrusion Detection Systems
Software products that monitor network or system activities, and analyze them for signs of any violations of policy, acceptable use, or standard security practices. They then report any malicious activities or policy violations to system administrators.
VoIP Technology
VoIP presents the underlying technology for Unified Communications as a Service (UCaaS), which combines voice/VoIP, audio/video conferencing, and instant messaging/chat into one platform.
Web Content Filtering
Solutions comprise appliances and software for censoring or preventing access to restricted web content deemed offensive or inappropriate.