Designing a modern security network

Issue 6 2020 Infrastructure

Infrastructure such as cabling (copper and fibre) will last between 10 and 20 years and is the lifeblood of the network and as such, must be able to handle both the current and future bandwidth demands. In security networks these include the likes of Ultra HD video and voice transmission, database access or backup, and storage that may only be replaced every second or third network refresh cycle.

In earlier years, many installations shied away from using wireless as a transmission medium due to latency and reliability issues. The modern wireless systems now offer secure, multi frequency, low latency and transmission speeds in excess of 300 Mbps and at distances up to 10 km, thus making them ideal for long distance transmission where cabling is not possible or may prove too costly. Wireless deployments should always be subjected to a detailed site survey to confirm line of site, operating distances and potential sources of interference.

Bandwidth and throughput requirements are key metrics for switching and routing design in order to match up the hardware with the infrastructure, thus avoiding bottlenecks and ensuring the shortest route possible for the data packets. The best designs will always include a 25% headroom for future growth and peak network demand.

Risk assessments have indicated an increase in physical and cybersecurity attacks which has forced organisations to re-evaluate their risk profiles and prioritise spending on mission critical hardware. This, along with the advancement of IoT, AI and the need to automate manual tasks such as screening, monitoring, vetting and granting access, has led to the evaluation of current systems and processes.

It is now more critical than ever that all physical and digital entry points into an organisation are assessed for vulnerabilities such as weak and default passwords, unsupported and unpatched hardware and software, unsecured infrastructure such as network cabinets and wall jacks. Personal devices and remote access should form part of this assessment.

Replacement need not necessarily be a wholesale ‘rip and replace’ exercise, but rather a phased approach based on the risks evaluated and identified. Options include upgrades and security patches, reassigning existing equipment where bandwidth and throughput requirements remain low, migrating to a cloud-based solution and equipment rental as an operational budget.

Finally, ensure that you build redundancy and load balancing into your security network by splitting cameras and access control over multiple recorders, controllers and switches so that in the event of failure or damage you still have your key monitoring areas and perimeters covered.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.