Designing a modern security network

Issue 6 2020 IT infrastructure

Infrastructure such as cabling (copper and fibre) will last between 10 and 20 years and is the lifeblood of the network and as such, must be able to handle both the current and future bandwidth demands. In security networks these include the likes of Ultra HD video and voice transmission, database access or backup, and storage that may only be replaced every second or third network refresh cycle.

In earlier years, many installations shied away from using wireless as a transmission medium due to latency and reliability issues. The modern wireless systems now offer secure, multi frequency, low latency and transmission speeds in excess of 300 Mbps and at distances up to 10 km, thus making them ideal for long distance transmission where cabling is not possible or may prove too costly. Wireless deployments should always be subjected to a detailed site survey to confirm line of site, operating distances and potential sources of interference.

Bandwidth and throughput requirements are key metrics for switching and routing design in order to match up the hardware with the infrastructure, thus avoiding bottlenecks and ensuring the shortest route possible for the data packets. The best designs will always include a 25% headroom for future growth and peak network demand.

Risk assessments have indicated an increase in physical and cybersecurity attacks which has forced organisations to re-evaluate their risk profiles and prioritise spending on mission critical hardware. This, along with the advancement of IoT, AI and the need to automate manual tasks such as screening, monitoring, vetting and granting access, has led to the evaluation of current systems and processes.

It is now more critical than ever that all physical and digital entry points into an organisation are assessed for vulnerabilities such as weak and default passwords, unsupported and unpatched hardware and software, unsecured infrastructure such as network cabinets and wall jacks. Personal devices and remote access should form part of this assessment.

Replacement need not necessarily be a wholesale ‘rip and replace’ exercise, but rather a phased approach based on the risks evaluated and identified. Options include upgrades and security patches, reassigning existing equipment where bandwidth and throughput requirements remain low, migrating to a cloud-based solution and equipment rental as an operational budget.

Finally, ensure that you build redundancy and load balancing into your security network by splitting cameras and access control over multiple recorders, controllers and switches so that in the event of failure or damage you still have your key monitoring areas and perimeters covered.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Hard times, increased crime
Technews Publishing Security Services & Risk Management Integrated Solutions IT infrastructure
Hi-Tech Security Solutions spoke to Mezuzah Security Services to find out what is happening in the real world, and how security companies are dealing with the added pressure inherent to the South African market.

Why LiFePO4 batteries are the future
Regal Distributors SA Security Services & Risk Management
Because the LiFePO4 battery is denser than the sealed lead acid battery, it’s able to store and discharge more energy, giving you more power, for more appliances, for longer.

Storage-as-a-service, optimised with AIOps
IT infrastructure
Organisations today have realised the relevance of adopting a hybrid cloud strategy when faced with issues such as data sovereignty, privacy, compliance and more.

The importance of device and connectivity management
Trinity IoT IT infrastructure
If access to device data through cellular connectivity is the lifeline of a company’s business model, then device management is the key to sustaining this with connectivity management being the golden thread tying everything together.

Becoming more cyber resilient
IT infrastructure
Organisations must consider the need for a highly secure and effective authorisation and authentication process, says Hayden Sadler, country manager for South Africa at Infinidat.

Don’t let endpoint security be an afterthought
IT infrastructure
Data management is critical not only for mitigating the risk of ransomware, but also for compliance with various data privacy and data protection regulations.

Cyber resilience is more than security
Industrial (Industry) Cyber Security IT infrastructure
Kate Mollett, regional director at Commvault Africa advises companies to guard against cyberattacks in the shipping and logistics sector using an effective recovery strategy.

Citrix App Protection helps secure remote workers
Cyber Security IT infrastructure
Many organisations are implementing a zero-trust security model with data protection as a top priority. This is largely due to the increase in remote work and unmanaged personal devices playing a growing role in the enterprise.

Kaspersky invests in development of neuromorphic processors
News IT infrastructure
Neuromorphic processors’ field of application is acceleration of the hardware used in the latest generation of artificial intelligence systems, which are based on spiking neural networks (SNN) training, which is more akin to biological interactions.

Infinidat enhances channel support
News IT infrastructure
Infinidat drives go-to-market strategy with new global partner portal and expands channel sales with Storage-as-a-Service in ArrowSphere.