Cost saving network for municipality

September 2013 Information Security

Internet connectivity is essential to the functioning of any business and municipalities are no exception. Municipalities around the world are using Internet connectivity to operate more efficiently and improve service delivery to their communities and require the same levels of stable bandwidth as any other organisation.

One South African municipality needed to link multiple offices together to transport voice and data over these links, providing improved communication and efficiency. Partnering with specialist telecommunications installer IP Solutions, the municipality has reduced its costs and enhanced its connectivity through the installation of a Radwin 5000 Point-to-Multipoint wireless network solution.

IP Solutions’ Noah Mashaba explains that the network has brought a big change into the municipality’s working environment and saved it money. “The municipality had multiple ADSL lines, and each one was being billed separately. This was impractical in terms of both cost and efficiency, particularly since it had the need to link its offices. Our installation allowed the municipality to upgrade the main office ADSL and all other offices now share the bandwidth.”

The Radwin 5000 base stations are optimised for corporate access, video transmission and backhaul applications and were the ideal solution for this installation. “With Radwin 5000, customers gain the advantages of a robust, high-capacity solution with improved spectrum efficiency and better tower use for overall lower total cost of ownership. This is the perfect solution for the high capacity demands of bandwidth-hungry customers,” adds Riandi van Niekerk, marketing manager at Miro, an official distributor of Radwin products in South Africa.

The choice of the Radwin 5000 was made based on its features, says Mashaba, as the municipality evaluated a number of other products and felt that the Radwin solution best met its needs. With its small form factor, the Radwin 5000 offers up to 250 Mbps per base station sector and a long range of up to 40 kilometres. IP Solutions installed three units, which more than adequately cover the customer’s communication requirements.

“We decided to use the Radwin 5000 for a number of reasons,” says Mashaba. “It was the most cost-effective option, and easy to install. I upgraded the firmware on all devices to make sure it was the latest version, created a link on the ground, and we were ready to go. The client is so happy with the results that they are looking at expanding the links to other offices and we are currently doing surveys on these locations.”

For more information contact Miro distribution, 086 123 MIRO, riandi@miro.co.za, www.miro.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.