Wireless networking solutions from Motorola
June 2014, IT infrastructure
Westcon has announced three new wireless network management solutions from Motorola Solutions, namely the VX 9000, NX 7500 and the EX 3500.
Motorola is now offering new solutions for easy migration to the cloud, products that provide a centralised Access Point management model, as well as form part of a unified wireless infrastructure.
The first device, the VX 9000, is a virtual controller that combines the power of virtualisation with Motorola’s WiNG Controller. The VX 9000 brings together the cost-effectiveness of virtualisation with the high-performance of the wireless services, endless scalability, deployment flexibility and centralised management of the entire wireless network creating a new level of simplicity and much needed hardware independence to the wireless LAN.
According to Westcon, this range is easy to deploy through public clouds or through the NOC and it can be installed on any existing hypervisor such as Citrix XEN, VMware ESXi or Microsoft Hyper V without the need of a new hardware. Also, customers can now run multiple instances of the VX 9000 on a single server, reducing costs and space and power requirements in the network operations centre.
The controller can support up to 25 000 access points, therefore there is no need for purchasing different controllers for different access point capacities. Customers can run VX 9000 on a commodity server as it has no unique hardware requirements.
Secondly, the NX 7500 is a multi-service platform that brings advanced WLAN performance and single point of control simplicity to the mid-size WLAN. Designed for mid-sized enterprises and campus environments, the NX 7500 offers comprehensive management of up to 2048 network elements through a single pane of glass.
Virtualised framework and an integrated 500 GB hard drive allow hosting, deployment, and management applications directly on the NX 7500, therefore eliminating the need to purchase and manage additional hardware. The controller can be used for centralising management functionality.
Lastly, the EX 3500 Series Ethernet switch addresses all of the access layer needs of a customer’s branch and remote office deployments. Now, users can easily support their wired networking requirements, as well as monitor and manage their entire wired and wireless network with a single management window pane.
This solution also boasts the added advantages of centralised management through Motorola Solutions WiNG-based NX Integrated Services Platforms. Easy support for a wide variety of wired networking requirements also allows easy monitoring and management of all wired and wireless equipment with the simplicity of a single pane of glass, reducing management time and complexity.
For more information contact Westcon Security Solutions – Electronic, +27 (0)11 233 3333, firstname.lastname@example.org, www.westcon.co.za
- People on the move
November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
- Home run for integrated security
November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
- Facing the future
November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
- A mobile holiday
November 2017, Access Control & Identity Management, IT infrastructure
The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.
- Access a mobile-first world
November 2017, Axis Communications SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.
- Portable biometric solutions gain ground
November 2017, Powell Tronics, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Portable devices offer a cost-effective and reliable alternative for a number of traditional access control applications.
- Access control as a service
November 2017, Impro Technologies, Access Control & Identity Management, IT infrastructure
Serve the skills and cash shortage notice by opting for access control as a service, which promises to make the access control spending more manageable.
- Cut the wire for easy access
November 2017, MiRO Distribution, Access Control & Identity Management, IT infrastructure
The great debate about hardwired versus wireless systems will no doubt continue for some years to come, but it’s clear that wireless access control is coming into its own.
- Migrating to IP access control
November 2017, Genetec, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Migrating from an existing legacy access control system to an IP-based system offers companies many benefits and even cost savings.
- Smart cities are built on smart thinking
November 2017, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.
- The complexity of borders
November 2017, Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Controlling borders is a critical task for governments the world over, both at official and unofficial entry points where illegal crossings are made.
- The missing mobile puzzle piece
November 2017, Securicom IT Solutions, Cyber Security, IT infrastructure
Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.