Managing the process to reap IP rewards

May 2008 Information Security

IP-based solutions have gradually come to prominence since technologies such as voice over IP (VoIP), virtual private networks (VPNs), storage area networks (SANs) and CCTV-based security solutions have moved to centre stage.

Both IT and other senior managers need to get involved if they want to reap the rewards that IP solutions can deliver, as IP technology is a strategic investment affecting all aspects of the business. This investment should be regarded as continuous.

Consequently, both current and anticipated future requirements need to be considered if the full benefits are to be realised. Because future requirements can never be identified with precision, the focus should be on continuous development of applications that are fast and effective within a clear business framework.

For an effective start, the following points should be taken into account:

* Listen to the views of those involved in and affected by the implementation so that it will be fully accepted and/or effectively operated by the users.

* Take the opportunity to simplify the business processes before applying IP technology.

* Get supplier and customer input regarding your plans. They may well have some valuable insight from their perspective.

Here are some of the most salient points to consider about some of the 'hottest' IP solutions:

IP-based CCTV: get the big picture

* Existing network infrastructure can be used and no extra long distance cables required.

* Cameras can be moved with minimum time and effort, and cabling does not need to be replaced.

* Cameras can be installed at any location, no matter the distance, as long as it is within range of the Ethernet infrastructure.

* Control rooms can be anywhere on the network and there could be many.

* The same camera could be viewed or recorded simultaneously at multiple locations, and controlled by multiple security levels

* Recording can take place on any available device on the network, and even an existing PC or Server could be used for a few cameras.

* Optionally, recording can take place at each camera, and no recordings would be lost if the network infrastructure goes down for any reason. Automatic recording replenishment would then take place as soon as the network becomes available again.

* Any amount of recordings per camera, can take place simultaneously and at multiple locations, for redundancy purposes, or offsite storage.

* Bandwidth can be controlled differently for each camera. Different streams at different bandwidths can be available for viewing across different networks. WANs use low bandwidth for instance and LANs require high bandwidth.

* Hard drive space for storage of video recording or data can be shared across many systems.

* Audio or alarms can be connected to the same encoders that transmit the video. Outputs can be used to control any device with alarm contacts. Relays can be used to power up any device.

* As the encoders already use Ethernet, wireless LAN radios can be used to transmit and receive video, audio or alarms from remote locations.

* Existing alarm system could be monitored from remote locations.

* IP-based systems have finally reached the point where they are not only cheaper in the long run, but even start-up capital costs are lower than conventional analogue systems. These savings become dramatic above the 64 camera level.

* Professional video walls are now available using IP, at a fraction of the cost of conventional video walls.

VoIP - loud and clear

* VoIP, which carries voice traffic on IP packet networks, is a more cost-effective alternative to circuit-switched telephones.

* While standards supporting the technology have matured considerably, compliance among vendor equipment has not so check this carefully.

* Quality of Service (QoS) is a big issue as this is required across the system to avoid choppy or incomplete transmissions.

A good way to work around adhering to recognised standards across the entire network is to use Virtual LANs to segregate voice (run in a homogenous setup) and data (on heterogeneous systems) traffic.

* Ensure you have technical assistance on hand to troubleshoot teething problems because it is not likely that your previous voice provider is going to want to help.

VPN - crunching all the numbers

* VPN technology, another datacom cost-cutter, is expanding from single-user remote-access configurations to site-to-site connections.

* Installation concerns have eased as the technology has matured but maintenance can still be a serious challenge. Fluctuations in Internet performance can, for instance, make traffic analysis an endless chore.

* The ability to independently monitor your ISP's performance, either with tools or through third-party vendors, can be the make-or-break point with these systems.

Wireless LANs - spreading the message

* Faster speeds on the latest wireless LANs are transforming this technology.

* Effective monitoring - with off-the-shelf software using network probes or generating synthetic transaction scenarios - is important for controlling budgets and generating performance data quickly.

* Performance concerns are easier to address through using a single ISP capable of servicing all remote offices.

* Remote users need to watch out for standards-compliance issues as with VoIP, so make sure all the elements can 'talk' to each other.

* A common distribution platform for all remote users will save a lot of problems.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
Create order from chaos
Information Security
The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyberthreats are growing in complexity and frequency, demanding sophisticated solutions that not only detect, but also prevent, malicious activities effectively.

Read more...
Trend Micro launches first security solutions for consumer AI PCs
Information Security News & Events
Trend Micro unveiled its first consumer security solutions tailored to safeguard against emerging threats in the era of AI PCs. Trend will bring these advanced capabilities to consumers in late 2024.

Read more...
Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
Responsible AI boosts software security
Information Security
While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...