Managing the process to reap IP rewards

May 2008 Cyber Security

IP-based solutions have gradually come to prominence since technologies such as voice over IP (VoIP), virtual private networks (VPNs), storage area networks (SANs) and CCTV-based security solutions have moved to centre stage.

Both IT and other senior managers need to get involved if they want to reap the rewards that IP solutions can deliver, as IP technology is a strategic investment affecting all aspects of the business. This investment should be regarded as continuous.

Consequently, both current and anticipated future requirements need to be considered if the full benefits are to be realised. Because future requirements can never be identified with precision, the focus should be on continuous development of applications that are fast and effective within a clear business framework.

For an effective start, the following points should be taken into account:

* Listen to the views of those involved in and affected by the implementation so that it will be fully accepted and/or effectively operated by the users.

* Take the opportunity to simplify the business processes before applying IP technology.

* Get supplier and customer input regarding your plans. They may well have some valuable insight from their perspective.

Here are some of the most salient points to consider about some of the 'hottest' IP solutions:

IP-based CCTV: get the big picture

* Existing network infrastructure can be used and no extra long distance cables required.

* Cameras can be moved with minimum time and effort, and cabling does not need to be replaced.

* Cameras can be installed at any location, no matter the distance, as long as it is within range of the Ethernet infrastructure.

* Control rooms can be anywhere on the network and there could be many.

* The same camera could be viewed or recorded simultaneously at multiple locations, and controlled by multiple security levels

* Recording can take place on any available device on the network, and even an existing PC or Server could be used for a few cameras.

* Optionally, recording can take place at each camera, and no recordings would be lost if the network infrastructure goes down for any reason. Automatic recording replenishment would then take place as soon as the network becomes available again.

* Any amount of recordings per camera, can take place simultaneously and at multiple locations, for redundancy purposes, or offsite storage.

* Bandwidth can be controlled differently for each camera. Different streams at different bandwidths can be available for viewing across different networks. WANs use low bandwidth for instance and LANs require high bandwidth.

* Hard drive space for storage of video recording or data can be shared across many systems.

* Audio or alarms can be connected to the same encoders that transmit the video. Outputs can be used to control any device with alarm contacts. Relays can be used to power up any device.

* As the encoders already use Ethernet, wireless LAN radios can be used to transmit and receive video, audio or alarms from remote locations.

* Existing alarm system could be monitored from remote locations.

* IP-based systems have finally reached the point where they are not only cheaper in the long run, but even start-up capital costs are lower than conventional analogue systems. These savings become dramatic above the 64 camera level.

* Professional video walls are now available using IP, at a fraction of the cost of conventional video walls.

VoIP - loud and clear

* VoIP, which carries voice traffic on IP packet networks, is a more cost-effective alternative to circuit-switched telephones.

* While standards supporting the technology have matured considerably, compliance among vendor equipment has not so check this carefully.

* Quality of Service (QoS) is a big issue as this is required across the system to avoid choppy or incomplete transmissions.

A good way to work around adhering to recognised standards across the entire network is to use Virtual LANs to segregate voice (run in a homogenous setup) and data (on heterogeneous systems) traffic.

* Ensure you have technical assistance on hand to troubleshoot teething problems because it is not likely that your previous voice provider is going to want to help.

VPN - crunching all the numbers

* VPN technology, another datacom cost-cutter, is expanding from single-user remote-access configurations to site-to-site connections.

* Installation concerns have eased as the technology has matured but maintenance can still be a serious challenge. Fluctuations in Internet performance can, for instance, make traffic analysis an endless chore.

* The ability to independently monitor your ISP's performance, either with tools or through third-party vendors, can be the make-or-break point with these systems.

Wireless LANs - spreading the message

* Faster speeds on the latest wireless LANs are transforming this technology.

* Effective monitoring - with off-the-shelf software using network probes or generating synthetic transaction scenarios - is important for controlling budgets and generating performance data quickly.

* Performance concerns are easier to address through using a single ISP capable of servicing all remote offices.

* Remote users need to watch out for standards-compliance issues as with VoIP, so make sure all the elements can 'talk' to each other.

* A common distribution platform for all remote users will save a lot of problems.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Prevention-first approach to cybersecurity
News Cyber Security
Check Point CEO, Gil Shwed, highlights the increasing importance of artificial intelligence in defending evolving networks and protecting against cyber threats at annual CPX 360 customer and partner event.

How much protection does cyber insurance really give businesses?
Cyber Security Security Services & Risk Management
If organisations don’t meet even the minimum requirements of security and data protection, insurance will do them little good. Instead, it needs to be just one part of the digital resiliency toolbox.

Introducing adaptive active adversary
Cyber Security Products
New adaptive active adversary protection; Linux malware protection enhancements; account health check capabilities; an integrated zero trust network access (ZTNA) agent for Windows and macOS devices; and improved frontline defences against advanced cyberthreats and streamline endpoint security management.

Eleven steps to an effective ransomware response checklist
Editor's Choice Cyber Security
Anyone is a viable target for ransomware attacks and should have a plan in place to deal with a worst-case scenario. Fortinet offers this ransomware attack response checklist to effectively deal with an active ransomware attack.

Blurring the lines between data management and cybersecurity
Cyber Security IT infrastructure
In the past, data management and cybersecurity would fall under separate domains, but with more organisations making the shift to the cloud, data management and data protection have merged, essentially blurring the lines between the two.

Recession? Do not skimp on cybersecurity
Cyber Security Security Services & Risk Management
While economists are studying their crystal balls, businesses have to prepare for the worst, and preparing for a recession means cutting costs and refocusing resources; however, they must ensure they do not end up creating an enormous risk.

Organisations are increasing modern data protection for cloud workloads
Cyber Security
The Veeam Cloud Protection Trends Report for 2023 identifies what is driving IT leaders to change strategies, roles and methods related to both production and protection of cloud-hosted workloads.

Cybersecurity in Africa: The challenges and solutions
Training & Education Cyber Security
Africa faces a significant challenge when it comes to the availability and distribution of cybersecurity talent and secure IT infrastructures. Facing this challenge will require supporting and nurturing the next generation of security graduates and professionals.

Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Cybersecurity in 2023
Technews Publishing Gallagher Cyber Security
What is on the cybersecurity menu in 2023? Hi-Tech Security Solutions offers two views from industry players on the risk environment and what to look out for in the cyber world in the coming year.