Managing the process to reap IP rewards

May 2008 Information Security

IP-based solutions have gradually come to prominence since technologies such as voice over IP (VoIP), virtual private networks (VPNs), storage area networks (SANs) and CCTV-based security solutions have moved to centre stage.

Both IT and other senior managers need to get involved if they want to reap the rewards that IP solutions can deliver, as IP technology is a strategic investment affecting all aspects of the business. This investment should be regarded as continuous.

Consequently, both current and anticipated future requirements need to be considered if the full benefits are to be realised. Because future requirements can never be identified with precision, the focus should be on continuous development of applications that are fast and effective within a clear business framework.

For an effective start, the following points should be taken into account:

* Listen to the views of those involved in and affected by the implementation so that it will be fully accepted and/or effectively operated by the users.

* Take the opportunity to simplify the business processes before applying IP technology.

* Get supplier and customer input regarding your plans. They may well have some valuable insight from their perspective.

Here are some of the most salient points to consider about some of the 'hottest' IP solutions:

IP-based CCTV: get the big picture

* Existing network infrastructure can be used and no extra long distance cables required.

* Cameras can be moved with minimum time and effort, and cabling does not need to be replaced.

* Cameras can be installed at any location, no matter the distance, as long as it is within range of the Ethernet infrastructure.

* Control rooms can be anywhere on the network and there could be many.

* The same camera could be viewed or recorded simultaneously at multiple locations, and controlled by multiple security levels

* Recording can take place on any available device on the network, and even an existing PC or Server could be used for a few cameras.

* Optionally, recording can take place at each camera, and no recordings would be lost if the network infrastructure goes down for any reason. Automatic recording replenishment would then take place as soon as the network becomes available again.

* Any amount of recordings per camera, can take place simultaneously and at multiple locations, for redundancy purposes, or offsite storage.

* Bandwidth can be controlled differently for each camera. Different streams at different bandwidths can be available for viewing across different networks. WANs use low bandwidth for instance and LANs require high bandwidth.

* Hard drive space for storage of video recording or data can be shared across many systems.

* Audio or alarms can be connected to the same encoders that transmit the video. Outputs can be used to control any device with alarm contacts. Relays can be used to power up any device.

* As the encoders already use Ethernet, wireless LAN radios can be used to transmit and receive video, audio or alarms from remote locations.

* Existing alarm system could be monitored from remote locations.

* IP-based systems have finally reached the point where they are not only cheaper in the long run, but even start-up capital costs are lower than conventional analogue systems. These savings become dramatic above the 64 camera level.

* Professional video walls are now available using IP, at a fraction of the cost of conventional video walls.

VoIP - loud and clear

* VoIP, which carries voice traffic on IP packet networks, is a more cost-effective alternative to circuit-switched telephones.

* While standards supporting the technology have matured considerably, compliance among vendor equipment has not so check this carefully.

* Quality of Service (QoS) is a big issue as this is required across the system to avoid choppy or incomplete transmissions.

A good way to work around adhering to recognised standards across the entire network is to use Virtual LANs to segregate voice (run in a homogenous setup) and data (on heterogeneous systems) traffic.

* Ensure you have technical assistance on hand to troubleshoot teething problems because it is not likely that your previous voice provider is going to want to help.

VPN - crunching all the numbers

* VPN technology, another datacom cost-cutter, is expanding from single-user remote-access configurations to site-to-site connections.

* Installation concerns have eased as the technology has matured but maintenance can still be a serious challenge. Fluctuations in Internet performance can, for instance, make traffic analysis an endless chore.

* The ability to independently monitor your ISP's performance, either with tools or through third-party vendors, can be the make-or-break point with these systems.

Wireless LANs - spreading the message

* Faster speeds on the latest wireless LANs are transforming this technology.

* Effective monitoring - with off-the-shelf software using network probes or generating synthetic transaction scenarios - is important for controlling budgets and generating performance data quickly.

* Performance concerns are easier to address through using a single ISP capable of servicing all remote offices.

* Remote users need to watch out for standards-compliance issues as with VoIP, so make sure all the elements can 'talk' to each other.

* A common distribution platform for all remote users will save a lot of problems.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...
Organisations fear AI-driven cyberattacks, but lack key defences
Kaspersky Information Security News & Events Training & Education
A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
Know who’s spying on you
Kaspersky Information Security Products & Solutions
According to the latest State of Stalkerware report, 40% of the people surveyed worldwide stated they have experienced stalking or suspect they are being spied on. A solution for Android is now available.

Read more...
Cybersecurity needs 4,7 million professionals
Information Security
Despite all the efforts organisations worldwide put into preventing cyberattacks, global cybercrime has snowballed to $9,2 trillion in 2024 and is expected to grow by another 70% to $15,6 trillion by the end of a decade.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...