Network appliances arrive bearing gifts for security managers

March 2006 Information Security

There is a technological revolution taking place in the design of integrated security systems, and once you understand it you will want to be part of it. A scant five years ago, the more advanced security systems were developed around software running on PCs using the Windows operating system and connected to peripherals using serial communications protocols. Today, that state of affairs is changing.

Processors have become faster and more capable and mass storage and memory have certainly become much less expensive per megabyte; but the biggest contributor to evolution of technology in the security world has been the proliferation of high speed networks and the public Internet. In an industry that has notoriously lacked standards, IP networking has come to the rescue.

The new network appliances

Network-enabled devices, known as network appliances, are systems that perform a particular function and can stand alone or interoperate with other systems using the IP network as their communications medium. The latest crop of digital video recorders, for example, are network appliances: they contain all the equipment and software required to record and, to varying degrees, analyse video, and to make it available to other systems.

The first network appliances on the market required special client software to be loaded onto a PC to serve as a user interface. The latest network appliances, however, include an internal web server, which means that any permitted computer on the network with a web browser such as Microsoft's Internet Explorer or Mozilla's FireFox can use the device.

What this advanced type of network appliance, the web-based network appliance brings to the system owner freedom from installed client software. The requirement for installing client software creates a dependency between the device and a particular computer. Updates to the computer often require updates to the client software; replacement of hard disks requires reloading the client software, and so on. By making the user interface of a system browser-delivered, these dependencies disappear, reducing the associated maintenance headaches.

The convenience and reliability of browser-based network appliances has led to yet another step in the evolution of these devices: solid-state, browser-based network appliances. This latest type of system addresses the fact that moving parts are the primary source of system failure. Depending on the system, large memory arrays that have a lifetime numbered in the tens of years may be able to substitute for moving disks that have a lifetime of a year or two. In systems that produce so much data that it is not practical to go without moving disks, the network is used to move the data to centralised shared disk arrays for storage.

Benefits for security managers

The solid state, browser-based network appliances offer a number of benefits, some of them not immediately obvious. Clearly, the first among them is reliability. Because most security systems have lives that are much longer than other systems, this is especially important. A solid-state network appliance can have an MTBF (mean time between failures) in excess of 10 years because without moving parts, there is not much to fail.

Manager, meet your IT counterpart

An adjustment that must be made between security managers and IT managers comes because of the shared nature of the networks that these new devices use. Security managers may be suspicious about the security of the data riding on the network. At the same time, IT managers are often concerned with the volume of data that security applications produce.

To address the data security issue, a few of the latest network appliances employ data encryption and authentication techniques in a way that is transparent to the system manager.

How one treats the matter of data volume depends on the particulars of the systems involved. Access control, alarm monitoring, and even IP-based intercom systems use relatively little network bandwidth and can be ignored in most cases. The issues for most IT managers are video systems, especially those that employ IP video cameras.

Here is how security managers can take advantages of the benefits that network appliances have to offer:

Look for IP-network attached devices when purchasing access control, video, and other security systems;

Assure that they can be used from your web browser without having to install special software;

Obtain the cooperation of your IT or network manager in advance (they can be a good source of help throughout the process).

For more information contact Phil Mailes, S2 Security Corporation, 0944 1483 852181, [email protected], or visit www.s2sys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cyber-armour for a healthcare industry under attack
NEC XON Information Security Healthcare (Industry)
Malicious actors have exploited compromised credentials, a clear and present danger when healthcare providers' reliance on remote access software allows adversaries to disguise themselves as legitimate users and gain unauthorised access to critical environments.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...