Network appliances arrive bearing gifts for security managers

March 2006 Information Security

There is a technological revolution taking place in the design of integrated security systems, and once you understand it you will want to be part of it. A scant five years ago, the more advanced security systems were developed around software running on PCs using the Windows operating system and connected to peripherals using serial communications protocols. Today, that state of affairs is changing.

Processors have become faster and more capable and mass storage and memory have certainly become much less expensive per megabyte; but the biggest contributor to evolution of technology in the security world has been the proliferation of high speed networks and the public Internet. In an industry that has notoriously lacked standards, IP networking has come to the rescue.

The new network appliances

Network-enabled devices, known as network appliances, are systems that perform a particular function and can stand alone or interoperate with other systems using the IP network as their communications medium. The latest crop of digital video recorders, for example, are network appliances: they contain all the equipment and software required to record and, to varying degrees, analyse video, and to make it available to other systems.

The first network appliances on the market required special client software to be loaded onto a PC to serve as a user interface. The latest network appliances, however, include an internal web server, which means that any permitted computer on the network with a web browser such as Microsoft's Internet Explorer or Mozilla's FireFox can use the device.

What this advanced type of network appliance, the web-based network appliance brings to the system owner freedom from installed client software. The requirement for installing client software creates a dependency between the device and a particular computer. Updates to the computer often require updates to the client software; replacement of hard disks requires reloading the client software, and so on. By making the user interface of a system browser-delivered, these dependencies disappear, reducing the associated maintenance headaches.

The convenience and reliability of browser-based network appliances has led to yet another step in the evolution of these devices: solid-state, browser-based network appliances. This latest type of system addresses the fact that moving parts are the primary source of system failure. Depending on the system, large memory arrays that have a lifetime numbered in the tens of years may be able to substitute for moving disks that have a lifetime of a year or two. In systems that produce so much data that it is not practical to go without moving disks, the network is used to move the data to centralised shared disk arrays for storage.

Benefits for security managers

The solid state, browser-based network appliances offer a number of benefits, some of them not immediately obvious. Clearly, the first among them is reliability. Because most security systems have lives that are much longer than other systems, this is especially important. A solid-state network appliance can have an MTBF (mean time between failures) in excess of 10 years because without moving parts, there is not much to fail.

Manager, meet your IT counterpart

An adjustment that must be made between security managers and IT managers comes because of the shared nature of the networks that these new devices use. Security managers may be suspicious about the security of the data riding on the network. At the same time, IT managers are often concerned with the volume of data that security applications produce.

To address the data security issue, a few of the latest network appliances employ data encryption and authentication techniques in a way that is transparent to the system manager.

How one treats the matter of data volume depends on the particulars of the systems involved. Access control, alarm monitoring, and even IP-based intercom systems use relatively little network bandwidth and can be ignored in most cases. The issues for most IT managers are video systems, especially those that employ IP video cameras.

Here is how security managers can take advantages of the benefits that network appliances have to offer:

Look for IP-network attached devices when purchasing access control, video, and other security systems;

Assure that they can be used from your web browser without having to install special software;

Obtain the cooperation of your IT or network manager in advance (they can be a good source of help throughout the process).

For more information contact Phil Mailes, S2 Security Corporation, 0944 1483 852181, phil@s2sys.com, or visit www.s2sys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.