Wireless future

January 2010 Integrated Solutions, Information Security

While many in the security industry think the move to IP (Internet Protocol) is the only technical change they will have to deal with, the emergence of wireless technologies is making inroads into almost every aspect of security.

Of course, wireless communications is not new to the industry, as armed response companies have been using radio to transmit alarm signals for years. The new kid on the block is the ability to avoid the cost and hassles of cabling when setting up a network for sensors, cameras and so forth. And this extends into industry as well where cables are being avoided in favour of wireless connections.

Paulo Da Silva, Honeywell Field Solutions’ regional sales leader says the drive to wireless is not so much a matter of saving money on cabling or simplifying the network. In the right environment, the wireless option will help improve safety, optimise the environment and assist in ensuring compliance. Da Silva does note that wireless is not the silver bullet as it is a “complex enabling technology that requires deliberate consideration before broad deployment.”

One of the positives is maintenance. If a wireless router is down, it is easy to identify and replace it; there is no need to check cables. Similarly, upgrading to new technology is also easier as you do not have to ensure your cables are capable of handling the traffic. And then there is the freedom of movement; if you need to move a device you simply move it without worrying whether there is an access point nearby or gluing cables to the wall.

From a security perspective, cutting a cable can disable a traditional network, while a broken wireless router is easy to spot and fix. In some instances, a business may require that specific emergency messages get through to control rooms or equipment immediately and these situations could see some technicians more comfortable with wired networks.

Another potential benefit of cabled systems is Power over Ethernet (PoE), explains Da Silva. PoE means your UPS or generator can power your network switches and the attached devices when Eskom switches off. Naturally, many wireless devices can run off batteries as well, but this can add the hassle of battery management to someone’s schedule.

Another benefit of wireless networks is it is also possible to have separate networks in the same area without infrastructure hassles. For example, one network could be reserved for critical communications and prevent any non-crucial business data from hogging the bandwidth. Of course, the cost of a wireless system is rather high and this is the current disadvantage of these solutions.

Finally, the question of the security of the network itself must be considered. It is possible to hack wired systems, but you have to have a connection to the system (if your network is connected to the Internet this is another aspect to consider). On the other hand, wireless systems can be compromised from a reasonable distance away, opening them to additional security issues.

While wireless is certainly an option that more companies in a variety of industries are getting comfortable with, it is a new technology that offers significant cost and time saving advantages that requires serious consideration by industry players. They say change is as good as a holiday and as always, intelligent design and careful planning will determine the right solution for each situation – as change is what drives progress.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.