Networking and connectivity

September 2011 Infrastructure

The network environment is changing and security installers need to take note.

AxizWorkgroup Networking business development manager, Louis Helmbold says that networks need to be dynamic, adaptable and able to handle a host of users in search of information and applications within a split second.

Louis Helmbold
Louis Helmbold

“Connectivity revolves around speed and from an internal Ethernet connection, South Africa is on track. The problem, however, lies in the bottleneck that Internet connectivity creates as far as speed and the cost of it is concerned in South Africa and Africa at large,” says Helmbold.

More providers are slowly emerging with international connection initiatives such as Seacom, providing the means for Africa to become connected to the world. “The process will however take time and the access and connectivity landscape is set to undergo a major facelift in the next year or two.”

Developments in the networking and connectivity market have propelled network security into the spotlight in the last four to five years, with security being taken to the edge of the network. “The switch at the edge of the network assists to authenticate the user. The process previously occurred at the core of the network which posed its own risks, with research indicating that nearly 80% of breaches in security originate from an internal location,” says Helmbold.

He says that user profiles are being created on the central server, which allows administrators to place boundaries on the profile. “You can quite literally shape the identity of the user granting them access from specific locations, placing limits on Internet usage and directing their access to the network. It provides better mobility and enhances security measures substantially, effectively stopping users with malicious intent dead in their tracks.”

Another big development that has changed the network environment is the need for the users to be mobile, allowing remote access to the network. “Virtualisation is providing a means to save on costs and optimise usability. Previously the lifespan of a server was pegged at around 18 months to a year, but with optimisation and virtualisation a server lifespan can be extended for up to eight years.”

Networks have effectively become more intelligent by allowing access to specific aspects of the network. Previously a large part of the network intelligence was located in the core and has now been moved out to the edge of the network. The fact that there is more intelligence at the edge of the network enables higher security, end point mobility and integrity.

“A virtual desktop grants the IT manager more power to specify and standardise which applications are used. The connection simply serves as a means of refreshing the screen, which allows traffic on the network to be minimised quite substantially,” explains Helmbold.

End point integrity plays an important role, especially from a security point of view. “It is possible to run a small application on a user’s laptop that is initiated from the network as soon as they log in. It pinpoints possible threats and the switch at the edge of the network will place the user on a quarantine network if a threat is detected. The quarantine network will contain the necessary software to neutralise the threat quickly and effectively without hampering the user,” he explains.

It is however very important to design the network correctly from day one. “Choosing your vendor is also important as it will affect costs and performance. Some vendors will give a lifetime warranty and others will specify costs for software upgrades that can be quite substantial. Read the fine print and make sure it complies with the projected lifespan of your network and server from a cost perspective. Every client needs to be assessed in their own right and the network needs to be tailored to suit their specific needs,” says Helmbold.

Technology is evolving at a rapid pace. “I foresee the networks and devices we use today changing and becoming smaller, more mobile with a small device such as an iPad acting as a means of connecting to remote workspaces.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
A whole-site solution to crack the data centre market
Fire & Safety Infrastructure Facilities & Building Management
Fire safety consultants and contractors who can offer a comprehensive fire safety solution to the data centre market can establish themselves as a supplier of a key safety features that help guarantee the smooth operation of critical infrastructure.

Read more...
Wireless network security market
Infrastructure
The wireless network security market is experiencing significant growth, driven by the increasing adoption of wireless technologies, a surge in cyberthreats, and rising demand for secure data transmission.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.