Networking and connectivity

September 2011 Infrastructure

The network environment is changing and security installers need to take note.

AxizWorkgroup Networking business development manager, Louis Helmbold says that networks need to be dynamic, adaptable and able to handle a host of users in search of information and applications within a split second.

Louis Helmbold
Louis Helmbold

“Connectivity revolves around speed and from an internal Ethernet connection, South Africa is on track. The problem, however, lies in the bottleneck that Internet connectivity creates as far as speed and the cost of it is concerned in South Africa and Africa at large,” says Helmbold.

More providers are slowly emerging with international connection initiatives such as Seacom, providing the means for Africa to become connected to the world. “The process will however take time and the access and connectivity landscape is set to undergo a major facelift in the next year or two.”

Developments in the networking and connectivity market have propelled network security into the spotlight in the last four to five years, with security being taken to the edge of the network. “The switch at the edge of the network assists to authenticate the user. The process previously occurred at the core of the network which posed its own risks, with research indicating that nearly 80% of breaches in security originate from an internal location,” says Helmbold.

He says that user profiles are being created on the central server, which allows administrators to place boundaries on the profile. “You can quite literally shape the identity of the user granting them access from specific locations, placing limits on Internet usage and directing their access to the network. It provides better mobility and enhances security measures substantially, effectively stopping users with malicious intent dead in their tracks.”

Another big development that has changed the network environment is the need for the users to be mobile, allowing remote access to the network. “Virtualisation is providing a means to save on costs and optimise usability. Previously the lifespan of a server was pegged at around 18 months to a year, but with optimisation and virtualisation a server lifespan can be extended for up to eight years.”

Networks have effectively become more intelligent by allowing access to specific aspects of the network. Previously a large part of the network intelligence was located in the core and has now been moved out to the edge of the network. The fact that there is more intelligence at the edge of the network enables higher security, end point mobility and integrity.

“A virtual desktop grants the IT manager more power to specify and standardise which applications are used. The connection simply serves as a means of refreshing the screen, which allows traffic on the network to be minimised quite substantially,” explains Helmbold.

End point integrity plays an important role, especially from a security point of view. “It is possible to run a small application on a user’s laptop that is initiated from the network as soon as they log in. It pinpoints possible threats and the switch at the edge of the network will place the user on a quarantine network if a threat is detected. The quarantine network will contain the necessary software to neutralise the threat quickly and effectively without hampering the user,” he explains.

It is however very important to design the network correctly from day one. “Choosing your vendor is also important as it will affect costs and performance. Some vendors will give a lifetime warranty and others will specify costs for software upgrades that can be quite substantial. Read the fine print and make sure it complies with the projected lifespan of your network and server from a cost perspective. Every client needs to be assessed in their own right and the network needs to be tailored to suit their specific needs,” says Helmbold.

Technology is evolving at a rapid pace. “I foresee the networks and devices we use today changing and becoming smaller, more mobile with a small device such as an iPad acting as a means of connecting to remote workspaces.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhanced cellular connectivity is critical for farm safety
Infrastructure Agriculture (Industry)
In South Africa, the safety of our rural communities, particularly on farms, is a pressing concern. Nearly 32% of South Africa’s 60 million people live in these areas, where security challenges are constantly in the spotlight.

Read more...
All aspects of data protection
Technews Publishing Editor's Choice Information Security Infrastructure AI & Data Analytics
SMART Security Solutions spoke to Kate Mollett, Senior Director, Commvault Africa, about the company and its evolution from a backup specialist to a full data protection specialist, as well as the latest announcements from the company.

Read more...
Revolutionising networking technology for the future
Infrastructure IoT & Automation
[Sponsored] In the fast-evolving landscape of networking technology, RUCKUS Networks stands out as a trailblazer, offering innovative solutions that redefine connectivity experiences across various industries.

Read more...
Edge could help transform South Africa’s healthcare
Axis Communications SA Infrastructure
Edge computing has emerged as a game-changing technology for many industries, and the healthcare sector is no exception. In particular, South Africa’s healthcare industry could significantly benefit from the potential of this technology.

Read more...
Cloud platform for cyber resilience in the hybrid enterprise
Infrastructure
The Commvault Cloud brings together data protection, security, intelligence, and recovery on one platform, offering AI capabilities to defeat cyber threats, and includes integration with Microsoft Azure OpenAI Service.

Read more...
Rapid rise in DNS attacks drives demand for new approach
Infrastructure Risk Management & Resilience
As ransomware grows more sophisticated and DNS attacks become more frequent, businesses are increasingly trying to protect themselves by adopting innovative approaches and technologies to bolster the integrity and security of their backup systems.

Read more...
Majority of South African companies concerned about cloud security
Information Security Infrastructure
Global and local businesses share a common concern when it comes to cloud security. 95% of global businesses and 89% of local businesses are concerned about the security of public clouds.

Read more...
Consolidated cybersecurity management
Technews Publishing Editor's Choice Information Security Infrastructure
SMART Security Solutions spoke to Gareth Redelinghuys, Country Managing Director, African Cluster at Trend Micro, to find out what makes Trend stand out from the crowd and also its latest market offerings.

Read more...
Access to data centre secured
Suprema Access Control & Identity Management Infrastructure
GBM required a modern access control system to increase the security of its facilities in a productive environment without affecting the operation of the offices and the data centre, which are carried out 24/7/365.

Read more...
Africa’s growth lies on shoulders of renewable energy
News & Events Infrastructure
The Africa Tech Festival from 13 to 16 November in Cape Town will unpack the challenges and discuss the pivotal role of sustainability & renewable energy in advancing technological development in Africa.

Read more...