Yesterday’s Network was a Challenge

Fiber optics makes delivering data much easier, and the network that this information rides on is able to do the job.

Our cover story by James Marcella, director of technical services, Axis Communications, talks about giving your network a workout. His explanation about light passing through fiber makes all the sense in the world. There are many out there who would have you believe that copper wiring is the way to go. I’m sorry, it just isn’t.

Marcella puts it this way, “Copper...needs multiple amplifications to function over long lengths; the light that passes through fiber optic cable doesn’t diminish, even over many miles.”

Marcella talks about the network workout in several different ways, such as supplanting 1080p with 4K, for instance. Yes, 4K technology will surely be gaining momentum during 2015. The 4K experience is highly anticipated, and it will provide unprecedented detail. The workout also includes adding more intelligence to the edge (software) and introducing smart hardware advancements, such as auto rotation and level assistant.

Gaby Friedlander, CTO, ObserveIT, picks up inside the issue with reasons why video surveillance is not enough. The fact is that the real threat lies with users who have access to data. They are the trusted insider. More than 67 percent of data breaches involve stolen credentials in internal sources, remote vendors and other third-party contractors.

He writes that a new breed of security technology has arrived on scene, particularly that of user activity monitoring. This enables companies to track users and understand what they have done on the computer. The key: The solution starts with the user, rather than the infrastructure.

I think you will enjoy this issue of Networking Security, and as always, if you have an idea or would like to contribute your thoughts, please feel free to reach out to me.

This article originally appeared in the November 2014 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.