Getting A Hold On The Bandwith

More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.

Among concerns was protecting the network from remote hackers from anywhere in the world. With the right knowledge, the right person (I mean the wrong person) could access the system. A robust network means security software is constantly being updated to protect against new threats all the time. Another concern is bandwidth capacity.

Our cover story in this issue is from Brian Simmons, Berk-Tek, who writes that as image storage and increased resolution of cameras grow, more bandwidth is consumed to meet demands. Simmons writes about what new HD and UHD technologies have been incorporated into video surveillance.

Simmons writes about several factors that can affect bandwidth requirements, such as resolution, frame rate, streaming mode, compression and network protocols. Finally, Simmons writes about structured cabling recommendations. There is a ton of information packed into this story.

Andrew Deen, a freelance writer based in San Diego, writes about seven ways criminals are making money from cybercrime. Believe it or not, cybercrime comes in a variety for shapes and sizes. This includes data breaches, selling illegal goods, Bitcoin and the dark web, tax fraud, identity theft and using counterfeit money. Oh, and cyber criminals are not limiting fraud to coins and bills; it also comes in the form of medical, personal or financial information.

Are we completely immune to cyber-criminal activity? No. There is no way to be completely protected, but be careful what’s on the network.Be smart.

This article originally appeared in the November 2017 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.