The Battle For Bandwidth

The Battle For Bandwidth

Don’t drive your sports car on a county road

NOT TOO MANY YEARS AGO MANAGING BANDWIDTH MEANT NOT KNOWING HOW MANY DESKTOPS WERE CONNECTED TO THE INTERNET, AND SECURITY INTEGRATION MEANT ONE OR TWO MONITORS THAT SHOWED MULTIPLE CAMERA VIEWS OF AREAS THAT MAY HAVE ALSO BEEN PATROLLED BY NIGHT WATCHMEN ON FOOT. TODAY, BANDWIDTH AND SECURITY TECHNOLOGY GO HAND IN HAND, MAKING INTEGRATION AS MUCH ABOUT THE ARCHITECTURE OF THE NETWORKS AS THE DEVICES IT SUPPORTS.

“The biggest challenge we face is old networks that are being asked to support new technology,” said Clifton Dorsey, manager of support and technical services at M3T Corp., based in Mechanicsburg, PA. “New systems are getting 10 gig backbones, but when we’re dealing with an old network, bandwidth is our biggest problem.”

Dorsey likens managing an old network with new technology to buying a Ferrari and racing it on a dirt road: you wouldn’t invest in a top-of-the line sports car only to drive it down a rough country road. You wouldn’t be happy with your investment in 20 new surveillance cameras only to find that your people can’t effectively use the Internet on their laptops because the cameras take up too much data.

Add to the mix a whole host of other devices—phones, tablets, printers, wearable technology like watches and fitness bands, and the connected routers, switches, cameras, monitors and even locks that are on your network—and you’ve got a jam-packed road with no one going anywhere very fast.

“Every minute of a slow network can mean 10-15 minutes of lost productivity because someone steps away from their computer to get a cup of coffee while they wait for an upload,” says Dorsey.

These issues are solvable, but there is not out-of-the-box solution. It starts with identifying what each stakeholder is looking for from the security technology solution. This typically breaks down into three categories and their accompanying challenges:

Security. The system needs more network to support the cameras and other technologies or it is not effective.

Network. IT often feels security is using too much of “their” network to support the security system.

Physical security. Stakeholders must identify where and how the technology will be protected, sorted and maintained, and the response plan when an event occurs.

Dorsey points out that it’s common for customers to overlook the physical security piece of the puzzle, but it’s a critical component to the system’s health and operation. And support for addressing this need is coming from an unlikely place—the payment card industry (PCI) and its stringent rules and requirements.

For example, PCI requires every cash terminal to have a designated camera, which feeds to a server, which has to sit somewhere and be physically secured. This brings the discussion back around to the network and its bandwidth—how does a system support a designated camera for each cash terminal and still give the CEO enough power to run multiple web-enabled devices, and give the office pool the bandwidth to seamlessly connect to wireless printers and other devices without lost productivity?

BRINGING THE BUDGETS TOGETHER

Helping customers understand the importance of effective bandwidth management is the key to designing a system that truly supports their needs and priorities. It takes budget commitments from every stakeholder, as well as a realistic understanding of bandwidth challenges, to bring everyone to the table.

One way to create this is through a demo. This can mean installing a camera on a current network for 30 days so the customer can experience and track its impact on data. Or it can be as simple as pulling the main Internet line to see which devices work and which don’t. For many customers, these can be eye-opening experiences that show just what’s coming across their Internet feed and how it’s spread across the enterprise.

According to Dorsey, this type of demo helps shift the conversation about the budget, and bring all departments together.

“People realize that the Internet is a company expense, not just an IT expense,” he said. “You have to treat it like a utility because everyone uses it across the business.”

Guiding the budget conversation between four or five departments puts integrators back into the role of consultant. The budget and goals conversation can also create a platform for helping customers solve their problems with flexible solutions that address all three parts of the system. For example, a discussion with customers might include a similar solution.

Security. Installing surveillance cameras for each cash terminal.

Network. Using cameras with local high-definition SD cards that deliver a lower quality feed in real-time and hold seven days’ worth of data.

Physical security. Store the servers in an access controlled location and transfer data from the SD cards in the cameras onto the server every seven days.

This kind of solution can help enterprises allocate bandwidth appropriately, maintaining effective security without reducing performance and production in areas of the business. In addition, the customer can establish an effective security solution within a workable budget—spending on cameras with flexible data storage rather than rebuilding or installing a completely new network that may be out of their budget reach.

Segmenting networks through V-LAN is another effective technique that can support the network’s architecture and the business’s data use goals, with one V-LAN for laptops and printers, another for the C-suite, and another for security. Adding QOS to your network will allow you to make sure not one thing is taking up too much of the network flow.

“Separated networks have gone from being a nicety to being a necessity,” says Dorsey.

OPENING THE DOOR TO A LONG-TERM RELATIONSHIP

Most customers have seen the grainy security videos and jiggly cell phone camera footage shown on the nightly news. Virtually no customer wants to be that organization—the one whose security system offers no usable information, visually or otherwise. Stepping back from equipment needs and focusing on bandwidth early in the conversation not only ensures you can implement an effective system, it opens the door to a strong and long-term client relationships built on supporting the needs of the business over time.

“Bandwidth is a bigger issue than ever before,” Dorsey said. “But once we show customers how it can be managed, then the technology and hardware fall into place and we’ve built a lasting relationship.”

This article originally appeared in the November 2016 issue of Security Today.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • LiftMaster Garage Door Opener

    LiftMaster Garage Door Opener

    LiftMaster Transforms the Garage Door Opener Into a Sleek Smart Home Device That Does More Than Open and Close the Garage Door 3

  • Unique Oversized ID Card Printer

    Unique Oversized ID Card Printer

    Idesco Corp. is announcing its card printer – the XCR100 2.0 printer- that allows customers to personalize oversized ID cards on demand. The printer is ideal for assisting healthcare organizations find the right badging solution. As healthcare facilities continue to combat the spread of COVID-19, issuing oversized ID cards has helped identify staff clearly while adding an extra layer of security. The XCR100 2.0 printer is the only dye-sublimation printer on the market that can personalize CR100 cards (3.88" x 2.63"). The cards that are 42% larger than the standard credit card size. The printer can produce up to 180 full cards per hour in color, and up to 1,400 cards per hour in monochrome. An optional flipper is available to print dual-sided badges in one pass. Contactless encoding comes as an option to help healthcare facilities produce secure access badges on demand and the card printer features a 2-year warranty. 3