The Battle For Bandwidth

The Battle For Bandwidth

Don’t drive your sports car on a county road

NOT TOO MANY YEARS AGO MANAGING BANDWIDTH MEANT NOT KNOWING HOW MANY DESKTOPS WERE CONNECTED TO THE INTERNET, AND SECURITY INTEGRATION MEANT ONE OR TWO MONITORS THAT SHOWED MULTIPLE CAMERA VIEWS OF AREAS THAT MAY HAVE ALSO BEEN PATROLLED BY NIGHT WATCHMEN ON FOOT. TODAY, BANDWIDTH AND SECURITY TECHNOLOGY GO HAND IN HAND, MAKING INTEGRATION AS MUCH ABOUT THE ARCHITECTURE OF THE NETWORKS AS THE DEVICES IT SUPPORTS.

“The biggest challenge we face is old networks that are being asked to support new technology,” said Clifton Dorsey, manager of support and technical services at M3T Corp., based in Mechanicsburg, PA. “New systems are getting 10 gig backbones, but when we’re dealing with an old network, bandwidth is our biggest problem.”

Dorsey likens managing an old network with new technology to buying a Ferrari and racing it on a dirt road: you wouldn’t invest in a top-of-the line sports car only to drive it down a rough country road. You wouldn’t be happy with your investment in 20 new surveillance cameras only to find that your people can’t effectively use the Internet on their laptops because the cameras take up too much data.

Add to the mix a whole host of other devices—phones, tablets, printers, wearable technology like watches and fitness bands, and the connected routers, switches, cameras, monitors and even locks that are on your network—and you’ve got a jam-packed road with no one going anywhere very fast.

“Every minute of a slow network can mean 10-15 minutes of lost productivity because someone steps away from their computer to get a cup of coffee while they wait for an upload,” says Dorsey.

These issues are solvable, but there is not out-of-the-box solution. It starts with identifying what each stakeholder is looking for from the security technology solution. This typically breaks down into three categories and their accompanying challenges:

Security. The system needs more network to support the cameras and other technologies or it is not effective.

Network. IT often feels security is using too much of “their” network to support the security system.

Physical security. Stakeholders must identify where and how the technology will be protected, sorted and maintained, and the response plan when an event occurs.

Dorsey points out that it’s common for customers to overlook the physical security piece of the puzzle, but it’s a critical component to the system’s health and operation. And support for addressing this need is coming from an unlikely place—the payment card industry (PCI) and its stringent rules and requirements.

For example, PCI requires every cash terminal to have a designated camera, which feeds to a server, which has to sit somewhere and be physically secured. This brings the discussion back around to the network and its bandwidth—how does a system support a designated camera for each cash terminal and still give the CEO enough power to run multiple web-enabled devices, and give the office pool the bandwidth to seamlessly connect to wireless printers and other devices without lost productivity?

BRINGING THE BUDGETS TOGETHER

Helping customers understand the importance of effective bandwidth management is the key to designing a system that truly supports their needs and priorities. It takes budget commitments from every stakeholder, as well as a realistic understanding of bandwidth challenges, to bring everyone to the table.

One way to create this is through a demo. This can mean installing a camera on a current network for 30 days so the customer can experience and track its impact on data. Or it can be as simple as pulling the main Internet line to see which devices work and which don’t. For many customers, these can be eye-opening experiences that show just what’s coming across their Internet feed and how it’s spread across the enterprise.

According to Dorsey, this type of demo helps shift the conversation about the budget, and bring all departments together.

“People realize that the Internet is a company expense, not just an IT expense,” he said. “You have to treat it like a utility because everyone uses it across the business.”

Guiding the budget conversation between four or five departments puts integrators back into the role of consultant. The budget and goals conversation can also create a platform for helping customers solve their problems with flexible solutions that address all three parts of the system. For example, a discussion with customers might include a similar solution.

Security. Installing surveillance cameras for each cash terminal.

Network. Using cameras with local high-definition SD cards that deliver a lower quality feed in real-time and hold seven days’ worth of data.

Physical security. Store the servers in an access controlled location and transfer data from the SD cards in the cameras onto the server every seven days.

This kind of solution can help enterprises allocate bandwidth appropriately, maintaining effective security without reducing performance and production in areas of the business. In addition, the customer can establish an effective security solution within a workable budget—spending on cameras with flexible data storage rather than rebuilding or installing a completely new network that may be out of their budget reach.

Segmenting networks through V-LAN is another effective technique that can support the network’s architecture and the business’s data use goals, with one V-LAN for laptops and printers, another for the C-suite, and another for security. Adding QOS to your network will allow you to make sure not one thing is taking up too much of the network flow.

“Separated networks have gone from being a nicety to being a necessity,” says Dorsey.

OPENING THE DOOR TO A LONG-TERM RELATIONSHIP

Most customers have seen the grainy security videos and jiggly cell phone camera footage shown on the nightly news. Virtually no customer wants to be that organization—the one whose security system offers no usable information, visually or otherwise. Stepping back from equipment needs and focusing on bandwidth early in the conversation not only ensures you can implement an effective system, it opens the door to a strong and long-term client relationships built on supporting the needs of the business over time.

“Bandwidth is a bigger issue than ever before,” Dorsey said. “But once we show customers how it can be managed, then the technology and hardware fall into place and we’ve built a lasting relationship.”

This article originally appeared in the November 2016 issue of Security Today.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.