Security Technology Executive

JUL-AUG 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/557126

Contents of this Issue

Navigation

Page 20 of 39

July/August 2015 • SECURITY TECHNOLOGY EXECUTIVE 21 www.SecurityInfoWatch.com The general benefit to wireless technology is the potential to achieve a set of objectives with a "cost-effective" solution through the reduction or elimination of cabling creating a significant cost savings upfront in the procurement/installation phase. The process of protecting assets is ever-changing as threats and risk factors evolve continuously. Image Courtesy of BigStock.com security concerns, bandwidth utilization or even interference with other wireless devices. The business decision to utilize a wireless sys- tem is much like any other investment. Deter- mining the return on investment (ROI) for this is not as simple as finding the cost difference from acquiring and installing a wireless system as com- pared to a traditional, wired system. The ongoing management of wireless devices can require more maintenance and attention in the long run. The key to making a good investment is to identify all the ways the wireless solution can create efficien- cies or reduce costs up front, while also factoring in the total cost of ownership (TCO). Vetting a new technology requires research and investigation from three perspectives: physi- cal security application, network infrastructure impact and cyber security requirements. In order to conduct a thorough evaluation, collaboration is essential with all internal stakeholders to deter- mine the required levels of cyber-defense within the product itself and how the network infra- structure can be modified to enhance the corre- sponding network security program. Referenc- es should always be used to discover how other organizations similar to yours have deployed the solution and how it has performed. Not only should an organization properly vet a product, but vetting the potential relationship with a manufacturer is also very important. The manufacturers who educate the industry on the immediate implications and long-term manage- ment requirements of deploying their product are generally the ones with the strongest ongo- ing customer support. Similarly, the manufac- turer's willingness to understand an organiza- tion's unique set of security requirements is more likely to be a valuable partner throughout the design, implementation and ongoing opera- tion processes. It used to be that wireless was thought of as city-wide mesh systems designed for connect- ing authorities with public facilities, roadways, etc. Now when referring to wireless technology it can include a vast array of: edge components, mobile command and control systems, mobile monitoring systems, video surveillance cameras and communications infrastructure. Determining the types of wireless technology to deploy should always be based on the risk assessment and iden- tifying appropriate counter measures to the risks. The reliability of a product that is somewhere between the bleeding edge and leading edge of technology evolution is often unknown. Wireless is no different. Just like every organization has its own set of requirements, the same goes for networks and the physical layout of the facility. This is where partnerships between end-user, integra- tor and the manufacturer(s) become critical. It is best to identify the integrator's experience and comfort-level with wireless technolog y early on in the due diligence process. Their ability to design a system with wireless components can determine whether or not the implementa- tion is a success. When an organization is pur- suing a wireless solution, the starting point is to invite the integrator to conduct a security survey onsite and identify the locations where the technology is to be used and how it ties into the organization's security program and busi- ness operations. Questioning the integrator early in the process about their level of train- ing both in the product line and on wireless

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2015