Network Authentication - 802.1X
Security devices are mostly located at the physical edge of the network. Detection devices, such as cameras, are installed in places that are accessible by the public. As these devices are connected to the network, this also increases the risk of unwanted access to the network: people could try to disconnect the security device and connect their own equipment to try to gain access to the network, or attach pass-through equipment to try a so-called a man-in-the-middle attack. There are several ways of mitigating such attempts: get the answers in the white paper here.
Security of Security Data
From ecrypting streaming data to securing equipment racks, we've been covering the 'data security' topic for quite some time. It's growing in importance due to high profile breaches, including government agency breaches such as the more than 50 that occurred recently at the Federal Reserve. Read about those breaches here.
We've summarized the information and many of the resources to help you stay on top of this topic:
- IP Video and Data Security Guidebook
- 3 Common Security Hacks
- Data Security Leaflet
- Securing Data and Equipment Racks
- Encryption of Intrusion Detection Systems
- Security of Security
- Security Encryption and Certificates FAQ
- Lessons learned from major health care data breaches
- Contact our team for expert security advice
Contact Us For FREE Assistance