Beyond the prevention or mitigation of a disaster such as a fire, the right connectivity solution can also help protect the enterprise from the more likely threat of unauthorized network access and data theft.
These security concerns generally fall into two categories:
- Unauthorized access by an unauthorized person can be prevented through the deployment of IP-connected
cameras, occupancy sensors, access controls and other connected elements of physical security. Physical cabling security—such as keyed connectors, secure patch cords and port blockers—
can be deployed to reduce the threat of unauthorized access. Firewalls can likewise prevent remote
unauthorized access attempts. - Unauthorized access by an authorized person can be more difficult to detect and repel since physical security may not be effective. In these cases, automated infrastructure management (AIM) solutions can automatically record and report the attachment of any unauthorized network device, including its physical location.
Implementation Recommendations
The right connectivity strategy can greatly assist in the preservation of property and information. How well these functions are fulfilled depends on the design, management and composition of the enterprise network. Here are some examples.
Security monitoring and sensors
Enhanced connectivity like that found in intelligent buildings allows for networks of IP security cameras and occupancy sensors that help spot intruders or help locate trapped personnel in the event of an emergency. With
the right cabling infrastructure, this power over- Ethernet (PoE) devices can be placed just about anywhere they’re needed for optimal coverage.
Physical port-level security
The RJ45 and LC connectors have emerged as the industry’s standard interfaces for copper and fibre, respectively. While this has greatly simplified IT architecture, it also allows anyone with a standard patch cord to attempt to access the network. Keyed connectors prevent this. Color-coded, they have special moulded features that will enable a connection only if the connector and adapter match—an ordinary connector simply won’t fit the port. Similarly, port blocking technologies also exist that would physically lock out RJ45 or LC ports when not in use.
Source: This article was originally published in CommScope’s E-book: SMART BUILDING CONNECTIVITY