Page 16 - Security Today, January/February 2020
P. 16

from cybersecurity threats.
From a software perspective, a solution that was purchased
five years ago may not be as relevant as modern software that offers certified integration with other devices and systems that the previous version simply was not capable of providing. Those capabilities not only make it easier for the customer to integrate the software into other
In these cases, it makes sense to upgrade to solutions that re- main fully supported by manufacturers so that security provid- ers take advantage of the latest packages as well as performance enhancements.
While all technologies, regardless of their function, will even- tually expire, in many cases this can be predictable if you are en- gaged in a structured lifecycle management program. Security is a critically important function, and a network camera outage could potentially have dire consequences.
For example, the functional lifetime of an IP camera could be upwards of 10 to 15 years. During that time, security vulnerabili- ties will change rapidly, making it difficult for manufacturers to keep pace with the cybersecurity threat landscape.
A lifecycle management program allows end users to keep on top of what is critical in their environment and avoid the nega- tive costs associated with cyberbreaches. By including this kind of program in a service agreement, integrators can eliminate the surprise or shock that comes from unexpectedly needing to re- place a major system component.
Instead, customers will be able to plan and budget for replac- ing a certain number or percentage of devices each year rather than facing a very large and very expensive replacement of an entire system or major component. Giving customers the chance to plan their expenses, and build trust surrounding the amount of money they need to invest in a system, has the added benefit of improving the relationship between client and provider.
Keep it Going
Cybersecurity is not a one-time consideration; it is an ongoing process, one that requires constant action to maintain network protection.
Therefore, it is critical for integrators to properly select and de- ploy devices, and to ensure their customers are continually engag- ing in password management. Those same customers must also apply regular updates and patches, in addition to replacing com- ponents that may no longer be supported by the manufacturer.
It is important to ensure these practices are applied to all IoT devices across the entire network. This not only contributes to better-functioning systems, but also ensures
that all devices and systems are protected from
becoming the weakest link in the overall net-
work.
Ryan Zatolokin is the senior technologist at Axis Communications Inc.
INTERNET OF THINGS
Make us your homepage!
Our website uses responsive design to adapt to whatever device you’re using.
securitytoday.com
• Breaking news
• Relevant industry news and trends
• The newest security products
• Online product database and directory
• Trending topic and product videos
• Training through Security Today Academy
Technology | Education | Solutions
16
Go to sp.hotims.com and enter 17 for product information.


































































































   14   15   16   17   18