By David Alessandrini

The “Do it Yourself” video security systems are all the rage in the residential market, enabling home owners to easily monitor who is coming to the front door, watch when children come home after school or to track package deliveries.

While these easy-to-deploy and use surveillance systems have introduced surveillance technology to the residential market, it’s important to remember that these systems are not suitable for enterprise and corporate level surveillance needs.

First, DIY camera systems do not allow you to switch out the camera that comes as part of the DIY surveillance kit. All components in the kit have to be by the same brand in order to work together.  This means that if you need a camera to provide clearer images at night and the cameras in your system do not do that, you are stuck with using the camera included in the box.

Second, these kit-based surveillance systems do not offer scalability. It’s important to ensure that any surveillance system installed can grow as security needs evolve and grow. Should a location need an additional camera to provide increased coverage in a parking lot, for example, many of these systems cannot accommodate even one additional camera.

Another area not typically taken into consideration is storage needs. The DIY surveillance kits often have limited storage capabilities, especially when trying to ensure that the system records usable, quality video. Many of these systems also do not provide enough storage needs to follow best practices for archiving surveillance.

Many people think that the DIY surveillance kits offer more features, but business and commercial users of these systems actually lose capabilities. Often it will also cost them more money by investing in a surveillance system that doesn’t fully meet the needs of their business.

While it may be tempting to install a DIY surveillance system, it’s best to work with a professional security systems integrator to design and install a commercial grade surveillance system customized for specific businesses’ needs.  Commercial clients have greater requirements than residential surveillance system users, where the lack of video to show a staged slip and fall incident in a parking lot can mean the difference between winning or losing a lawsuit.

By Craig Jarrett

Silicon Valley was ahead of the curve 15 to 20 years ago when it recognized the importance of securing the IT closet. Today, the rest of the business world is finally catching up, understanding that it is critical to ensure the servers that run a business are just as secure as the front door or business itself.

Securing the IT room has become top-of-mind for companies both large and small. It’s important to only grant access to those who are to permitted to enter into these areas as they contain sensitive information on customers, employees and the business itself.

Only a few years ago it was not uncommon for a company to locate servers out in the open, sometimes in a mailroom or another common area that could be frequented by employees or delivery people. This all began to change with the introduction of government compliance requirements such as Sarbanes-Oxley and HIPPA, which were implemented to protect privacy and data.

Now, publically traded companies need to show compliance with securing their data. This includes providing an audit on who has access to the IT room, even a technician who may be accessing the IT room to set up a system.

The systems now in place to protect the IT room can vary dependent upon the business and their specific security needs. Some implement a simple card reader or keypad on the door, both of which can easily manage and monitor who gains access to the room and at which specific time. Others, such as financial institutions and online retailers, have invested in two-factor authentication or require two people to enter and leave the room at any given time.

Beyond access control, some businesses have even taken securing their IT closet to another level by also installing surveillance cameras to visually monitor the area or vibration and sound sensors to detect an attempt to drill into the room from an adjoining location.

As part of the checks and balance process, it is also a good practice to have a reapproval process every six months, thereby ensuring that if a person no longer requires access to the IT closet it is removed from their credential.

At a bank, a person cannot get into the bank vault unless there is a real need. The IT closet is much the same, containing valuable information, and as such are now protected in a very similar manner.

The post Securing the IT Closet appeared first on Security-Net Blog.

Source: Security-Net Blog