SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Full-Colour HDCVI Bullet Camera

    Dahua Full-Colour HDCVI Bullet Camera

    Hikvision All-Rounder Traffic Camera

    Hikvision All-Rounder Traffic Camera

    ASSA ABLOY Incedo™ Business

    ASSA ABLOY Incedo™ Business

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Auto Group Entrusts Robotic Assistance Devices ROSA To Protect People, Property And Cars
    • LenelS2 Delivers Contact Notification Service To Support Healthy Buildings
    • SAFR Facial Recognition For Live Video Integrated With Geutebrück VMS
    • Acronis Launches A New Partner Portal To Provide Enhanced Marketing And Sales Capabilities To The Service Providers
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Disruptive Innovation Providing New Opportunities In Smart Cities
    • What Are the Physical Security Challenges of Smart Cities?
    • New Markets For AI-Powered Smart Cameras In 2021
    • How Technology Can Elevate Guest Services And Their Security
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ

    IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Climax Technology Launches GX-DT35B Smart Care Medical Alarm To Keep Seniors Safe

    Climax Technology Launches GX-DT35B Smart Care Medical Alarm To Keep Seniors Safe

    Vanderbilt Secures A Hospital In Ireland With Access Control Integrated Solutions

    Vanderbilt Secures A Hospital In Ireland With Access Control Integrated Solutions

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Capture New Opportunities With Computer Vision And Video Analytics

    Capture New Opportunities With Computer Vision And Video Analytics

    Shifting Trends in Operation Centers and Control Rooms for 2021

    Shifting Trends in Operation Centers and Control Rooms for 2021

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    Critical Event Management: The Digital Transformation of Safety and Security

    Critical Event Management: The Digital Transformation of Safety and Security

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Hanwha Techwin America
    • Eagle Eye Networks
    • Security & Safety Things
    • Software House, Tyco International
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Are Your Technology Providers Keeping You In The Dark?

    Are Your Technology Providers Keeping You In The Dark?

    Facing the Ever-evolving Hacker Head-on

    Facing the Ever-evolving Hacker Head-on

    Ensuring Cybersecurity Of Video

    Ensuring Cybersecurity Of Video

    Four Areas to Consider in Frictionless Access Control

    Four Areas to Consider in Frictionless Access Control

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Intrusion detection

We Need To Talk About Intelligent Enclosure Protection

We Need To Talk About Intelligent Enclosure Protection
Iain Deuchars
Iain Deuchars
Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Related Links
  • Securing Empty Premises: Product Performance Is Everything

Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker.

This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure.

Charged service for enclosures

This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures.

Why has that security level not been so readily taken into the outside world, into the unprotected environment?

More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door.

While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education.

Network connection, easy point of cyber attacks

Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point.

Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world.

Enclosures can be broken into by attackers

Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature.

Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device.

Twofold cyber security

People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking

Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack.

So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures.

Deploying smart sensors and detectors

But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution.

For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version
  • Network / IP
  • Video surveillance systems
  • Video surveillance equipment
  • IP video surveillance
  • Security systems
  • Video security systems
  • Electronic security systems
  • Business security systems
  • Physical security
  • Perimeter security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Surveillance cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Network monitoring
  • Asset tracking
  • Video motion detection
  • Electronic access control
  • Intrusion detection
  • Building security
  • Facility security
  • Network cameras
  • Door security
  • Door access control
  • IP Surveillance
  • Security service
  • Video surveillance solutions
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Security communication
  • Barriers
  • Perimeter protection
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Data Security
  • Warning Devices
  • Smoke Detection
  • Incident Management
  • Cloud security
  • Mobile access
  • Video surveillance
  • Touchless Security
  • Related links
  • Proximity Access control systems & kits
  • Network IP cameras
  • Standalone / Networked Access control systems & kits
  • Indoor/Outdoor IP Dome cameras
  • ACT Access control systems & kits
  • Vanderbilt Access control systems & kits
  • Vanderbilt Intruder detectors
  • Articles by Iain Deuchars
  • Related categories
  • Access control systems & kits
  • Intruder detectors
  • IP cameras
  • IP Dome cameras
  • Barriers
  • Video motion detectors
Featured white papers
Optimize Your Business with Analytics and AI

Optimize Your Business with Analytics and AI

Download
How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

Download
Schooling the Market on Education Security

Schooling the Market on Education Security

Download
Related articles
Foxstream Joins Hikvision’s HEOP Program With Embedded FoxIntruder Application For Thermal Cameras

Foxstream Joins Hikvision’s HEOP Program With Embedded FoxIntruder Application For Thermal Cameras

Videcon Launches Concept Pro X

Videcon Launches Concept Pro X

SmartWater Launches Revolutionary Security Product, SmartTag To Help Protect Professional SIA Accredited Security Officers

SmartWater Launches Revolutionary Security Product, SmartTag To Help Protect Professional SIA Accredited Security Officers

Follow us

Sections Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos March 2021 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec