https://www.teldat.com/wp-content/uploads/2024/01/Marce-Gil-96x96.jpg

TELDAT Blog

Communicate with us

SD-WAN: Enhancing corporate security

May 21, 2019

corporate securityThe Spanish Private Security Act sets different corporate security degrees or levels. Level 1 has the lowest requirements, while Level 4 corresponds to businesses or locations considered critical from a security point of view. Starting at Level 2, having a connection to an alarm monitoring center is considered mandatory (this applies to both private residences and small businesses), but it is at Level 3 where legal requirements become far more stringent. This category is reserved to locations with moderate to high risk exposure (such as financial institutions, art galleries, antique shops, jewelries, gas stations, lottery outlets, casinos, gambling halls and other locations were cash is stored or handled).

Whereas Level 2 businesses need to be connected to an alarm monitoring center, Level 3 and Level 4 locations need these connections to use a dual transmission channel. And here is where legal provisions end. The nature of such connectivity is not specified and the legal provisions themselves are almost a decade old (time in which communications have evolved significantly).

The market is simultaneously evolving and, for once, even surpassing the requirements laid down in the applicable legislation. TV adverts marketing anti-jamming security systems are on the rise, since the signal is often the weakest point. Criminals and security experts know that the efficiency of a system often relies on the covertness of its weaknesses. The majority of the systems currently in place in Level 2 and/or Level 3 locations use wireless or traditional lines that can be easily sabotaged. Therefore, having tools that can detect the availability of transmission channels through regular probing is key. Nowadays, however, the time between probes can be measured in hours (giving hackers an excellent opportunity to act).

Some current technologies, easily found in Level 2 and (particularly) Level 3 locations, provide enhanced detection features through the use of IP networks with redundant “always-on” connections. Whereas having adequate monitoring and management capabilities has a direct impact on business development, security is often overlooked, and funds barely cover the minimum requirements set by law.

Security & IP networks

The use of SD-WAN, aimed at optimizing network capabilities and their availability, is a great way to increase security in Level 2 and Level 3. Thanks to this technology, security systems will be able to use any communication line (be it wireless or fixed) that is available now (or will become available in the near future) in an easy, efficient, and quick manner.

SD-WAN solutions can also help boost the level of security in many scenarios, since they carry out checks every second that can detect sabotages almost instantly. In addition, they provide a real-time analysis of communication channels so that users can chose the best path for each application and ensure security data transfers are carried out correctly, via the alarm panel or by enabling complementary systems such as audio and video transmissions, easily added when using SD-WAN).

Security integration in SD-WAN networks

Not only can security be easily integrated in SD-WAN networks, but the process is also:

a) Profitable, since infrastructures can be leveraged
b) Reliable, since security becomes another aspect of network management
c) Simple, given that SD-WAN networks have been specifically designed to give support to several applications while providing a high level of segmentation, thus fostering coexistence, security, and interoperability. Moreover, all matters can be easily handled via a graphical user interface that is streamlined and transparent.

Teldat’s SD-WAN solution meets all the requirements security systems need in order to update and make improvements with minimal effort.

Related Posts 

The vehicle of the future

The vehicle of the future

One day, Henry Ford said: "If I had asked people what they wanted, they would have said faster horses". Twenty years later, horses had disappeared from the roads. Today, vehicles come with advanced safety, alternative fuels, and intelligent driving...

read more
Security attacks on Supply Chains

Security attacks on Supply Chains

In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent...

read more