11
IP Migration for Enterprise Businesses: Readying the Network for Strategic IP Use Cases Pursue a collaborative partnership between physical security and IT teams for improved performance, security and usability of network-based applications.

IP Migration White Paper

Embed Size (px)

Citation preview

Page 1: IP Migration White Paper

1

IP Migration for Enterprise Businesses: Readying the Network for Strategic IP Use CasesPursue a collaborative partnership between physical security and IT teams for improved performance, security and usability of network-based applications.

Page 2: IP Migration White Paper

2

Contents

Reimagine the Cross-Functional Possibilities ................................ 4

Conduct a Discovery Audit ................................................................. 5

Develop a Migration Plan .................................................................... 5

Opt for Open Technologies ................................................................. 6

Prioritize Network Security ................................................................ 7

Set an Agreed-Upon Installation Schedule ..................................... 8

Conduct Regular System Maintenance ............................................ 8

Evaluate and Select Vendor Trusted Partners ................................ 9

Keep an Eye on the Future ................................................................. 9

About Vector Intelligent Solutions .................................................... 10

Building a foundation today for tomorrow’s growth. .................... 10

Delivering the applications your customers demand. ................... 10

Partnering with your objectives in mind. ......................................... 11

Special Thanks to Our Expert Contributors .................................... 11

Page 3: IP Migration White Paper

3

With the improved availability and cost effectiveness of bandwidth and storage, wide-scale interest for IP-based systems among enterprises is growing—particularly as related to physical security applications, unified communications (UC) and omnichannel customer experiences.

Today’s businesses are quickly realizing that technology advancements have made it possible to get better image and audio quality, multi-site and multi-device access, improved reliability, and sophisticated end-user applications at affordable rates. Costs no longer restrict these benefits to niche applications like they have in the past. Today, IP benefits can be reaped organization wide—via UC, video installations, access control, burglar and fire alarms, etc.—and increasingly are.

IP also future-proofs the business. Take, for example, the public switched telephone network (PSTN) shutdown. AT&T plans to remove all its copper phone lines by 2020. As a result, 14 states have enacted legislation that eliminates the obligation for local carriers to provide phone service. In these cases, a transition from analog phones to VoIP and from traditional security systems to IP and cellular-based systems, is inevitable.

IP networks provide excellent scalability, which is essential for a growing business. They allow for the seamless addition of new users, locations and equipment. Despite the positives, new network implementations cannot be viewed through a departmental vacuum. The dangers of an unsecure network are very real, including rogue and unauthorized access, information loss or leaks, increased vulnerability to malware and viruses, and more.

As IP-based applications become more commonplace across business units, enterprises should take a comprehensive approach to network infrastructure and management to ensure optimal quality, security and performance. In the case of retailers, for example, loss prevention and IT professionals require a close working relationship, and strategic technology selection and implementation. Let’s get started!

Page 4: IP Migration White Paper

4

Reimagine the Cross-Functional Possibilities

Traditionally, video cameras have been used to detect and deter theft. IP-based installations deliver additional flexibility by providing data and insight to multiple departments within the organization. With cameras, phones and other appliances connected to the network, businesses can reach new heights in regard to technology application. Examples include:

• Create better customer experiences and safer environments by using video content analytics. Personalize interactions and adjust store operations in real-time based on insight acquired.

• Assess traffic patterns of cars in the parking lot to improve flow and prevent congestion, or watch traffic in temporary situations like construction to improve transportation routes.

• Analyze in-store customer traffic to identify shopping patterns and extract sales and marketing data for improved merchandise planning.

• Better manage crowds at sporting events, rapid deployments and more by using video to understand where people are congregating.

• Dynamically re-route phone calls made to individual store locations to a call center or manager during periods of high activity for improved response times and customer service.

• Virtually audit stores, and conduct training by remotely accessing the store’s cameras.

Security professionals need to think beyond catching the “bad guys” to using technology to positively impact the larger organization and bottom-line metrics. The above are just a few of the endless possibilities available when the network and IP-based applications are viewed as an organizational asset. To get here, however, requires the right team and proper planning.

Page 5: IP Migration White Paper

5

Conduct a Discovery Audit

For a successful IP migration, begin with the right people in the room. Anytime the network is changed or enhanced, infrastructure knowledge is paramount. Bring IT onboard early. Be sure to include any solution-specific experts (e.g. point-of-sale system integrator, physical security provider, etc.) so you don’t overlook an important need or requirement.

As a group, take a detailed look at your existing network infrastructure. Document your existing applications, gaps and challenges. Use this knowledge to map out a desired future state. During this phase, think beyond initial cost savings and organizational future proofing to identify more strategic IP uses and benefits.

Many departments—including marketing, human resources and other operational departments within your organization—can benefit from a network upgrade. It is important to get these teams involved early, and to clearly spell out the reporting and data they need. Remember, moving to IP-based solutions provides improved data access and analytics that can be leveraged to enhance overall business performance.

Develop a Migration Plan

Next, develop a migration plan. This does not have to involve a total system upgrade. Depending on your existing infrastructure, it can be a more gradual, step-by-step implementation. For example, if you have a large investment in analog cameras, deploy inexpensive IP video encoders to move the cameras onto the network at a base level. There is also a need for redundant

communication paths as the number and importance of systems grows. Consider secondary networks to deploy those applications and services that are not business critical. In a retail environment, for example, video may be housed on a secondary network so that it does not interfere with critical applications on the primary network, like a POS system.

As you develop your plan, balance both network capabilities and end-user requirements. For instance, some organizations will approach IP implementations with a certain IT-approved bandwidth limit. While bandwidth can be throttled to fit within these constraints, it may not produce the video quality expected by the end user and can negatively impact image usability.

Page 6: IP Migration White Paper

6

It is often better to clearly document what the end product should look like (for video, this would be specifics on frame rate, compression and resolution), and work backward to determine the network infrastructure set up accordingly.

To ensure that everyone is on the same page, utilize planning tools to allow teams to adjust mock network settings, and then view the resulting video transmission and recording performance. This way, end users can experience a close approximation of what the video will look like during the network design phase.

During the migration-planning phase, we recommend working with an integrator (preferably someone with expertise in both networking and physical security) to fully understand the exact implications a new deployment will have on the network. Can your existing network handle the extra load? If not, how do you get there? Having these network conversations upfront can ensure the project doesn’t end with unsatisfied end users, additional costs or delays in schedule as infrastructure elements are added.

Opt for Open Technologies

When evaluating products, opt for open technologies over proprietary ones as much as possible. Open is already commonly accepted—and often expected—with consumer electronics. For example, in our personal lives, we expect our cable box to work with any TV. The same expectations should apply in a business context as well.

Open systems ensure that you aren’t locked into a specific vendor, and they allow for more flexibility in terms of network design and application integration. Regardless of the manufacturer, open products are built on published standards, making them compatible across multiple vendors. This allows businesses to use different brands and models in different areas and departments, without having to fully replace existing infrastructure elements.

Page 7: IP Migration White Paper

7

Prioritize Network Security

Network security is an often overlooked, but extremely crucial area that requires careful planning. During the network design and product selection stages, cyber security should be top of mind with everyone involved.

There are standard network security best practices that aren’t always incorporated into system designs or service plans. For example, multiple DVR products were recently found to be vulnerable to the Bash Bug (also known as Shell Shock). Because of the vulnerability, hackers could infect the DVR with malware, and subsequently gain video access or control of the DVR’s operating system. Without an ongoing effort to identify such issues, and the proper tools in place mitigate them efficiently, your overall program is put at risk.

Network and device monitoring is an important first step. Reactive and proactive services can be bundled with a “health monitoring” program to create an appropriate level of management for any networked system. From measuring uptime and status, to identifying points of failure and needed security patches, a broad range of options are available.

In addition, improper user permission levels can create organizational issues down the road, when people are able to access information or equipment that they shouldn’t be able to see. The first step in creating your security plan is to decide who will have access, in which locations and to what devices. One of the benefits of IP video is that it can serve multiple purposes. But, this also means that specific access levels may need to be established by individual and department (e.g. marketing, operations, security, etc.).

Every component of the system, including edge devices, switches, building management systems (BMS) and the PC/appliance you log into should be secured. This may mean that you can’t always go with the least expensive technology option. Instead, double check that proper security protocols are in place for each network element prior to installation, and that your partners are focused on network security at every level of the project.

With large-scale security breaches making the headlines, such as those at Target and Sony, organizations cannot leave network security to chance. Proactively ensure that established protocols and best practices are incorporated into every project plan.

Page 8: IP Migration White Paper

8

Set an Agreed-Upon Installation Schedule

Once the migration plan (complete with product selection) is finalized, get all parties to sign off on the schedule to avoid mismatched plans. For example, if the physical security team shows up to install new applications and the IT department has not yet fully deployed the network infrastructure, installation delays will ensue. This is all the more reason to have these two teams in complete alignment and managed by one vendor.

Synchronized schedules are especially important for businesses that can’t disrupt day-to-day business operations or afford a gap in network security. For a smooth deployment that keeps business running as usual, plans and schedules need to be properly communicated to all involved parties.

Conduct Regular System Maintenance

Once systems are installed, perform standard network maintenance and proactively monitor uptime, performance, security and storage. This can be done either via internal IT resources or through a qualified partner. Note that while it’s common for organizations to give up management in an effort to save costs when outsourcing, we’ve found that a managed solution is worth the premium.

If using an outside provider, have contracts and service level agreements (SLAs) in place that address all aspects of the relationship, including:

• Response times and associated costs

• Periodic maintenance schedules

• Service fees assessed

• Additional services offered (i.e. add-on network design)

Page 9: IP Migration White Paper

9

Evaluate and Select Vendor Trusted Partners

When using a partner for network design, implementation or maintenance, make sure the company is certified in the services offered. Ask questions to vet potential vendors, and request to see:

• Manufacturer certifications on the equipment that they will install/maintain

• Verification of insurance and licensure

• Case studies of similar implementations (e.g. multisite, retail deployments)

• Strategic results of implementations, beyond simply costs saved

The best vendors will be transparent in helping you build the most cost-effective and optimized network infrastructure for your organization. They will also be knowledgeable in the responsibilities and requirements associated with the sale of video cameras, including licensing and permitting requirements, and PCI DSS (Payment Card Industry Data Security Standard) considerations if integrated with POS or other sensitive data.

While historically independent service providers have handled loss prevention and network management, there are emerging integrators that are able to facilitate both functions, simplifying the process for customers through consolidated planning and implementation.

Keep an Eye on the Future

The convergence of IT and physical security is accelerating rapidly. Unified communications and video applications will soon become the standard across organizations, as their ROI and ability to future-proof the business grows more apparent

to stakeholders, and younger generations continue to enter the workforce. These individuals have grown up with mobile technology, videoconferencing and the likes, and will demand more advanced communications of their companies.

As organizations adopt more IP-based solutions, demand and availability for higher bandwidth circuits is also set to increase. With increased capacity, companies will be able to further deploy more sophisticated, intelligent applications organization-wide, perpetuating the cycle.

Page 10: IP Migration White Paper

10

In addition, the rise in smart sensors and mobile applications will create enormous amounts of data. The enterprises that figure out how to mine this information, and transform it into actionable business insights, will gain a steep competitive advantage.

Is your organization racing toward these capabilities, or hiding behind legacy technologies? Don’t stop at physical security. Now is the time to act. Position your organization to provide the personalized experiences customers crave, the business analytics your company needs to thrive, and the communication outlets employees expect.

About Vector Intelligent Solutions

Under the banner of Vector Intelligent Solutions, Industry Retail Group and Vector Security come together to meet the unique needs of multi-site businesses. From managed broadband infrastructure and services deploying a full suite of customer-defined applications to a concentrated focus on network and physical security. All delivered from a single-source provider.

Building a foundation today for tomorrow’s growth.

Our secure networks are simple, scalable, resilient and reliable, for our customers.

Delivering the applications your customers demand.

You demand broader insight to your operations at all levels. We get to know your safety needs and business objectives and design and deploy industry-leading network solutions. The result: unsurpassed business intelligence that is secure.

Page 11: IP Migration White Paper

11

Partnering with your objectives in mind.

We provide an array of services through a convenient, single- source partner. And our white glove customer care sets us apart from the competition.

Vector Security is a top 10 integrator of physical security solutions for North American retailers and multisite businesses, including many Fortune 500 companies. Today, Vector Security serves more than 45,000 national account sites across North America.

IRG, a Vector Security company, is a Gartner-recognized provider of customized managed network services designed and deployed based on customer needs and business objectives. IRG serves thousands of Fortune 1000 retail sites, quick-serve restaurants and convenience store chains. IRG was purchased by Vector Security in August 2013.

By pairing IRG’s industry-leading managed network solutions with Vector Security’s physical security solutions and analytics, Vector Intelligent Solutions is able to provide customers unmatched insight into their businesses through data analytics, intelligence gathering and connectivity solutions.

Special Thanks to Our Expert Contributors

This whitepaper was drafted based on insight derived from several industry subject-matter experts, including Steven White, corporate vice president of business development at Vector Security; Scott Dunn, director of business development for North America at Axis Communications; and David Looft, senior vice president, strategic channels at Star2Star Communications.