Counter Terror Business Magazine Issue 5

Page 128

EMERGENCY COMMUNICATIONS

in incident management, counter terror and business continuity, the BAPCO 2011 conference and exhibition provides an essential meeting point to discover solution technologies and services as well as cost saving options. NEW DEVELOPMENT An exciting new development for BAPCO 2011 will see live demonstrations taking place in the exhibition hall with representatives from the three emergency services working together in a rescue scenario live in the exhibition. Look out for canine device detection, body identification technology, and an abseil from the roof of the exhibition hall. In addition Excelerate will show off the latest in mobile command technology in the outdoor display at the front of the hall. The BAPCO 2011 exhibition is free to attend and open to all emergency services and local and national governmental agency professionals engaged in incident management, civil contingency response, disaster relief, business continuity and information management.

FOR MORE INFORMATION For further information please visit www.bapco.co.uk

www.counterterrorbusiness.com

The BAPCO 2011 exhibition is free to attend and open to all emergency services and local and national governmental agency professionals engaged in incident management, civil contingency response, disaster relief, business continuity and information management

DEDICATED ENCRYPTION HARDWARE IN HIGH SPEED NETWORKS A N ORGANISATION’S high-speed WAN carries the lifeblood of the business – communications and data. This could be anything from voice calls, e-mail, file server storage, database accesses and server backups. All of these contain sensitive information not only to the running of the business, but also sensitive information relating to customers. All these WAN links are vulnerable to unauthorised access, therefore potential exposure to attack is becoming an ever greater threat that could easily cost millions of pounds in damages should a breach occur, as well as cause irreparable loss of reputation. So if security is needed, then what’s the best approach? There are two things to consider: the technology you choose and how this impacts and performs on the network itself. One common approach is to integrate an add-on encryption module to a product designed to perform a different role (such as a firewall or a router). Adding encryption to a device that is meant to do something else means that you are taking some processing power away from that device’s primary purpose. Encryption at high speeds is not a simple matter – it takes considerable processing power to achieve. So all you’re

126

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY

really doing by adding encryption to a router or firewall is causing the device to perform both tasks much slower than usual. Using a product that has been designed to perform at the speed of the network will ensure a smooth and simple transition from an unencrypted network to a truly secure network, with no degradation in network and application performance. The most common encryption solution uses IP security. IPSec is a flexible solution that allows encryption between individual systems, network to network, and also from remote devices such as roaming laptop users, hand-held devices and automated systems. These encrypted connections travel over any network that runs TCP/IP, including the Internet. Due to IPSec’s flexibility and popularity it is assumed by many in the IT security industry that IPSec will work for any application over any network. There are actually two reasons why IPSec is not well suited to high speed

networks. Firstly it adds overhead to the encrypted data. Secondly, and largely due to the encryption overhead, IPSec causes information to be fragmented in order to be sent across the network. This adds even further overhead. Encrypting Ethernet traffic at the Ethernet layer avoids any overhead that IPSec creates, which means there is no loss of bandwidth. However, with IPSec encryption you can lose up to 40 per cent of your bandwidth to IPSec and fragmentation overhead. Choosing the appropriate encryption technology for your network will ensure smooth network operations, no issues with your current and future applications that run over the network, and will help to avoid any network security issues from having no encryption at all. Senetas has a range of high speed network encryption hardware, designed to operate with no overheads, providing full network throughput and certified to the highest levels, for both commercial and government use.

FOR MORE INFORMATION Tel: +44 (0)1256 345599 E-mail: enquiries@senetas.com Web: www.senetas-europe.com


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.