Archive for June, 2018

When Prince Harry Met Access Management

Friday, June 29th, 2018

With the wedding of Harry and Meghan behind us, the media is engaging viewers with other world events and we are back to our day to day lives. While security professionals are busy preventing enterprise identity theft vulnerabilities and cybercriminals are on the lookout for their next credential heist, the rest have put Buckingham Palace on the back burner. What is the connection?

Take a moment to think about the logistics surrounding the wedding on May 19, 2018: Thousands of reporters were present, and yet many details were not announced until days before – or even the actual day of the wedding, with particular protection around the secrets about Meghan’s dress, manufacturer and designer.

It turns out that the dress was designed by Givenchy, a brand that Duchess Markle had been a fan of for many years. Apparently, part of the secret of keeping the dress a surprise involved two small teams who signed nondisclosure agreements and then undertook their activities at private workspaces in Paris and in London. Miraculously, the secret dress stayed under wraps until the actual day of the wedding.

Sample Confidential Wedding Dress Policy in Access Management Solution

Web access management for secure collaboration?

Were the email messages sent and received by the designers and garment workers encrypted? Which employees of Givenchy had access to which applications and which credentials did they need to access the designs? Were the nondisclosure agreements signed physically or digitally; were they authenticated and stored over the internet? Which Royal Family staff and Givenchy personnel had access to the mockups and revisions?

Hard to confine digital data

While the interworking of Givenchy and the Royal Family network will remain privileged, it seems that part of the reason for the success of the secret was that the work was confined to locations which were secured physically. However, this is not always possible while working on designs of a global nature. Industries today no longer work in physical isolation. Their work environment has become increasingly complex due to the globalisation of markets, the distance between industrial partners, suppliers and codesigns methodology involving remote workers.

Cloud-based collaboration requires identity and access management

What’s more, the fashion industry and other global enterprises often collaborate on Computer Aided Design (CAD) software alongside cloud-based applications, such as Box, Dropbox, Adobe Creative Suite and Office 365. These are just some of the applications that can help organizations transfer large files, exchange email and even work simultaneously on the same online platform. In addition, enterprises require reports that provide visibility into login attempts into their ecosystem. An identity and access management solution as a service (IDaaS) can help fashion enterprises or governmental institutions ensure that only the right person receives the right information at the right time, without endangering the enterprise or its end customers.

Access Management Fashionable

The following are tips for a fashion company seeking to establish an access management strategy to suit working within and across diverse locations with multiple providers, suppliers and privileged staff:

Tidy up your groups

Make sure that your user groups are neatly defined in your Active Directory or other user store. This will make it easy to set up group-based policies. For example, designers should be associated with the designer’s group, and likewise for your Marketing, Finance, Sales, etc.

Establish a single sign-on baseline, aka, a global policy. Depending on your security concerns, you may want to have a high or low-security threshold for launching a single sign-on session. You may want to deny all access by default, or alternatively, grant access on the condition that users launch an SSO session after performing strong multi-factor authentication.

Determine which scenarios or resources require extra security

Not all apps require the same level of security. By listing the resources or conditions that require special care, you can match risk policies to user needs, without sacrificing the convenience of single sign-on. For example, you may want to step up security—after launching a single sign-on session—for applications that store new haute-couture designs. Or, you may want to ensure that anyone accessing applications from outside the office does so providing an additional form of authentication (e.g. one-time passcode, PKI smart card etc.).

Set up policies to demonstrate regulatory compliance

Need to ensure GDPR compliance? Or perhaps PCI DSS? By setting up a policy dedicated to that regulatory mandate, you will be able to easily meet compliance audits. A GDPR policy, for example, could include all the apps that store EU citizen data, the user groups that should have access to that information, and the user access controls you want to enforce. For example, requiring only a password within the office, while enforcing multi-factor security for anyone working remotely or anyone working as a temporary contractor.

Keep scalability in mind

Looking to add an additional app to your fashion arsenal? Keep in mind that protocols such as SAML and OpenID Connect will help you provide that convenient user single sign-on experience. If your prospective solution supports those standards, that will be one less obstacle to productivity and chic.

From outsourced workers to the most restricted and privileged personnel, the fashion industry can be assured that the seams of their cloud-based applications are as secure as their physical hems.

Ready to design secure, yet convenient access management for your enterprise? Start with your first stitches by downloading the Matching Risk Policies to User Needs Fact Sheet or register for free to watch our demo of SafeNet Trusted Access.

View the original article at

Bridging the digital divide with connected school buses

Wednesday, June 27th, 2018

It may be 2018, but millions of low-income American households with school-age children still don’t have access to a broadband internet connection. This preventable digital divide has created a “homework gap,” with students from low-income families often finding it difficult to complete their school assignments without a reliable and fast internet connection.

Equipping school buses with Wi-Fi is one way to help students achieve digital equity and enable them to more easily complete their homework in a timely manner. As Keith Krueger, the CEO of Consortium for School Networking (CoSN) notes, Wi-Fi can be used to transform school buses into study halls. “This is today’s civil right – ensuring that all students have access to equal educational opportunity in a digital world,” he says.

Indeed, connected school buses will enable students to access their PowerSchool or other learning management

system (LMS) – while on the road – to check grades and school assignments, read class bulletins and email their teachers. Students can also access Google Classroom (or Google Docs) to view, edit and download/upload homework. In addition to providing broadband during the commute to and from school, connected school buses can benefit students traveling to extracurricular activities, such as sports events. Because missed study hours are often made up at home after practice or games, a Wi-Fi-equipped bus can help students get to sleep on time.

Since U.S. students spend approximately 520 million school days on buses each year, the idea of enabling connected school buses has caught the attention of numerous companies and organizations. For example, Google is working with educators to install Wi-Fi on buses across multiple school districts, including Caldwell County (North Carolina), Berkeley County (South Carolina) and the Deer Trail School District in Colorado. Ultimately, Google plans to provide service to 70 buses in 16 districts – primarily in rural areas where children often have long commutes and may lack high-speed broadband at home.

All aboard the Wi-Fi-enabled school bus

Wi-Fi-equipped school buses can also help bolster passenger safety by transmitting real-time data from a range of smart cameras, sensors and GPS units. According to Curbed, a number of school districts have begun embracing various forms of connected technology on buses, such as GPS units in Boston and RFID-enabled badges attached to student backpacks in Cincinnati. Nevertheless, Jennifer O’Neal Schiess, a principal at Bellwether Education Partners, emphasizes that in an era of Tesla and Uber, school bus technology has barely budged forward, with only a third of school districts tracking their vehicles using GPS. Moreover, Mega Bus and other touring coaches routinely offer free Wi-Fi for multiple devices, along with air conditioning and power plugs. It is clearly time for school buses to do the same. “Innovation that’s permeated the transportation world hasn’t [yet] permeated the educational world,” says Schiess.

In addition to helping to improve passenger security, parked smart school buses can double as mobile Wi-Fi hotspots – offering underserved communities reliable broadband access when the vehicle is not being used to transport students. Similarly, Wi-Fi on smart school buses can be used at local parks, or off-campus school-sponsored events such as fund-raising events in parking lots and community cultural events in open areas.

Creating rolling classrooms with the Ruckus M510 Access Point (AP)

Whether in the classroom or a rolling study hall, we believe a reliable wireless network that scales to accommodate an evolving digital learning environment is the cornerstone of a solid educational foundation. This is precisely why the Ruckus M510 Access Point (AP) is designed to provide mobile Wi-Fi with LTE backhaul, thereby enabling expanded coverage and redundancy for students on smart school buses in rural areas.

The Ruckus M510 AP also features 802.11ac Wave 2 with BeamFlex+ antennas – and supports 2×2:2 spatial streams along with MU-MIMO. This allows the M510 to deliver high coverage efficiency and sustained downlink throughput of up to 150 Mbps (when using the LTE backhaul). Moreover, the M510 AP can be centrally managed with other Ruckus APs, thereby simplifying operations and eliminating the need for a separate mobile hotspot management system.

Interested in learning more about how you can help bridge the digital divide by transforming school buses into rolling classrooms? Contact Net-Ctrl on 01473 281 211, email or submit a contact form.

View the original release by Richard Nedwich at the Ruckus Room.

Ruckus SmartZone: The First Network Controller-Based System for Wired and Wireless

Tuesday, June 19th, 2018

Network complexity has significantly increased in recent years. Consequently, operators, managed service providers (MSPs) and large enterprises are finding it more challenging than ever to control network administrative costs.

To reduce overhead, these organisations are clamoring for an all-in-one solution that securely streamlines the control and management of multiple IT elements within the network. In addition, MSPs offering networking-as-a-service (NaaS) demand a solution that offers architectural flexibility and scalability to address heterogeneous, multi-tiered tenancy requirements, along with hybrid data, control and management topologies to support a myriad of service offerings.

These organisations also need a lineup of network business intelligence (BI) features, such as advanced reporting and detailed analytics, along with intuitive user interfaces (UIs) and custom data-rich dashboards with streaming (open) API support. In addition, operators require their own management tier, as well as administrative tiers for direct customers or multiple tiers of administration offered via downstream smaller MSPs.

Simplifying converged network management

Today, Ruckus is announcing the availability of SmartZone™ network controllers – newly enhanced versions of its SmartZone WLAN controllers – powered by the latest release of its SmartZoneOS software. SmartZone network controllers include physical and virtual appliances designed for operators, managed service providers and mid-to-large sized enterprises.

First introduced in 2015, SmartZoneOS-powered controllers combine scalability, tiered multi-tenancy, architectural flexibility and extensive APIs into a single centrally-managed console. These capabilities enable operators to implement complex, multi-tier and as-a-service business models using their own management applications.

They also allow organisations to manage subscriber data traffic on a massive scale and integrate traffic flows and network data into existing network architectures. SmartZone network controllers further enable enterprises to simplify network management through consolidation and use of built-in troubleshooting and analytics tools. SmartZone provides a multi-language user interface (UI) that powers a data-rich dashboard for health and traffic analytics and visual troubleshooting tools. It should be noted that SmartZone is deployed in thousands of enterprises – and in more than 200 service provider networks on five continents.

Enabling networking-as-a-service

The SmartZoneOS reduces the need for complex command line interface (CLI) gymnastics by providing open, well-documented RESTful application programming interfaces (APIs) that allow IT to easily invoke SmartZone functions and configurations, enabling error-free automation. In addition, streaming APIs help IT to monitor – in near real-time – the full array of Ruckus network data, statistics and alarms, thereby facilitating the easy creation of customised, information-dense dashboards and reports within their own applications.

Moreover, SmartZone network controllers simplify the creation of consistent network access policies across a wired and wireless network – with tailored firmware/software updates throughout the network to ensure trackable version control and accurate (version-specific) reporting. SmartZoneOS 5 includes an automated switch discovery feature and supports switch restoration to the last configuration point in time.

Additional SmartZone network controller features include:

  • Switch registration, authentication, backup and restore capabilities
  • Supports adaptive band balancing, load balancing, airtime fairness, hotspot and guest services, as well as capacity-based admission control
  • Supports hierarchical switch groups, network health monitoring, alarms and port status
  • Support for switch traffic statistics, LLDP neighbors, stand-alone and stacking
  • Rogue AP detection and mitigation, URL filtering, automated enhanced client security/DPSK, two-factor authentication and isolation white list
  • Easy PCI readiness and geo-redundancy capabilities
  • Data-plane flexibility for hybrid data routing topologies
  • Tunnel traffic routing to multiple third-party gateways
  • Service provider support for tiered SLA offerings
  • Multi-tiered tenancy architecture for segmented operating domains, admin boundaries and profile isolation

To recap, Ruckus’ new SmartZone network controllers – which support up to 450K devices – are an all-in-one solution for operators, managed service providers and mid-to-large sized enterprises seeking to simplify managing both wired and wireless networks through a single console – and offer networking-as-a-service that supports customisable tenant-view dashboards built from a comprehensive set of RESTful and streaming APIs.

View the original press release from Ruckus.

Ruckus Unleashed is now faster, stronger and easier

Tuesday, June 12th, 2018

Ruckus has rolled out their Zero Touch Mesh feature as part of the latest Ruckus Unleashed 200.6 update. The update enhances our pre-existing SmartMesh wireless meshing technology which is designed to dynamically create self-forming, self-healing mesh networks.

SmartMesh makes it simple to blanket every corner of your space with reliable Wi-Fi coverage – while eliminating the need for cumbersome radio planning and expensive cabling to every access point (AP). Now with Zero Touch Mesh, you can skip the mesh configuration priming process – as Mesh APs already installed in their permanent locations will auto-discover, auto-provision and auto-form a mesh network securely without priming. This means you can set up your entire Wi-Fi network in a few simple steps, whether using a mobile device or browser.

In fact, Ruckus recently hosted an Unleashed AP configuration competition during an event. All participating contestants successfully configured their respective APs in under two minutes. This puts into perspective the ease of installing Unleashed APs. With Zero Touch Mesh, the installation of an Unleashed network is dramatically simplified.

Unleashed networks can be easily managed by anyone – no expert IT staff required. You can manage Unleashed networks from anywhere in the world with the free Unleashed Mobile app. The app’s dashboard displays all the essential information about your network, while providing access to key administrative tasks and troubleshooting options.

Beyond Zero Touch Mesh, Unleashed 200.6 adds a slew of new features and enhancements to provide you with more robust control over your networks. For example, you can now define policies to restrict Wi-Fi speed for users at the application level. This is because application rate limiting and QoS traffic shaping rules can be created, along with application denial rules. Plus, all your end-point devices can be easily renamed, while your admin password can be easily reset within the Unleashed Setup Wizard.

Unleashed 200.6 also makes it easier for you to quickly troubleshoot wireless networks. With the Unleashed (browser) dashboard or mobile app, you can now precisely pinpoint technical issues, such as why the internet is down, why a specific device is unable to connect to Wi-Fi, or why an AP has rebooted.

Additional Unleashed 200.6 key features and enhancements include:

  • Expansion of the Unleashed AP portfolio with the: C110 (Wave 2 wall plate AP with built-in DOCSIS 3.0 cable modem), E510 (embedded Wave 2 outdoor AP with external BeamFlex+ antennas) and the T310 (entry-level Wave 2 outdoor AP with integrated BeamFlex+ omni or sector antennas).
  • Same WLAN support for multiple social media logins: Existing Social Media login methods (Facebook, Google, LinkedIn and Microsoft) can be used simultaneously on the same WLAN.
    WeChat WLANs: New social media WLAN type – WeChat – is now available.
  • AP Ethernet port status: The web UI displays information on AP Ethernet port status, including link status and link speed.
  • Unleashed Multi-Site Manager (UMM) Connectivity: Enables connectivity from UMM to an Unleashed Master AP behind a NAT firewall. Unleashed will initiate an SSH tunnel when the “Enable management by Unleashed Multi-Site Manager” option is selected, allowing TR-069 protocol traffic to traverse the firewall.

View the original post at The Ruckus Room.

Gemalto launches virtualised network encryption platform

Monday, June 11th, 2018

Gemalto, the world leader in digital security, today announced the launch of a new virtualised network encryption platform, SafeNet Virtual Encryptor CV1000 as part of its continued investment to address the rapidly changing data security needs of organisations worldwide.

(Gemalto will host a webinar entitled, “Network Encryption at the Flip of a Switch: Implementing Virtualised Network Encryption to Secure SD-WANs”, on June 21st at 3pm Central European Time. Click here to register.)

Today, enterprises and service providers are increasingly using network functions virtualisation (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organisations cost and operational benefits because they move network functions from dedicated network encryption hardware appliances to virtual servers. However, these technologies can also present additional security challenges for protecting sensitive data that runs across these networks because of their virtualised architecture.

Leveraging the proven security and performance of the hardware-based SafeNet High-Speed Encryptor family, the SafeNet Virtual Encryptor CV1000 is a hardened virtual security appliance designed to secure data in motion across both software-defined wide area networks (SD-WAN) and traditional networks. Developed by Gemalto’s high-speed encryption partner, Senetas (ASX:SEN), the SafeNet Virtual Encryptor CV1000 can encrypt data in motion at data-rates up to 5 Gbps.

“More and more organisations are embracing the advantages of virtualised networks to deliver cost-effective scalability, flexibility and network management to the network edge. Consequently, network services require trusted virtualised encryption for optimum data security,” said Todd Moore, senior vice president of Encryption Products at Gemalto. “Gemalto’s launch of a virtualised network encryption platform redefines network data security by providing the crypto-agility required to ensure sensitive data and transmissions remain secure, regardless of network design.”

Transforming the network encryption market, SafeNet High-Speed Encryptors are the first to offer Transport Independent Mode, which enables organisations to encrypt data across mixed high-speed WAN links (Layers 2, 3 and 4). Organisations can now be assured that they are getting the best performance and secure encryption, regardless of the network layer. This feature is currently available for the SafeNet Virtual Encryptor CV1000, and will be available for the hardware-based SafeNet High-Speed Encryptors later this year.

“As organisations increasingly embrace cloud-based applications and their use of multiple network types from Ethernet to MPLS, Senetas and Gemalto are ahead of the curve in providing seamless concurrent multi-layer network traffic encryption to ensure the best in network security and performance available today,” said Andrew Wilson, CEO of Senetas.

Key Features and Benefits of the SafeNet Virtual Encryptor CV1000 include:

  • Virtualised Network Functionality reduces dependence on dedicated network encryption hardware appliances for both enterprises and network operators.
  • Reduced Cost of Ownership makes the SafeNet Virtual Encryptor CV1000 up to 10 times more affordable than hardware-based appliances.
  • Rapid Deployment and Scalability enables organisations to spin up a virtual machine to protect data across the network rather than having to physically deploy hardware at each end point.
  • Crypto-Agile Encryption Across All Network Layers with Transport Independent Mode, providing the ability to encrypt traffic across Layers 2, 3 and 4 with optimised performance and robust encryption, including support for custom algorithms.
  • Combined Encryption Key Management option, integrates with SafeNet KeySecure for enhanced key lifecycle management.

Supporting Resources

View the original article by Gemalto.

4 Great Ways IoT Improves Hospitality Guest Experiences & Operations

Monday, June 11th, 2018

The Internet of Things (IoT) is opening up an entirely new realm of applications for hotels to enhance the guest experience and make hotel operations more efficient. However, IoT is fragmented, and services are delivered through a variety of wireless protocols including Wi-Fi, Bluetooth Low Energy (BLE) and Zigbee, which is where one of the significant challenges resides. The typical IoT network design includes building and managing multiple IoT networks built for each wireless protocol. A BLE network supports one or multiple BLE IoT apps. Another Zigbee network supports one or more Zigbee IoT apps. Add the Wi-Fi network and hotels soon have a complex set of networks that is challenging and costly to maintain and support. These challenges are hindering the adoption of IoT technologies.

The Ruckus IoT Suite was built to solve this challenge by enabling one converged network including Wi-Fi and IoT (BLE and Zigbee) to support virtually unlimited services. Having one network to maintain and support dramatically simplifies the overall network design and significantly reduces both CapEx and OpEx associated with building and managing the Wi-Fi network and IoT apps.

Ruckus is also partnering with innovative technology leaders to make it even easier to add IoT services to hotels that help to improve the guest experience and improve hotel operations.

To get you started, here are 4 great ideas.

1. Guest convenience with digital keys

Ruckus partner ASSA ABLOY lets hotel guests use their smartphones as digital keys. Guests can check in with their smart device and choose their preferred room, then the system generates an encrypted digital key that is delivered to their device. That allows guests to bypass the reception desk on arrival and gain easy, secure access to their room. Digital keys can also be reconfigured for late-checkouts or room changes without the guest having to go to the front deck. The Ruckus IoT Suite eliminates the need for a separate Zigbee gateway, allowing a single converged Zigbee / Wi-Fi network.

2. Provide panic button for staff for fast emergency response

Keeping hotel staff and guests safe is a top priority. Another Ruckus partner,, has created a panic button that can be assigned to staff members or guests to assist management during an emergency. You can locate employees in real-time so emergency personnel can respond more quickly. With real-time location sent to a central monitoring dashboard, this information can also help building managers restrict access to unsafe areas, with an easy-to-deploy network of stationary and mobile alarms.

3. Guide guests with mobile wayfinding

In large hotels, you can help guests get to their destination quickly and efficiently by providing directions to their destinations such as restaurants, shops, swimming pools, gyms, and more. These services can also improve guest safety and security by helping them avoid hazardous areas—and can help you locate anyone who might have accidentally wandered into those environments.

4. Send location-based content and offers through push notifications

Send relevant content and offers to hotel guests for a great on-site experience that can also help increase revenue. Personalized communications using IoT beacons and proximity marketing can increase the number of point-of-interest visits and purchases while improving hotel guests’ engagement and loyalty.

The potential IoT services are virtually unlimited. All four of the above apps are possible with the Ruckus IoT Suite on a single converged Wi-Fi / Zigbee / BLE network. This helps hospitality service providers and hotels overcome the complexity and high costs associated with other IoT implementations.

Read the original post by Scott Heinlein at The Ruckus Room.


Net-Ctrl Launch Mobotix Health Check Service

Friday, June 1st, 2018

Over time your Mobotix IP-CCTV solution may need some tender-loving-care to make sure it is in optimal condition and really delivering what it’s capable of achieving. For example, over time small tweaks and adjustments may be required due to a change in your built environment, a change in your requirement or through the application of a new future release.

Net-Ctrl is an experienced Mobotix integrator and is able to offer all new and existing Mobotix accounts the opportunity for a trained IP-CCTV engineer to visit your site to run a system health check. This would review your current set-up, to make these tweaks and adjustments and then put forward any future recommendations for your system.

Each site would be review beforehand so we can understand your unique requirement and any potential challenges you face. We will then review the amount of time required to achieve these and put forward an action plan. Whilst we’re on-site we can also incorporate some product training with you and your team, depending on time availability.

Below we have outlined what could be included in your Mobotix Health Check:

  • A full review of your site to check camera locations, camera body/housing condition and what the camera is recording and whether its view is obscured.
  • To take an overall screen capture/export of the cameras in MxCC showing camera IP address and serial number. Review the state of all cameras.
  • To review the image quality of each camera to check if the image is in focus or if there is any degradation in the image. We will check the sensors as older models may produce ghostly images or show bright pixels obscuring the image.
  • We would check the camera firmware and upgrade the system, where necessary.
  • Check the storage/SD card flash wear if using MxFFS, where possible we will also check available storage on your NAS and review whether there is sufficient storage available and whether there have been any recording errors.
  • Check camera video playback to make sure it’s working as expected and ensure that there are no corrupt recordings.
  • Check to see if there are any camera system messages.
  • Check camera system time sync.

We will make changes to the camera, where required, this could be to change VM, email alerts or exposure settings.

Following the visit, we will record the changes that were made on the day and make any recommendations for your system.

If you would be interested in our Mobotix Health Check, please complete our contact form and one of the team will be in touch. Alternatively, you can call us direct on 01473 281 211.

Ruckus Launch the E510 and M510 Access Points

Friday, June 1st, 2018

Ruckus Networks has launched two new 802.11ac Wave 2 access points (APs) designed to provide Wi-Fi coverage in space-constrained sites and in hard-to-reach areas.

The E510 and M510 APs are designed to provide reliable Wi-Fi coverage in smart cities, space-constrained sites and hard-to-reach areas such as stadiums and public transportation.

Ruckus E510 AP

The Ruckus E510 is the industry’s first embeddable enterprise AP to feature separate RF and antenna modules. This helps facilitate smooth deployment at sites with strict form-factor restrictions or aesthetic constraints.

“The E510 is aimed at the rapidly expanding outdoor market. It is designed to minimise the aesthetic or physical impact at deployment sites such as outdoor digital signage, street furniture, kiosks, lighting fixtures and stadium seats,” Ruckus Product Marketing Manager Bharadwaj Kachapuram told The Ruckus Room. “More specifically, it offers customers a unique, diminutive two-element enclosure that separates the RF components from the antenna module. This allows the E510 AP to flexibly address installation requirements in space-constrained sites – or in smart cities with structures that restrict RF signals, such as inside light poles or underneath concrete buildings.”

Kachapuram also noted that the E510 AP is ideal for customers that demand a low-profile deployment, such as in scenarios where only the antenna itself can be exposed. These restrictions are typically imposed for aesthetic and security reasons, or to protect the AP core circuitry.

Additional key E510 features include:

  • Centralised management: The E510 can be centrally managed with other Ruckus APs. This simplifies operations for cities, transportation authorities, public venue operators and service providers.
  • Low-profile radio module: At only 21 x 14.2 x 3.3 cm, the E510 base unit can fit into most enclosures – including cylindrical light poles – and expand the reach of any Wi-Fi network.
  • Weatherproof BeamFlex+™ antenna module: The diminutive 17.5 x 8.0 x 8.0 cm antenna module is built for outdoor stealth placement and can be positioned up to 3 meters away from the radio module. The BeamFlex+ antennas maximise flexibility and ensure high service quality, regardless of placement location.
  • 11ac Wave 2: With 2×2:2 spatial streams, MU-MIMO support and a data rate of up to 867 megabits-per-second (Mbps), the E510 delivers sustained throughput for demanding users and applications.

Download the Ruckus E510 datasheet.

Ruckus M510 AP

The Ruckus M510 AP is designed for use wherever supported LTE service is available. The M510 is ideally suited for deployment on buses, trains and in temporary locations where Ethernet connectivity is absent, unreliable or cost-prohibitive. Moreover, the M510 can be used anywhere wide area network (WAN) redundancy is required.

“If the M510’s 1Gb Ethernet port is used for wireless access network (WAN) connection, the LTE capability provides a natural backhaul backup resource in case of WAN failure,” Kachapuram explained. “This makes it ideal for remote offices or temporary pop-up retail or construction sites – where the cost of a wired connection is too prohibitive.”

According to Kachapuram, the M510 AP addresses a major unserved Wi-Fi opportunity by supporting deployment scenarios in which both Wi-Fi users and the AP itself are mobile.

“Put simply, the M510’s integrated LTE backhaul connection creates a ‘mobile AP’ for in-vehicle Wi-Fi service on trains, buses, taxis and other smart vehicles,” he stated.

Additional key M510 features include:

  • Centralised management: The M510 can be centrally managed with other Ruckus APs. This simplifies operations and eliminates the need for a separate mobile hotspot management system.
  • Integrated LTE modem: Allows network designers to create Wi-Fi hotspots at-will – and implement redundant backhaul to improve Wi-Fi service reliability and/or to ensure that SLAs are maintained.
  • 802.11ac Wave 2 with BeamFlex+ antennas: With 2×2:2 spatial streams, MU-MIMO support and integral BeamFlex+ antennas, the M510 delivers high coverage efficiency and sustained downlink throughput of up to 150 Mbps when using LTE backhaul.

Download the Ruckus M510 datasheet.

New MOBOTIX Mx6 Camera Line With Integrated MxBus Functionality

Friday, June 1st, 2018

From mid-June 2018 on, MOBOTIX will offer its second generation Mx6 camera line with integrated MxBus functionality (camera types x16B/x26B).

The MxBus technology is based on an extended camera board. This two-wire cable system developed by MOBOTIX is encrypted against cyberattacks and expands camera functions by including practical additional MOBOTIX modules such as the MX-GPS-Box, a reliable time server for a complete video system.

Within a MOBOTIX video system, Mx6 cameras without MxBus can also process and use the data from an MxBus module that is connected to a camera within the same network. For example, they can access the time signal from a GPS-Box or activate their own recording through MxMultiSense modules placed at the ceiling of a room via MxMessageSystem.

The new x16B/x26B models feature the same exterior structures as the corresponding first-generation Mx6 cameras. This means that all of the sensor modules, mounts and system components that they contain can also be used for the latest generation of MOBOTIX cameras.

All first-generation Mx6 camera models (x16A/x26A) are also available as corresponding second-generation camera models with MxBus (x16B/x26B). In order to use the MxBus functionality with the Indoor cameras c26B, i26B, p26B and v26B, as well as to add two additional inputs and two outputs to the camera, an additional MxIOBoard-IC is required.

A corresponding T26B successor for the T25 Door Station camera is planned for release by the end of Q3/2018.

From novelty to necessity: the evolution of biometrics

Friday, June 1st, 2018

Interest in biometrics has skyrocketed in recent years, since the adoption of mobile technologies for accessing various applications in the digital world.

But if you look beyond the current trend, we must remember that biometrics are not a new identification technology. For thousands of years, people have recognized one another through their faces, voices and expressions – which are all forms of biometric data. For example, in ancient Babylon, fingerprints were used on clay tablets for business transactions and law enforcement have been using them as unique identifiers since 1891.

From Novelty to Necessity

As human interactions increasingly take place in a digital context, we need ways to prove that we are who we claim to be. But how do we prove our identities when there’s no face-to-face interaction to do so?

Biometrics are quickly becoming a proven technology that combines the required security and convenience.

Biometrics refers to the individual’s unique physiological and behavioural characteristics, which can now be used to automatically identify and authenticate individuals. The type of attribute collected and matched is called modality. For example, fingerprint and iris are different biometric modalities.

Biometric technologies capture, process and measure these characteristics electronically and compare them to existing records to create a highly accurate way to identify someone.

Consumer perception of biometrics

The introduction of Touch ID in the iPhone 5S became the catalyst for the biometric industry. The technology has become very popular among smartphone manufacturers; in fact, ABI Research predicted that the value of the biometrics market will reach $30 billion by 2021 and Juniper Research estimates that there will be 600 million devices that will require biometric authentication by 2021.

Consumers have been driving the adoption of biometrics in the public and private sector. They are now expecting them to allow them to access many more secure services, and to allow them to replace passwords. In fact, recent research on the Future of Identity found that 67% of consumers are comfortable using biometric authentication. Millennials in particular show why biometrics make the experience both more secure and more convenient – 75% are comfortable using biometrics, while 41% admit to reusing passwords across multiple services and accounts.

Future opportunities

The reason for this increased opportunity is that biometrics are helping to resolve the all-important issue of a “unique identifier”. Biometric technology can replace popular identification methods like username/password. This is important because of the number of passwords each of us has to use, something that has been shown to be unscalable. Passwords may even do more harm than good for the customer experience. According to an Intel Security study, 37% of people forget a password at least once a week, while your fingerprint is something you always ‘carry’ with you.

Biometrics can also help in the IoT, where there is demand for stronger authentication and real-time security. Gartner estimates that biometric sensors, which include work time management and premise security entry consoles, will total at least 26 billion IoT connections by 2020.

The use of biometrics by government entities is also well established today, with different applications being deployed for border control, healthcare, law enforcement, elections, physical access and others. Several sectors are also rolling out biometrics solutions in education, cybersecurity, physical access, payment and other commercial purposes.

Realising the potential

Biometrics enable secure, convenient access and user authentication to different services and applications, and that is why they have quickly become favoured by consumers. Their potential is unlimited and will likely become the most promising technology for identifying and authenticating individuals.

However, a number of questions and concerns about privacy and anonymity have been raised, and the industry is working to finding a solution for these. Biometric technologies are maturing at different rates, and their deployment must be based on specific needs, use cases and regulations. Biometrics need to be combined with other authentication solutions to enable seamless user experience and increased security.

View the original article at