Solved

treatment for PCs used by guards, CCTV recording & environment sensors

Posted on 2016-07-14
8
89 Views
Last Modified: 2016-07-18
What's the general security practice for such PCs?  Do we connect to the
corporate LAN (where other users do sending email, MS Office) & do we
join them to the AD?

Or they ought to have a separate LAN or just simply standalone?  

Do they need AV & signature updates (if so, is it via LAN or we manually
update) & is the backup the enterprise corporate backup or simply an
isolated standalone backup (say backup to an encrypted NAS)?
0
Comment
Question by:sunhux
  • 5
  • 3
8 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 41711114
This all depends on the computers and software and systems you want in place.

If your security software has a remote monitoring component over the LAN or internet, then it should be pretty obvious - they need to be on the LAN if you want to use that capability.  If your environmental sensors are supposed to alert you to issues via e-mail (as opposed to some kind of dialup text) then, yes, of course they need LAN access.

You should contact a security professional to evaluate your company needs and help you determine what the best way of handling this is... In GENERAL, the systems should have as limited access as possible to everything - but if you pull them off the network entirely and they have network components, then they can't work the way they should... so you really should be talking to security professionals who can examine your network and to the vendors of the software and hardware systems you use.
0
 

Author Comment

by:sunhux
ID: 41711625
We do have CISSP (in fact a number of them cleared the CISSP exams) but really
I'm tabling it here, hoping I get better answers as I've come across CISSP who
never heard of central authentication tools (TACACS, Radius) & Data Loss Prvntn
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 500 total points
ID: 41711682
Certifications don't GUARANTEE knowledge - though it can be an indicator - as with any, you need to vet them. In my opinion, you need someone who can interview you, your business, and your equipment to come up with the best answer.  In a sense, security is simple - provide access only to those who need it.  And provide resources only when those resources are deemed required.  Decide how you want to manage things, what kind of access you need to those resources, and implement technologies accordingly.
0
DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

 

Author Comment

by:sunhux
ID: 41715029
That's precisely I pose it here in EE: experts are free to ask me questions
& interview & come up with recommendations
0
 

Author Comment

by:sunhux
ID: 41715031
This is what I think:
the amount of videos recorded can be quite considerable as we have about 350 CCTVs : thus
 the video stream could contribute to the network bandwidth thus a dedicated VLAN for
video server & PCs that connects to the CCTVs is needed, makes sense?
0
 

Author Comment

by:sunhux
ID: 41715032
Or videos of different sensitivity ought to be segregated into different VLANs ?
Esp if the videos are not 'encrypted' ?
0
 
LVL 95

Assisted Solution

by:Lee W, MVP
Lee W, MVP earned 500 total points
ID: 41715036
You can't get / give a full understanding of the environment without documentation on the environment - what you have, what you need, what kind of business requirements you may have, legal concerns (government regulations, etc) you may have - I don't know where you are!  China?  California?  the Czech Republic?  Even if I did, I don't know if your locality has things to be concerned with.  If security is important, why wouldn't the videos be encrypted / stored on encrypted media?  What resources you have.

You now seem to want a full recommendation, from a web site forum where people don't even know what business you're in and otherwise free of charge by the expert.  Post a gig - and I'd STILL be surprised if someone took it unless you covered their travel expenses to see and inspect your environment.  Experts-Exchange has a role it can play - I think you're asking FAR too much for any professional to give an answer on.
0
 

Author Comment

by:sunhux
ID: 41717005
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Adoption of Microsoft’s Enterprise Mobility and Security solution and Office 365 will re-order the File Sync and Share market Microsoft has stated that its Enterprise Mobility + Security (EMS) is the fastest growing product in the history of the …
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question