Networksecurityslot1 large
 

AV ON THE IT NETWORK

All devices on the network, even AV devices, should maintain a security posture in alignment with IT security goals. Because AV devices are connected to the network, they should hvae the security configuration in place to ace IT security.

Read More

Secsq large

IT’S ON THE NETWORK. IT MUST BE SECURE.

As AV systems are migrated onto enterprise data networks, user organizations expect the AV system to maintain a security posture in alignment with their security goals. Because AV systems often carry mission critical information, unauthorized access to the AV system could impact security, confidentiality, integrity or availability.

 
Penpaper large
 

COMPLIANCE AND AUDIT

In many cases, security requirements, more than simply a case of business best practices, are rather a matter of regulatory compliance. Security governance typically requires that any device attached to the network has the relevant security features and configuration. AV devices should be compliant with these requirements and stand up to audit.

Networksecurityslot4 large

DEFENSE IN DEPTH

Modern IT security is implemented with a "Defense in Depth" approach. Defense in Depth is a concept in which multiple layers of security controls are placed throughout an information technology (IT) system. The intent is to provide redundancy in the event that a security control fails or a vulnerability is exploited. For example, if an intruder gets past the firewall, they still have to know a user name and password in order to log into a protected system. In practice, security should be implemented everywhere it is practical. Do you leave your safe unlocked because your house has an alarm?

 
Scale large
 

LIABILITY AND LIMITATION

With the rising profile of security related issues in the media, it is expected that a “reasonable and prudent person” would secure their professional network. This level of “Due Care” is the legal test of negligence. Proving due care involves showing that the necessary steps have been taken to help protect the organization, its resources, and employees. Reviewing organizational security policies and specifying products and configurations which meet those policies demonstrates due care.

Networksecurityslot6 large

MEET BUSINESS GOALS

While it is important to have established best practices and base security settings, security is always in support of business goals. The amount of effort, time, and cost that is spent on security depends on what the business goals are and the assets they need to protect, which vary between organizations and often between each application within an organization. If an organization has an IT security policy, and most do, a network-connected AV system should comply with that policy. There is no "one size fits all" security profile.

 
Networksecurityslot7 large
 

NX IS THE ANSWER

The NX Platform includes features which meet the latest security standards expected in the IT industry for any equipment running on an enterprise network.

NX PLATFORM PRODUCTS

PREMIUM CONTENT - Security Implications of AV on the IT Network

Networksecurityslot8 large

An in-depth video presentation by AMX security expert, Paul Zielie

One of the great challenges of AV/IT convergence is how to secure the AV systems that are now an integral part of the IT network. In this video presentation, AMX Enterprise Solutions Manager, Paul Zielie, will provide a wealth of information on how to design and implement an AV installation that is both effective and secure.

Get the Video Today