AV ON THE IT NETWORK
All devices on the network, even AV devices, should maintain a security posture in alignment with IT security goals. Because AV devices are connected to the network, they should hvae the security configuration in place to ace IT security.
IT’S ON THE NETWORK. IT MUST BE SECURE.
As AV systems are migrated onto enterprise data networks, user organizations expect the AV system to maintain a security posture in alignment with their security goals. Because AV systems often carry mission critical information, unauthorized access to the AV system could impact security, confidentiality, integrity or availability.
COMPLIANCE AND AUDIT
In many cases, security requirements, more than simply a case of business best practices, are rather a matter of regulatory compliance. Security governance typically requires that any device attached to the network has the relevant security features and configuration. AV devices should be compliant with these requirements and stand up to audit.
DEFENSE IN DEPTH
Modern IT security is implemented with a "Defense in Depth" approach. Defense in Depth is a concept in which multiple layers of security controls are placed throughout an information technology (IT) system. The intent is to provide redundancy in the event that a security control fails or a vulnerability is exploited. For example, if an intruder gets past the firewall, they still have to know a user name and password in order to log into a protected system. In practice, security should be implemented everywhere it is practical. Do you leave your safe unlocked because your house has an alarm?
LIABILITY AND LIMITATION
With the rising profile of security related issues in the media, it is expected that a “reasonable and prudent person” would secure their professional network. This level of “Due Care” is the legal test of negligence. Proving due care involves showing that the necessary steps have been taken to help protect the organization, its resources, and employees. Reviewing organizational security policies and specifying products and configurations which meet those policies demonstrates due care.
MEET BUSINESS GOALS
While it is important to have established best practices and base security settings, security is always in support of business goals. The amount of effort, time, and cost that is spent on security depends on what the business goals are and the assets they need to protect, which vary between organizations and often between each application within an organization. If an organization has an IT security policy, and most do, a network-connected AV system should comply with that policy. There is no "one size fits all" security profile.
NX IS THE ANSWER
The NX Platform includes features which meet the latest security standards expected in the IT industry for any equipment running on an enterprise network.
NX PLATFORM PRODUCTS
PREMIUM CONTENT - Security Implications of AV on the IT Network
An in-depth video presentation by AMX security expert, Paul Zielie
One of the great challenges of AV/IT convergence is how to secure the AV systems that are now an integral part of the IT network. In this video presentation, AMX Enterprise Solutions Manager, Paul Zielie, will provide a wealth of information on how to design and implement an AV installation that is both effective and secure.