Access your Pro+ Content below.
Can your security strategy handle networked facilities management?
This article is part of the October 2011 Vol. 2, No. 5 issue of Network Evolution
In part one of this series on the convergence of energy and facilities management with Ethernet networks, we explored the benefits and challenges of IP-based building management systems. In part two, we discuss the security challenges that arise from networked facilities management. For most IT professionals, converged networks are a good thing. Whether we're talking about convergence of data and voice networks, data and storage networks -- or more recently, data and facilities or power management networks -- convergence means more flexibility and lower costs by managing one less network. But networked facilities management systems bring with them new network security concerns. For security professionals, two networks mean physical separation or a clear demarcation point -- the gateway between two networks -- for security controls. Convergence means collapsing two security zones into one and having to keep them logically separated. Whenever convergence happens, security professionals must determine how to maintain logical ...
Access this Pro+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Today's enterprise application-aware firewall technology offers a host of features to manage application and Web 2.0 traffic. Expert Michael Cobb takes a look at the features and how to make the most of them.
Linking building and power management systems to converged Ethernet networks brings new security concerns.
Application-aware traffic management technology that exists today just doesn't cut it. This Fast Packet blogger would like to see session-based application-aware routing that provides visibility of session state, application behavior and bandwidth use.
Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.