TITLE

THE 7 ADVANTAGES of IP-based Video

AUTHOR(S)
McClean, Gareth
PUB. DATE
June 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, Special Section pH
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article focuses on advantages of Internet Protocol (IP)-based video. The potential savings in using an IP video system can be found in a number of different areas that grow exponentially in accordance with the size of the installation. Existing cable infrastructure and PC hardware remain a part of the new system, so startup costs are kept down and there isn't a need to rip and replace. With a centralized network connected to the Internet, live and recorded video streams can be accessed and controlled from any remote location, providing security with the ability to access and distribute accurate information any time during the day or at any point when an alarm is raised. The open-ended nature of an IP deployment allows for plug-and-play.
ACCESSION #
17202387

 

Related Articles

  • Questioning IPv6 Security. DeNardis, Laura // Business Communications Review;Jul2006, Vol. 36 Issue 7, p51 

    The article examines IPv6 security. The commonly cited rationale for upgrading to IPv6 is the idea that the newer Internet Protocol provides vastly improved security over IPv4. Emphasis has been given on how conceptions of IPv6 as more secure than IPv4 are somewhat misleading and how...

  • Anonymous Authentication Scheme for Wireless IP Networks under Trusted Computing. Li Yang; Chao Yang; Jianfeng Ma // Journal of Convergence Information Technology;Nov2011, Vol. 6 Issue 11, p182 

    Many authentication schemes have been proposed in wireless networks. Most of the proposed schemes only consider the authentication of the user identity. However, the security of user platform has not received much attention. The insecurity of user platform will endanger the schemes, making them...

  • Poll cites converged-IP security concern. Kirk, Jeremy // Network World;11/14/2005, Vol. 22 Issue 45, p22 

    This article identifies security as the top concern in implementing converged Internet protocol networks, according to a joint study released by the Economist Intelligence Unit and AT&T Corp. It is the second year in a row that the survey, which polled 236 executives in 50 countries, put...

  • Fighting off intruders. Dailey, Tim // American City & County;Dec2007, Vol. 122 Issue 13, p24 

    The article presents information on the steps that local government officials must take to protect their data and systems from disruption following the adoption of Internet Protocol (IP) in public safety, utility and transportation radio systems. Local governments can protect IP radio systems...

  • IPv6 as national-security issue. Caldwell, Matthew F. // Network World;12/15/2008, Vol. 25 Issue 48, p4 

    The article presents the perspectives of an executive concerning Internet Protocol version 6 (IPv6) as a national security issue in the U.S. He stresses that IPv6 is as highly important to the welfare of the nation as the financial market bailout. He contends that the knowledge will pour forth...

  • IP Network Security Monitoring of Network Information Engineering. Zou Benna // Applied Mechanics & Materials;2014, Issue 608-609, p386 

    With the constant popularization of computers in recent years, people have already entered an era of network, and it is not difficult to discover that people will achieve information about current affairs, recreation and entertainment from the internet. Consequently, IP network enjoys...

  • IPv6 offers data packet security and quality of service - but so does IPv4. Golding, Daniel // Computer Weekly;1/23/2007, p32 

    The article presents the author's comment on the Internet protocol IPv6. IPv6 is inherently superior to IPv4 in two areas: quality of service and security. Developers of the IPv6 protocol suite decided to make packet-level encryption and quality of service markings the core elements of their...

  • Techniques for improving the security and manageability of IPsec policy. Trostle, Jonathan; Gossman, Bill // International Journal of Information Security;2005, Vol. 4 Issue 3, p209 

    We discuss the strengths and weaknesses of existing tools with respect to the Internet Protocol security (IPsec) name mapping problem: how to ensure a correct mapping between application-layer target names and network-layer target names. We show that DNSSEC is neither necessary nor sufficient...

  • We were warned... Mok, Charles // Telecom Asia;Apr2010, Vol. 21 Issue 3, p38 

    In this article, the author discusses the impact of IPv6, the present Internet protocol standard in Asia. He states that the adoption of IPv6 is one of the key priorities and initiatives of the global Internet Society to share experience with the local network engineering community including the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics