PoE – Getting more than the 100m limitation!

Feb 14

People commonly ask how far they can run Power over Ethernet. The answer is 100 meters from the PoE switch or hub to the PoE dependent device, regardless of where the power is injected. The limitation is not the power; it’s the Ethernet cabling standards that limit the total length of cabling to 100 meters.

There are however some devices that will allow PoE to be provided to a device over the 100m limitation.

Videplus’ PoE switches can provide PoE up the 250m which CCTV mode is turned on

 

The UNV range of NVR units can provide PoE up to 300m when Extended Transmission is enabled.  To enable Extended Transmission, open up the Main Menu, click Camera, select the camera you wish to enable Extended Transmission with, click Configure and finally Tick the Extended Transmission box and save.

Finally Videplus’ VP-EO2C-POE Single Port PoE Ethernet Extender is a high-speed Ethernet transmission device.  It can transmit Ethernet and Power signals together for PoE devices. It transmits data network signals up to 1000 metres over any pair of copper conductors, such as CAT5e, CAT6, coaxial cable.

Feb 14

Power over Ethernet (PoE) is a technology that lets network cables, such as CAT5e or CAT6, carry electrical power.

For example, a security camera would normally require two connections to be made when it is installed:

A network connection, in order to be able to communicate with a DVR and any display equipment.

A power connection, to provide electrical power the camera needs to operate.

However, if the camera is PoE-enabled, only the network connection needs to be made, as it will receive its electrical power from this cable as well.

Power over Ethernet reduces the number of cables required to connect a POE IP camera

Specifying Power over Ethernet brings many advantages to an installation:

Time and cost savings – by reducing the time and expense of having electrical power cabling installed.  Network cables do not require a qualified electrician to fit them, and can be located anywhere.

Flexibility – without being tethered to an electrical outlet, devices such as IP cameras and wireless access points can be located wherever they are needed most, and re-positioned easily if required.

Safety – PoE delivery is intelligent, and designed to protect network equipment from overload, under powering, or incorrect installation.

Reliability – PoE power comes from a central and universally compatible source, rather than a collection of distributed wall adapters.  It can be backed-up by an uninterruptible power supply, or controlled to easily disable or reset devices.

Scalability – having power available on the network means that installation and distribution of network connections is fast, simple and effective.

PoE has many applications such as:

VoIP phones – the original PoE application.  Using PoE means phones have a single connection to a wall socket, and can be remotely powered down, just like with older analogue systems.

IP cameras – PoE is now found throughout networked CCTV surveillance camera systems, where it enables fast deployment and easy re-positioning.

Wireless – Wifi & Bluetooth Access Points and RFID readers are commonly PoE compatible, to allow remote location away from AC outlets, and relocation following site surveys.

How to upgrade to PoE

Adding PoE to your network is straightforward, and there are two routes you can choose:

A PoE switch is a network switch that has Power over Ethernet injection built-in.  Simply connect other network devices to the switch as normal, and the switch will detect whether they are PoE-compatible and enable power automatically.

PoE switches are available to suit all applications, from low-cost unmanaged switches with a few ports, up to complex multi-port rack-mounted units with sophisticated management.

Adding Power over Ethernet using a POE Switch

A midspan (or PoE injector) is used to add PoE capability to regular non-PoE network links.  Midspans can be used to upgrade existing LAN installations to PoE, and provide a versatile solution where fewer PoE ports are required.  Upgrading each network connection to PoE is as simple as patching it through the midspan, and as with PoE switches, power injection is controlled and automatic.  Midspans are available as multi-port rack-mounted units or low-cost single-port PoE injectors.

 

Adding Power over Ethernet using a POE Midspan

 

Feb 02

Upgrading a NVR’s firmware from the EZ View App could not be simpler!  First open your EZ View App, tap the main menu, tap on the devices tab, refresh the list of devices by scrolling your finger down the screen, and a red dot will appear on any device that has a firmware upgrade available.  Tap on that device, tap on P2P Upgrade and tap Start Upgrade!

The video below shows how quick and simple it is!

Remotely upgrading a NVR’s firmware saves an engineer from having to travel to sites and upgrade firmware via USB!

 

Jan 29

Tough European Union Standards Are Set to Impact Cyber Security and Compliance Worldwide

As an early adopter and leader in the development of drive-level encryption technologies, Seagate understands that the most valuable asset in any storage system is the data itself. And while encryption is only a small part of any true security strategy, it can also help with privacy compliance.

Recent high profile mass data breaches, such as Equifax and Yahoo, have brought cyber security issues virtually to the mainstream. The General Data Protection Regulation (GDPR) means tough European Union (EU) standards on security and compliance will also become the norm in the US and worldwide. There is now greater emphasis on accountability, and drive-level encryption technologies are one method by which organizations can demonstrate this.

Changes to the GDPR

The GDPR is the most significant change in the world of data protection in a generation. It updates the law to recognize the significant advancements in technology during the last 20 years, and to address those technologies that will likely emerge in the future. The goal is twofold: 1), balance an individual’s right to protection and 2), allow a data-based economy to thrive without stifling innovation.

Key changes at a glance:

Scope. The GDPR applies to organizations based in the EU and any organization anywhere in the world which offers goods or services or monitors the behavior of people located in the EU. Citizenship or residency status is not pertinent. The GDPR also contains direct obligations on service providers (known as processors) for the first time. Furthermore, the European concept of personal information is broader than the US concept of personally identifiable information (PII), and includes online identifiers such as IP addresses.

Accountability. This is a critical thread running throughout the GDPR. Accountability leads to a number of obligations for organizations in charge of personal information (known as controllers). It will not be sufficient for organizations to simply comply, they must demonstrate their compliance. Organizations will have to keep records, record and justify their decisions, record an individual’s consent, and may have to prove all this to a European regulator.

Security. The GDPR requires that organizations put “appropriate technical and organizational measures” in place to protect personal information. Technical measures include drive-based encryption, passwords, access controls, two factor authentication, etc. Organizational measures include information management policies, and having an information governance structure in place. What defines appropriate depends on the circumstances: the type of data being processed, how sensitive it is, the volume, and the overall risk of data breaches.

Breach notifications. Data breaches are any inadvertent loss or sharing of personal information. This can be due to hacking incidents, loss of an unencrypted hard drive or failing to dispose of old records securely. Controller organizations must report these to the regulator within 72 hours and may have to respond to the affected individuals. Processor organizations have to inform their customer as soon as possible.

Fines. One of the aims of the GDPR is to push data protection/security to a board level issue. As a result, the fines are significantly increased by up to 4% of global annual gross turnover or €20 million, whichever is greater. EU regulators also have significantly broader powers to investigate and put sanctions in place—including ordering an organization to cease processing data.

Pseudonymization. Any form of reversible encryption is known as pseudonymization in the GDPR. It refers to masking the data using some process, and keeping the key required to undo the process separate. Encryption and pseudonymization are greatly encouraged throughout the GDPR as they are considered methods of significantly lowering the risks to individuals.

Principles. The GDPR is principles-based legislation, based on the same basic and relevant data protection principles that have been around since the 1980s. They include: acting within the law; informing individuals how their data will be used; only using data for a specific purpose; collecting the minimum data necessary; not keeping data longer than necessary, etc. Data protection by design and by default. These GDPR concepts state that privacy/security considerations should be baked into all data processing. Organizations should consider protection principles when designing all new products/services. Parameters should be set to collect the minimum amount of personal data necessary.

Individuals’ rights. Under GDPR individuals will have new and expanded rights. These include the right to ask any organization handling their information for a copy of it, to have it corrected if inaccurate, or deleted if no longer necessary.  There are also rights to object to certain processing or have one’s information moved to another organization. These rights are not absolute, so organizations must understand how they should apply.

Data processing agreements. The GDPR contains specific terms that must be in place between controllers (ie customers) and processors (ie vendors). Organizations will need to put these terms, which cover items such as security obligations, in place by May 2018.

Transfers. As with the current law, transfers of personal information outside the EU are prohibited, unless one of a limited number of safeguards are in place. For US organizations the most relevant are the EU/US Privacy Shield, the EU Model Clauses or– for larger organizations – Binding Corporate Rules.

 

Data Security/Encryption as a Compliance Tool

Seagate’s Self-Encrypting Drives (SEDs) encrypt all data as it enters the drive using an encryption key stored securely on the drive itself. The drive is encrypted at rest by default. To retire or repurpose the drive, the drive owner sends a command to the SED to perform an Instant Secure Erase (ISE). The ISE uses the SED’s cryptographic erase capability to change the data encryption key. The data becomes unreadable and cannot be recovered.  Encryption and pseudonymization are encouraged throughout the GDPR and, in fact, are mentioned 20 times in the text. While not specifically required, they are powerful tools and organizations that use them will benefit from lower compliance obligations. In particular, encryption can help in the following areas:

Security. While the GDPR leaves it to organizations to determine what appropriate security is, encryption is one of just four measures that are specifically suggested. When deciding which measures are appropriate, organizations must take into account the state of the art, costs of implementation, the type of processing and the risks to individuals. This is an obligation for both controllers and processors.  Encryption is one simple step organizations can take to lower risk, and is always something that is taken into account by regulators in determining whether to levy a fine, and if so, the amount.

Fines. The GDPR sets out the factors a regulator will take into account in determining the level of a fine to impose on an infringing organization. One factor is the technical and organizational measures that were taken to adhere to Privacy by design/default and Security. Encrypted hard drives, removable drives and laptops are a simple way of demonstrating compliance with these obligations, thereby reducing the amount of any fine.

The regulator will also consider the negligence of the organization. Most regulators would consider encryption of data-at-rest and in transit to be a basic measure, particularly if the data is sensitive. Regulators have little patience for organizations that don’t put such obvious measures in place and so without SEDs an organization increases its risk of a much larger fine under GDPR.

Breach notification. An organization must notify the regulator about a data breach unless the breach is unlikely to result in a risk to the rights and freedoms of individuals. Where data have been securely encrypted, e.g., after ISE, then the data would be largely useless to any hacker or identity thief. The risk to individuals is lowered and so it may not be necessary to notify the regulator, thus avoiding negative press for the organization. If the organization decides to notify the regulator in any case, it will need to describe measures taken to mitigate the breach, which will include its strong encryption.

The test of whether or not to notify the individuals affected is whether the breach results in a high risk to their rights and freedoms. The GDPR specifically states that such notification is not required where the data has been encrypted.

Principles. The problems of secure data deletion have led some organizations to securely store data rather than delete it. Not only is this expensive and increases the risk of data breaches but it breaches the principle of data minimization. Seagate SEDs allow organizations to repurpose defunct drives, confident that the data has been sanitized.

Further, there is an exception to the principle against using data for a further purpose if certain criteria are fulfilled. One criterion is whether the data has been pseudonymised.

Data protection by design. The GDPR lists pseudonymization as an example of a measure which implements data protection principles in their products/services. Data on Seagate SEDs is always encrypted at rest.

Data processing agreements. The GDPR requires that a controller and processor have terms in place to cover, among other things, security and data deletion. The customer must help to ensure that the vendor has appropriate security measures in place, and the vendor must agree to return or delete the customer’s data at the end of the contract. While the data is not technically deleted, it is sanitized to an extent that it is not feasible for it to be recovered, which will be sufficient for most customer’s needs. Seagate’s data sanitization technology has been recognized as ISO 27001 and NIST compliant.

Individuals’ rights. Individuals have the right to have their data deleted but only when the controller can identify that individual. With ISE, it will be impossible for an organization to link data to a specific individual and means that organization is not obliged to respond to the request, greatly reducing its administrative burden.

 

Conclusion

GDPR readiness is a major project for most organizations, and compliance will be an ongoing process following the May 2018 implementation. Organizations that have not yet considered how they will adapt to the changes list above need to formulate a strategy and take action immediately.

GDPR is broader than just data security. However, putting secure storage and encryption in place is one straightforward technical step organizations can take to, and crucially for the accountability principle, demonstrate they have become compliant. Seagate SEDs can be an important tool in the overall compliance armory.

Jan 26

TP-Link’s Outdoor CPE access point is dedicated to reliable solutions for outdoor wireless networking applications.  With its centralized management application, it is flexible and ideal for point-to-point and point-to-multipoint applications.  Perfect for when cameras cannot be cabled back to a NVR unit, such as farms yards, remote outhouses etc. over long distances (15km+) point-to-point.

 

  • Built-in 13dBi 2×2 dual-polarized directional MIMO antenna
  • Adjustable transmission power from 0 to 27dBm/500mw
  • System-level optimizations for more than 15km long range wireless transmission
  • TP-LINK Pharos MAXtream TDMA (Time-Division-Multiple-Access) technology improves product performance in throughput, capacity and latency performance, ideal for PTMP applications
  • Centralized Management System – Pharos Control
  • AP / Client / Repeater / AP Router / AP Client Router (WISP) operation modes
  • Passive PoE Adapter supports up to 60 meter (200 feet) Power over Ethernet deployment and allows the device to be reset remotely

The video tutorial below will show you how to successfully set up an Access Point and Client using the CPE Series.

 

Typical Applications:

Long-distance wireless connection by using two CPEs to build a long-distance wireless connection.  Shown in Fig.1.

Fig.1

Large-area wireless coverage using base station combined with sector antenna as the access point at the central station, and several CPEs as clients to build and a point to multi-point coverage.  Shown in Fig.2.

Fig.2.

 

 

X