IT’S ON THE NETWORK. IT MUST BE SECURE.

As AV systems are migrated onto enterprise data networks, user organizations expect the AV system to maintain a security posture in alignment with their security goals. Because AV systems often carry mission critical information, unauthorized access to the AV system could impact security, confidentiality, integrity or availability.


COMPLIANCE AND AUDIT

In many cases, security requirements, more than simply a case of business best practices, are rather a matter of regulatory compliance. Security governance typically requires that any device attached to the network has the relevant security features and configuration. AV devices should be compliant with these requirements and stand up to audit.

DEFENSE IN DEPTH

Modern IT security is implemented with a “Defense in Depth” approach. Defense in Depth is a concept in which multiple layers of security controls are placed throughout an information technology (IT) system. The intent is to provide redundancy in the event that a security control fails or a vulnerability is exploited. For example, if an intruder gets past the firewall, they still have to know a user name and password in order to log into a protected system. In practice, security should be implemented everywhere it is practical. Do you leave your safe unlocked because your house has an alarm?

LIABILITY AND LIMITATION

With the rising profile of security related issues in the media, it is expected that a “reasonable and prudent person” would secure their professional network. This level of “Due Care” is the legal test of negligence. Proving due care involves showing that the necessary steps have been taken to help protect the organization, its resources, and employees. Reviewing organizational security policies and specifying products and configurations which meet those policies demonstrates due care.

MEET BUSINESS GOALS

While it is important to have established best practices and base security settings, security is always in support of business goals. The amount of effort, time, and cost that is spent on security depends on what the business goals are and the assets they need to protect, which vary between organizations and often between each application within an organization. If an organization has an IT security policy, and most do, a network-connected AV system should comply with that policy. There is no “one size fits all” security profile.

NX IS THE ANSWER

The NX Platform includes features which meet the latest security standards expected in the IT industry for any equipment running on an enterprise network. This includes central management of users, permissions, passwords, levels of system access, audit logs and reporting. This makes the AV system secure, accountable and simple to manage.



Learn More About NX Security Features

WANT TO LEARN MORE?

Contact Us
© 2015 Harman. All Rights Reserved |