ComNet launches its first transmission product selection App
ComNet launches its first transmission product selection App

ComNet Europe Ltd of Leeds in the United Kingdom, a USA-based manufacturer of fibre optic transmission and networking equipment, is introducing its new product selection app for the iPhone®, iPad® and iPod touch®. The ComNet Fiber Optic & Ethernet Products app is a solution identifier that allows you to choose the right transmission product for virtually every application. The ComNet app allows the user to search by application or model number, it also gives the user the opportunity to identify media options and the specific benefits of each when choosing products for new or retrofit applications. The ComNet app gives the user access to product datasheets, installation manuals and A&E Specs for the complete line of fibre optic video, data and audio products as well as fibre optic Ethernet and Ethernet over copper extenders. The ComNet app is available at No-Charge on the App Store sm. “The markets ComNet competes in today are continuing to be very fluid. Business today moves quickly,” said Steve Clarke, ComNet Europe Managing Director. “The days of ‘I’ll send a data sheet and we can review in our next meeting’ are past. Having a mobile app puts our product information in the hands of our customers and sales people much faster and we believe gives us a distinct advantage competing on a day-to-day basis,” concluded Clarke. “To the best of my knowledge, ComNet is the first transmission product manufacturer to offer a mobile app,” said Skip Haight, ComNet VP of Marketing. “Our idea from the beginning has always been to position the company as being focused on innovation, be it product, support or how we strive to delight the customer. Being the first to offer a transmission solution app is another way we continue to set the standard for supporting our customers,” Haight continued. 

Add to Compare

Browse Analog Transmission Systems

Analogue Transmission - Expert commentary

Tackling the challenge of the growing cybersecurity gap
Tackling the challenge of the growing cybersecurity gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilising system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralised location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Physical security and the cloud: why one can’t work without the other
Physical security and the cloud: why one can’t work without the other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorised access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organisation secure.

HD over Coax provides cost-effective video surveillance upgrade
HD over Coax provides cost-effective video surveillance upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analogue, many end users looking for high definition (HD) video quality have been forced to take on a complete system overhaul. Infrastructure overhaul for HD video To make the switch, customers would need to change everything, from cameras to hardware to wiring– not to mention the lengthy installation process that would ensue. IP cameras also require higher Internet speeds and more cloud space. Whether constrained by budget, bandwidth or storage, many end users have been unable to adopt this new video surveillance method.Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike. By utilising the current Coaxial cables, this offering yields high definition video, while requiring minimal infrastructure changes and is an optimal surveillance choice for security customers. Plus, with new advancements and updates being made frequently to this technology, there is a solution for every security need. The enhanced alternative of HD over Coax has been warmly welcomed in the security industry, thanks to its simple solutions and ever-evolving features. Many new analogue HD cameras are “plug and play,” able to connect directly to existing Coaxial cables. This eliminates the need for a complete system change, creating cost-savings for the end user and an enhanced video quality offering. Easy solutions for HD video As a result, integrators can cost-effectively upgrade their customer’s surveillance solution while using their legacy infrastructure, making it an attractive option for end users and an easy sell for dealers. Latency in video is another common issue with network-based camera systems, where even the slightest delay in video surveillance can hinder security response HD over Coax cameras themselves are always expanding and evolving to meet a wide array of security needs. With the introduction of fisheye and multi-sensor cameras, users now have a multitude of coverage options, not to mention the introduction of 4K bringing resolution options to the same level as IP. Some newer technologies are even touting 4K cameras paired with 4K digital video recorders (DVRs) made specifically for analogue systems. Longer cables grant transmission for up to 1600 feet, double the distance of standard analogue solutions, and triple that of IP systems. This single cable is able to transmit both HD video and audio. Recently, broadcast quality audio over Coax has become available in limited models, a substantial improvement over older analogue technology, which was unable to transmit audio. Stopping video delay Latency in video is another common issue with network-based camera systems. Even the slightest delay in video surveillance can hinder security response. IP cameras are forced to compress and packetise their video for transmission. The outcome of this is a reduced number of images per video, which in turn causes delay. HD over Coax on the other hand, delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity. Additionally, the point-to-point transmission delivers uncompressed video free of lag. Another touted benefit is that, unlike IP networked cameras, analogue systems provide a more secure video transmission. With so much sensitive information housed on a businesses’ network, adding another point of network access through an IP camera can create concerns for cyber security risks. HD over Coax delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity Preventing network hacking With HD over Coax, the physical connections between the camera and DVR prevent network hacking. By keeping the video surveillance system offline, security professionals are able to direct their attention to the physical threats at hand, rather than having to focus on deterring cyber security risks. One of the primary difficulties of deploying HD video solutions is the fact that many older systems utilise a wide variety of HD standards and platforms. To make matters more complicated, after HD over Coax was brought to market, manufacturers raced to create their own version of this technology. Today, the most popular proprietary standards are HD-CVI, HD-TVI and AHD. However, integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible.Integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible Diversifying surveillance through one DVR To combat these issues, manufacturers have introduced products with more flexibility to their portfolios. One example of this is the penta-brid DVR which grants the ability to seamlessly integrate multiple technologies deployed across one application. This means that systems with diverse camera brands and technologies, such as a mix of HD-CVI, HD-TVI, AHD, analogue or IP, can be connected through one DVR. For many end users with legacy analogue systems, penta-brid DVRs give them greater freedom to choose between a variety of solutions, rather than being limited to one option. With video resolution increasing, the space needed to store the footage is similarly rising. Penta-brid technology has been able to adapt to these evolving needs, giving users ample storage space to house the HD and 4K surveillance video with some of the newest models including H.265 compression.  HD casino surveillance made simple For casinos, HD images are critical for identifying unauthorised personnel and unlawful behaviours to create a safe environment for guests and staff While HD over Coax is beneficial to many end users and integrators, those in the casino and hospitality markets find it crucial. With a combination of high profile guests, large amounts of cash on hand, constant crowds and strict industry regulations, reliable video surveillance is a must. Deploying new IP systems comes at a stiff price. When looking to upgrade their video surveillance, casinos must also be mindful of the installation process. When moving to an IP-based system, ripping out old wires and replacing them with new is the standard practice. This practice can be both disruptive and costly, not to mention gaming regulations require casino activities be monitored at all times so a complete system shutdown would result in revenue loss. This cost can be hard to justify, especially when the current legacy analogue system remains in working condition with only the lower image resolution to date it. For these scenarios, the most cost-effective option is to leverage the legacy infrastructure, replace the existing cameras with new devices, and reap the benefits that HD video has to offer without any lapse in security. For casinos, HD images are critical for identifying unauthorised personnel and unlawful behaviours to create a safe environment for guests and staff. HD over Coax cameras now offer the same resolution as IP cameras with a plug and play approach, that cuts down on expense without sacrificing quality. For businesses and applications that are unable to adopt IP technology, whether it be cost or time prohibitive, HD over Coax now features most of the same benefits IP has to offer without breaking the bank. By providing clear images in real time, maximising existing infrastructure, and affording cyber security benefits, HD over Coax provides an attractive solution for many end users and integrators.

Latest ComNet Europe Ltd. news

ComNet announces the launch of Razberi Monitor software platform to enhance cyber security and system health
ComNet announces the launch of Razberi Monitor software platform to enhance cyber security and system health

ComNet, a globally renowned company in transmission solutions across fibre optic, copper, Internet, and wireless mediums, has announced the launch of Razberi Monitor software. Razberi Monitor is the latest addition to the ComNet product portfolio and the first solution to be rolled out from the recently acquired Razberi brand. Razberi Monitor Razberi Monitor is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. It monitors and manages all the system components for both cyber security and system health, and can be deployed from the Cloud or on-premise. Iain Deuchars is the General Manager of ComNet International. Commenting on the launch of the product, Iain Deuchars said, “This software has been purpose-built for security professionals. It provides secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Not only that, but it predicts and prevents problems while providing a centralised location for IT departments to view video data.” Protection against cyber-attack vulnerabilities The benefit of having Razberi Monitor ensures shorter response times to cyber security events" A vital benefit of the solution is that it protects against the multiple commonly cited cyber-attack vulnerabilities. These include weak passwords, the failure to update software or firmware, the lack of best practices for routine maintenance, and not aligning with network IT policy. Iain Deuchars weighs in further, by stating “The benefit of having Razberi Monitor ensures shorter response times to cyber security events, along with real-time alerts and logs to proactively notify users of active threats. The fact that it can detect cyber posture and problems with servers, cameras, and other IoT devices in real time is a promising unique selling point for the ComNet brand. We are very excited to deliver this product to our loyal customer base.” Enhancing cyber security Mike Issa, ComNet’s Region Manager for South Europe, the Middle East, and Africa, points out that Razberi Monitor can be offered to enterprises as a managed service, with a monthly subscription. This means no significant upfront costs and the ability to free up cash flow. He said, “The addition of Razberi to the ComNet portfolio is a great step forward for us as a brand. This software will optimise and secures networks, reducing costs, time, and manpower required to install and manage an enterprise network.” Protecting networks from cyber threats Mika Issa adds, “Moving forward, I am confident that Razberi will provide a unique selling point for integrators and end customers wishing to protect their security systems with cyber security solutions that can deter, detect, delay, deny and defend against hackers.” Razberi Monitor is available to view on the newly launched ComNet webshop.

ComNet announces the release of its Generation 4 line of NetWave wireless products
ComNet announces the release of its Generation 4 line of NetWave wireless products

ComNet, Communication Networks of Danbury, Connecticut, an ACRE company and a USA-based manufacturer of fibre optic transmission and networking equipment, has announced the introduction of its Generation 4 line of NetWave wireless products that offer greater performance and increased stability, in applications where throughput and increased bandwidth is increasingly important. NW1 Gen 4 wireless products The NW1 Gen 4 can exceed 500 Mbps throughput under ideal conditions and accommodates 10/100/1000Mbps Ethernet. It also now has IEEE802.3at PoE-compliant PD on port 1 and an IEEE802.3af power source (PSE) available on port 2. Distance is specified for applications of up to 2 miles. The new hardware features a high-performance chipset with a quad-core CPU that is designed to meet the high throughput demands required for surveillance applications. Featuring MAC address-locked radios The NW1 is available in kit form, the NWK1 and consists of two MAC address-locked radios The all-new NW1 throughput is far greater than the original 95 Mbps that the original NW1 offered. The NW1 is available in kit form, the NWK1 and consists of two MAC address-locked radios and mounting hardware. Each NW1 unit comes enclosed in a new and more durable enclosure and is designed for extreme conditions with an extended operating temperature range, as well as being IP67 rated for resistance to water and dust. Easy to set up and operate As with other ComNet NetWave products, the NWK1 is easy to set up and operate. It features a unique connection procedure using LEDs, to assist in aiming the units for optimal performance. According to Andrew Acquarulo Jr., ComNet’s CEO and President, “Our engineering team was challenged to increase performance in our next generation of NetWave products. We wanted to increase performance without increasing the cost to our customers. This new NW1 accomplished all our goals for this product line.” Enhanced performance “The increased performance of the NW1 allowed us to reduce our NetWave model offering and ultimately, make selecting the right NetWave product very easy for our customers,” said Skip Haight, ComNet’s Vice President of Marketing. Skip Haight adds, “We believe everybody is looking for that something extra and, in this case, we are giving ComNet customers increased performance at no additional cost.” Wireless video and data transmission ComNet, an ACRE company, offers an extensive line of fibre optic, copper and wireless video, and data transmission equipment that is uniquely designed to meet the needs of the security, intelligent transportation system, utility and industrial markets.

We need to talk about intelligent enclosure protection
We need to talk about intelligent enclosure protection

Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data centre world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.

Related white papers

Security investments retailers should consider for their 2021 budget