This page contains a Flash digital edition of a book.
FEATURE: CONFERENCE VENUES


[KEY POINTS]


The introduction of wireless and IP-based systems have increased the overall awareness of security


Televic’s Confidea Wireless system was used at the eighth ASEM summit


Mixed messages


The advent of wireless and IP-based solutions has raised the stakes for conferencing system security. But as David Davies discovers, a myriad of options mean that it isn’t necessarily easy for a venue to determine its ideal solution


HOW SECURE is your conferencing system? It might seem like a simple question, but the wide variety of technologies involved in such systems – not to mention the extent to which the issue of security can be regarded as a subjective one – means that it’s not necessarily that straightforward to answer. The increasing ubiquity of


wireless conference systems has, however, served to push the topic up the agenda. For example, is it really practical, some wonder, to deploy systems that run conventionally on WiFi – not just for reasons of security, but for fear of interference in an evermore congested operational landscape? Looking into the future a little, a greater tendency towards integration into facility-wide networked systems is also bound to increase the focus on


32 July 2014


security matters. So with this in mind, Installation worked to identify seven ‘lessons’ which, if got to grips with, might help define a clearer pathway for customers seeking security in an evermore complex infrastructure for conference AV.


1. CLIENTS MUST HAVE A CLEAR UNDERSTANDING OF THEIR SECURITY NEEDS.


Few would contest the assertion by Thomas Giczy, business development manager installed sound for AKG, that “the question of security unifies all conferences. I do not know any place where organisers would not care.” Equally, however, the scope of security measures required can vary considerably from client to client. “The level of security is


mostly determined by the type of meeting,” says Lars Van Den Heuvel, director


global product management conference systems, Bosch Security Systems. “[For example] within governmental environments this can range from open meetings with access by the public, to complete secret meetings in which all media connections to the outside world are disconnected. It all relates to the topics discussed within such meetings.”


Customers, therefore, need


to have a clear outline of the safeguards required going into a new project. Kristoff Henry, product marketing manager at Televic, identifies two primary considerations: “Security from the point of view that a conference system’s reliability and stability can be affected by security breaches and intrusion from the outside. Also, security from the [perspective] of secrecy or confidentiality… how easy


‘Using IP as a platform makes our system highly flexible and expandable for the future’ Lars Van Den Heuvel,


Bosch Security Systems


is it to pick up the audio of what is being discussed in the room?”


2. THERE IS A FUNDAMENTAL CHOICE BETWEEN WIRED AND WIRELESS SYSTEMS.


In real terms, wireless conferencing systems are in their infancy, and continue to be outnumbered by wired solutions. For reasons of track record and longevity alone, then, conference venue owners may instinctively favour wired systems. However, their feelings may be strengthened by those who maintain that, security-wise, some wireless systems are not yet entirely fit for purpose. Romano M Cunsolo is


director marketing & business development at Xavtel, which recently launched its Senator System that delivers a (proprietary protocol- using) networked and wired solution. “One of the reasons


www.installation-international.com


Improving encryption is a priority across system types


Overall system management will grow in importance as conference technology is more fully integrated into venue networks


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60
Produced with Yudu - www.yudu.com