Data security for the smart building

Jason Reasor Jason Reasor December 11, 2019

19_Data_Center_BlogAccording to a 2018 Forbes Insights survey, 60 percent of enterprises said their Internet of Things (IoT) initiatives have enabled them to expand or transform with new lines of business. Over the coming year, 94 percent anticipate a profit boost of at least five to 15 percent as a result of IoT.

A recent CommScope blog noted that it is the underlying infrastructure, as well as the connected devices, that define a smart building. Yet, enterprise deployment of IoT has become a defining characteristic of the smart building. The extensive network of edge-based IoT sensors is emblematic of an IT environment that uses the constant flow of operational data to improve future outcomes. Being able to support all the enterprise’s connected systems and devices with a converged low-voltage network provides additional “smart” benefits.

CLICK TO TWEET: CommScope's Jason Reasor explains that you can operate your smart building with confidence knowing that your network is secured by using structured cabling, automated infrastructure management and cellular solutions.

The two sides of smart building infrastructure

For IT managers, a hyper-connected network is a double-edged sword. While it can vastly improve things like enterprise efficiency, productivity and growth opportunities, a hyper-connected network also poses increased risks to data security. Essentially, every connection becomes a back door into your network. Of course, this is hardly news, as the industry has long been aware of the security implications of having billions of additional devices connected to the network.

Less well known, however, is that as commercial building networks evolve—becoming more heavily integrated into all aspects of the enterprise—the physical layer becomes a more attractive target. Perhaps even more surprising is that, according to a 2015 study by IBM, 60 percent of all data security breaches in 2015 were carried out by insiders with either malicious or inadvertent intent. So, what steps can you take to lock down your physical layer?

Tips for a more secure smart infrastructure

The right connectivity strategy can go a long way toward protecting your data from on-site attacks.

  • Physical layer monitoring and detection: Automated infrastructure management (AIM) systems are a key weapon in fighting on-site unauthorized access. Using intelligent cabling, connectors and patch panels, they automatically document all changes and alert personnel to new and non-scheduled connections, such as an intruder plugging in a laptop to gain unauthorized access. Alternatively, the AIM system can integrate with an existing intrusion detection system to identify and communicate the exact location to the intrusion detection system. Some AIM systems, like CommScope’s imVision®, also can be integrated with enterprise anti-virus software to identify rogue or infected devices by physical location—minimizing the cost and damage during an attack.
  • Security monitoring and sensors: Enhanced connectivity like that found in intelligent buildings allows for networks of IP security cameras and occupancy sensors that help spot unauthorized intruders. With the right cabling infrastructure, these power-over-Ethernet (PoE) devices can be placed just about anywhere they’re needed for optimal coverage.
  • Powered fiber/PoE cabling: In a powered fiber or powered Ethernet network, all connected devices draw their power from the switches, which are typically backed up by UPS batteries and generators. This centralized power structure is inherently more resilient and secure. In case of a main power failure, the AIM system and all connected security devices will continue to function.

The smartest approach is rarely the most complex

To get a better understanding of the issues and approaches to data security in the smart building, take a look at this brief video.

Ironically, some of the most effective means of securing advanced smart building networks involve practical and common-sense approaches. If you’re familiar with Occam’s Razor, this shouldn’t surprise you. Still, it underscores the value of being able to break down the most complex problems into their most basic components. This is the approach we take at CommScope. Smart.

Additional resources:

About the Author

Jason Reasor

Jason Reasor

Jason Reasor is the director of Strategy and Technology for Enterprise Systems at CommScope. In this role, he is responsible for the strategic direction of Enterprise Solutions, including definition and development of the building, campus and enterprise data center networks as well as emerging and adjacent technologies. Previously, Jason was the director of Product Line Management for enterprise copper solutions. He has also held various other solution management roles, including strategic healthcare solutions. Prior to joining CommScope, Jason spent 12 years with Hewlett-Packard and Tango Networks in various product management, sales engineering, R&D management and R&D development positions. He holds a B.S. in Computer Engineering from Texas A&M University and an MBA from the University of Texas at Dallas.