LeahH, Author at Nextro https://nextro.nz/author/leahh/ Managed Telecommunications, Network & Security Solutions NZ Fri, 25 Oct 2024 04:00:52 +0000 en-NZ hourly 1 https://wordpress.org/?v=6.7.1 https://nextro.nz/wp-content/uploads/2020/05/cropped-image001-32x32.png LeahH, Author at Nextro https://nextro.nz/author/leahh/ 32 32 Nextro and Genetec partner with Eden Park for enhanced security operations https://nextro.nz/nextro-and-genetec-partner-with-eden-park-for-enhanced-security-operations/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-and-genetec-partner-with-eden-park-for-enhanced-security-operations Thu, 24 Oct 2024 04:52:05 +0000 https://nextro.nz/?p=5216 Nextro and Genetec deliver operational efficiencies and security enhancements for Eden Park with Genetec Security Centre. On a busy event day, Eden Park welcomes about 50,000 spectators. Find out how the team has expanded visibility to keep guests safer, all while developing stronger city partnerships to streamline operations and incident response. The company Eden Park...

The post Nextro and Genetec partner with Eden Park for enhanced security operations appeared first on Nextro.

]]>

Nextro and Genetec deliver operational efficiencies and security enhancements for Eden Park with Genetec Security Centre.

On a busy event day, Eden Park welcomes about 50,000 spectators. Find out how the team has expanded visibility to keep guests safer, all while developing stronger city partnerships to streamline operations and incident response.

“Nextro is proud to partner with Eden Park to design, implement and support its upgraded security platform. The Genetec solution is now being used to enhance operations and ensure stadium-wide safety and security for New Zealand’s biggest sporting and cultural events.”

Martyn Levy

Managing Director at Nextro

The company

Eden Park is widely considered New Zealand’s national stadium. Since its opening in 1903, the stadium has been the home of Auckland Cricket and Auckland Rugby. It has a seating capacity of nearly 50,000 and an unmatched atmosphere for live events. As New Zealand’s largest stadium, Eden Park has a proven track record of delivering successful events for over a century. This includes the 1987 and 2011 Rugby World Cup finals as well as the 2022 ICC Women’s Cricket World Cup and others.

The challenge

Over one million local and international fans pass through Eden Park’s doors each year. High-volume patronage means the stadium needed a security platform that could help the team proactively safeguard against threats. This became important following the release of the New Zealand Government’s Crowded Places Strategy in 2020 and Eden Park becoming the host of the FIFA Women’s World Cup 2023™.

The solution

Boosting stadium-wide visibility

Operators now have a clear picture of stadium events. With privacy-first visual tracking and quick search functionality, identifying and responding to security alerts can happen in seconds.

Gaining real-time insights

The AutoVu ANPR system helps operators automatically track vehicle license plates, comparing them against the live law enforcement database of stolen vehicles or vehicles of interest.

Achieving full redundancy 

Dual directory servers and four Streamvault security infrastructure appliances operating in high-availability mode mean Eden Park has certainty of continuous operation for game day. 

Enhancing city-wide collaboration

Using the Genetec Federation feature, Eden Park can grant system access to the New Zealand Police in case of emergencies. This enables authorities to rapidly respond to stadium incidents.

“Eden Park is committed to delivering world-class live experiences and attracting premium events for Auckland and New Zealand. With centralized security operations underpinned by Genetec, we’re able to continue setting the benchmark for stadium experiences in the wider APAC region.” 

Nick Sautner

Chief Executive Officer at Eden Park

Results

With the Genetec platform at hand, Eden Park operators can now monitor crowds, address safety concerns, and coordinate incident responses from centralized spaces. Eden Park now has a unified view of security, backed by infrastructure appliances that have been tested to their limits and tailored to the stadium’s unique requirements. This added level of reliability eliminates guesswork and offers invaluable peace of mind.

The post Nextro and Genetec partner with Eden Park for enhanced security operations appeared first on Nextro.

]]>
Defending the Digital Fortress: Nextro’s Top Cybersecurity Trends for 2024 https://nextro.nz/defending-the-digital-fortress-nextros-top-cybersecurity-trends-for-2024/?utm_source=rss&utm_medium=rss&utm_campaign=defending-the-digital-fortress-nextros-top-cybersecurity-trends-for-2024 Thu, 30 Nov 2023 01:25:56 +0000 https://rzw.pcv.mybluehost.me/.website_4fef5db6/?p=2817 Defending the Digital Fortress: Nextro’s Top Cybersecurity Trends for 2024 According to Forbes specialists, cybercrime will cost the global economy more than $10.5 trillion by the end of 2024. This alarming prediction emphasises the increasing need for cybersecurity to be seen as a strategic priority at individual, organisational and governmental levels. In the dynamic terrain...

The post Defending the Digital Fortress: Nextro’s Top Cybersecurity Trends for 2024 appeared first on Nextro.

]]>
Defending the Digital Fortress: Nextro’s Top Cybersecurity Trends for 2024

According to Forbes specialists, cybercrime will cost the global economy more than $10.5 trillion by the end of 2024. This alarming prediction emphasises the increasing need for cybersecurity to be seen as a strategic priority at individual, organisational and governmental levels.

In the dynamic terrain of cybersecurity, 2024 will usher in a new wave of challenges and complexities, and the importance of robust cybersecurity measures cannot be overstated.

Below, we have curated insights from leading external experts, the Nextro cybersecurity team, and industry publications to provide an in-depth understanding of the most imminent cybersecurity threats and reveal the crucial cybersecurity trends that demand immediate attention and proactive measures.

Supply Chain Software Attacks

Cybercriminals are capitalising on supply chain vulnerabilities to breach organisations. They target trusted vendors and suppliers to infiltrate the organisation’s networks. By using widespread breach tactics, cyberattacks infect software updates or inject malicious code into software to exploit indirect attack routes and eventually infiltrate targeted organisations.

To effectively combat this, it is imperative to implement a comprehensive strategy that includes maintaining a detailed inventory of software components, strict access controls, multi-factor authentication, data encryption, robust backups, and secure software development practices. Additionally, a proactive approach, such as implementing an incident response plan and continuous threat monitoring, will strengthen defences against supply chain software attacks.

IoT and the Expanding Attack Surface

The rapid growth of cloud computing, remote work, mobile applications, IoT devices, open-source code, bring-your-own-device (BYOD) policies, and interconnected supply chains has boosted the number of personal and third-party devices accessing organisations’ networks and expanded the attack surface for cybercrime.

Cybercriminals can exploit poorly secured networks and devices belonging to employees and independent contractors to hack organisations’ networks and access sensitive data stored on unsecured cloud storage platforms.

IoT devices have become a weak spot for organisations’ cybersecurity due to inadequate security protocols and passwords. 

Robust access controls, multi-factor authentication, data encryption, continuous monitoring, and security awareness training are essential in safeguarding an organisation’s valuable digital assets amidst the expanding attack surface.

Emerging Threats and Solutions from Artificial Intelligence (AI)

In today’s digital landscape, cyber attackers are exploiting the capabilities of AI to create a wide array of threats that present significant challenges. They design AI-powered malware able to self-adapt and avoid traditional security measures, enabling them to go undetected, identify vulnerable targets, and customise their attack methods.

By exploiting AI vulnerabilities, these attacks can potentially manipulate algorithms, generating inaccurate results that can compromise an organisation’s systems and lead to data breaches. Furthermore, attackers can introduce biases and vulnerabilities during the training phases of AI models, thereby influencing the predictive behaviour of a trained model. This strategy is commonly referred to as ‘data poisoning’.

Additionally, the rise of deepfakes and identity manipulation creates new security threats. When combined with sophisticated social engineering attacks, they can deceive individuals and disseminate disinformation.

As the threat of AI-powered attacks continues to grow and put traditional defences to the test, organisations must remain vigilant and adapt their cybersecurity strategies accordingly.

Nonetheless, the integration of AI in cybersecurity heralds a transformative shift in defence mechanisms. Intrusion detection systems fortified with AI capabilities exhibit a new level of agility in discerning anomalous patterns, granting real-time response capabilities to neutralise threats that conventional systems struggle to emulate. AI-powered security systems are an indispensable force-multiplying component that can fortify cyber defences on a 24/7 basis by swiftly identifying anomalies and pre-empting potential breaches.

Cloud Security Challenges

Cloud technology has offered unparalleled flexibility and scalability to organisations around the world. However, alongside these benefits, a surge in cloud vulnerabilities demands that companies adopt robust security measures to safeguard their digital assets and data.

Whether due to cyber attacks or human error, data breaches and loss are major concerns in cloud environments despite the well-equipped infrastructure provided by the cloud.

To overcome traditional security tools’ cloud threats and limitations, organisations must invest in robust cloud-native security solutions, including a zero-trust architecture, strict access control, data encryption, and regular data backups. Prioritising endpoint and network security measures, reviewing security configurations, conducting security audits and having an incident response plan are essential to thwarting cloud cyber-attacks.

Insider Threats and Third-Party Contractor Breaches

The rise of remote work and reliance on contractors and temporary staff has created new opportunities for malicious insiders with access privileges to exploit companies’ sensitive information.

Whether intentional or accidental, employees’, contractors’ or even trusted partners’ actions can lead to devastating consequences for companies, such as data breaches and other malicious activities.

According to a recent Verizon cybersecurity report, human error remains the reason for data breaches, and over 34 percent of cyber attacks were directly or indirectly caused by employees.

Implementing strong access controls, multi-factor authentication, continuous monitoring, user behaviour analytics, and adequate employee training are vital in effectively tackling insider threats. Also, the growing reliance on third parties necessitates rigorous vetting, security assessments, and the integration of cybersecurity clauses in contracts.

Ransomware 2.0

Ransomware 2.0 signifies a major leap forward in the realm of cyber threats, as cybercriminals not only encrypt files but also threaten public exposure to stolen data, intensifying the impact on targeted organisations. This emerging trend, often referred to as “extortionware,” highlights the critical need for organisations to bolster their defence mechanisms and proactively shield their data and infrastructure from these calculated and highly damaging assaults.

As cyber threats continue to evolve, ransomware attacks are becoming more sophisticated. With the adoption of AI, machine learning and Ransomware-as-a-Service (RaaS) to exploit unknown vulnerabilities, attackers are honing their evasion techniques with increased precision, making their assaults even more challenging to counter.

To combat this growing menace, organisations must proactively prioritise data security, fortified by robust endpoint protection, stringent access controls, and comprehensive staff training. Strengthening incident response protocols and implementing continuous network monitoring will be vital in navigating the constantly shifting ransomware battleground and preserving organisational integrity in the face of these evolving cyber threats.

Threat Intelligence

Threat Intelligence emerges as a critical component for organisations aiming to fortify their digital defences for 2024. This sophisticated practice involves systematically collecting, processing, and analysing data related to potential cybersecurity threats. By uncovering intricate attack behaviours and motives, threat intelligence empowers security teams to proactively safeguard against cyber assaults, enabling more efficient detection and response strategies. Its nuanced insights aid in comprehensively understanding organisation-specific threats, providing actionable recommendations that enhance overall security measures, thereby mitigating risks and thwarting potential data breaches.

According to leading industry experts, applying threat intelligence allows for identifying bespoke trends, patterns, and relationships within the intricate web of cyber threats. This tailored approach not only provides contextual relevance but also ensures a detailed understanding of potential risks. As organisations navigate the complex digital landscape, integrating threat intelligence into their cybersecurity frameworks has become an indispensable practice, effectively equipping them to combat the evolving nature of modern cyber threats. The intricate six-step threat intelligence lifecycle involves meticulous planning, data collection, rigorous processing, expert analysis, seamless dissemination, and crucial feedback loops. This holistic approach ensures that organisations remain agile and well-prepared to face the dynamic challenges of the ever-evolving cyber threats.

Zero-day Exploits and Advanced Persistent Threats (APTs)

Zero-day exploits are cyber attacks that target unknown software vulnerabilities, launching attacks before anyone can place defences to prevent them. Advanced Persistent Threat (APT) is an unyielding and long-term cyberattack that continuously seeks out network vulnerabilities. APTs have the ability to adapt and change tactics to avoid detection, making them an exceptional threat.

Using Zero-day exploits and APTs together, attackers can use undisclosed vulnerabilities to stealthily infiltrate networks, evading detection for prolonged periods, leading to data exfiltration and long-term damage.

To safeguard against Zero-Day Exploits and APTs, organisations need a proactive strategy, including regular software updates, network segmentation, robust access control and intrusion detection systems. Additionally, an actionable incident response plan, adherence to a zero-trust model, continuous network monitoring, and collaborative threat intelligence sharing minimise risks.

Cybersecurity in the Board Room

With the persistent surge in complex cyber threats, cybersecurity has become a strategic priority that can no longer be limited to the IT department. The active participation of board members in shaping and executing comprehensive security protocols has transcended being merely a technical concern. It has evolved into a pivotal business risk that demands both strategic insight and financial commitment.

Recent research predicted that by 2026, 70% of boards would include at least one member with cybersecurity expertise. This enables organisations to move beyond reactive defence and cyber resilience after attacks; they can act on new business opportunities that come with being prepared.

Organisations need to adopt a holistic and proactive approach to tackle these constantly evolving cyber threats effectively. This involves maintaining a constant state of alertness, investing in best-of-breed technology, providing security awareness education, conducting regular security assessments, adhering to industry standards and regulations, developing efficient incident response plans, and seamlessly integrating cybersecurity into their organisation strategy. With these proactive measures, organisations can fortify their defences, effectively identify and mitigate risks, respond swiftly to incidents, and protect their valuable digital assets.

Nextro understands the real threats and risks posed by cybercriminals to organisations, be they critical infrastructure or a growing enterprise. By deploying best-of-breed technologies, Nextro designs optimal security solutions to fortify an organisation’s defences, secure users and devices, and safeguard its network and data. Nextro also helps organisations to integrate cybersecurity into their business strategies, develop efficient detect-protect-and-respond action plans, and also offer Security Awareness Programs to educate employees regarding how to protect themselves and their organisations.

If you would like to discuss more about how Nextro can help address any of your cybersecurity or physical security needs in 2024, please contact us today.

The post Defending the Digital Fortress: Nextro’s Top Cybersecurity Trends for 2024 appeared first on Nextro.

]]>
Understanding Financial Risks of Cybersecurity Complacency https://nextro.nz/understanding-financial-risks-of-cybersecurity-complacency/?utm_source=rss&utm_medium=rss&utm_campaign=understanding-financial-risks-of-cybersecurity-complacency Thu, 30 Nov 2023 00:46:59 +0000 https://rzw.pcv.mybluehost.me/.website_4fef5db6/?p=2789 Understanding Financial Risks of Cybersecurity Complacency A lack of proper data sanitisation and appropriate methods to manage the entire information lifecycle means those same organisations are providing bad actors with the opportunity to manufacture identity. This situation of storing as much data as possible is creating an Everest-like attack surface, riddled with vulnerabilities and entry...

The post Understanding Financial Risks of Cybersecurity Complacency appeared first on Nextro.

]]>
Understanding Financial Risks of Cybersecurity Complacency

A lack of proper data sanitisation and appropriate methods to manage the entire information lifecycle means those same organisations are providing bad actors with the opportunity to manufacture identity. This situation of storing as much data as possible is creating an Everest-like attack surface, riddled with vulnerabilities and entry points for bad actors.

In Q1 2023, IT Governance discovered 310 security incidents between January and March, accounting for a total of 349 million breached records. That represented a 12.7% increase in the number of cybersecurity incidents seen in the previous quarter.

While falling foul to a data breach can have long term consequences for trust in an organisation’s security posture and its ability to appropriately safeguard information, the financial implications are just as eye-watering. Businesses have been forced to pay out millions as a result of being penalised by regulators for failing to comply with data privacy regulations. Coupled with the cost of investigating and addressing the breach, as well as paying out for ransomware attacks, breaches are detrimental to a business’s bottom lines.

A situation out of hand

The current state of play paints an ugly picture for existing data management practices. And a Deloitte poll released earlier this year revealed that nearly half (48.8%) of C-suite and other executives expect the number and size of cyber events targeting their organisations’ accounting and financial data to increase in the next 12 months.

That’s not to say businesses are resting on their laurels. In fact, security is a priority for almost all organisations. Gartner forecasts spending on information security and risk management products to increase by 11.3% in 2023 to reach more than $188.3 billion.

But it’s not as simple as just buying a new tool or lock for sensitive information when it comes to properly protecting your organisation’s perimeters. Security is and never will be a one-and-done approach. Moving to the cloud and the evolution of technology means organisations are now collecting and storing too much data.

A breach isn’t the only concern

A breach isn’t always the root cause of regulatory violation that incurs hefty fines. A Danish bank was fined $1.5 million (€ 1.3 million) in the second case for failing to comply with the European Union’s GDPR “right to erasure” guidelines. GDPR requires personal data be erased by service providers when services end or legal agreements expire.

Yet key findings by the Danish Supervisory Authority showed that the bank “has not been able to document whether rules have been laid down for deletion and storage of personal data, or whether manual deletion of personal data has been carried out.”

While there was no breach, the bank held onto customer data longer than regulations allowed. The bank faced a challenge that many organisations encounter: A distributed network of technology systems that made it difficult to build the right functionality. The organisation found itself incapable of keeping up with data destruction demands in its more than 400 individual banks.

To avoid these costs and minimise security risks, businesses need to think about the entire lifecycle of their data and IT equipment. This means developing a plan for how data will be collected, stored, processed, and disposed of, and ensuring that all equipment is properly managed throughout its lifecycle. Fundamentally, the approach must change. Proactive management of data across the information lifecycle is critical.

Why organisations store data

Companies hold on to sensitive data for too long for many reasons – despite the well-documented consequences. For example, they may want to keep data for future use, even if they remain unsure what that use is. Some firms also lack the policies for employees to know that some data must be destroyed. And others simply believe that data will remain secure.

This too is costly for organisations, both from a financial and environmental perspective. A Blancco research report found that two in five enterprise IT decision-makers admitted to wasting upwards of $100,000 per year storing useless IT hardware that contains sensitive information rather than sanitising the data and the device.

There’s also the cost of storing unnecessary data in the cloud or on-prem. And that too, has a negative impact on the environment with finite energy resources used to power the servers that the data sits on – contributing CO2 emissions.

Instead of taking these risks, organisations need a proactive, verifiable, and certified process to permanently destroy unnecessary data. Doing so can ensure this data is rendered inaccessible, reducing risk, maintaining customer trust, avoiding potential fines, and limiting breach exposure. Such data erasure also ensures that an organisation complies with all national, regional, and market-specific regulations.

Moving towards best practices

Some steps businesses can take to improve their data management practices include:

Developing a data management plan that outlines how data will be collected, stored, processed, and disposed of. This plan should take into account any legal and regulatory requirements for data management and should be reviewed regularly to ensure it remains up-to-date.

Regularly auditing IT equipment to identify hardware that is no longer in use or nearing end-of-life. This hardware can then be repurposed, sold, or recycled in a responsible manner.

Implementing secure data destruction processes to ensure that all sensitive data is properly removed from end-of-life IT equipment. This can include the physical destruction of hard drives or the use of software-based data destruction tools.

Developing policies and procedures for handling data breaches, including incident response plans and employee training programmes.

By taking a proactive approach to data management and end-of-life IT equipment, businesses can reduce their financial costs and minimise security risks. It’s critical to foster an improved culture of cyber hygiene and one that is sustainable and compliant. Constantly assessing the value of data from its creation through to its retirement is critical because it allows organisations to maintain control over their data and ensure that it is being used effectively, efficiently, and in compliance with legal and regulatory requirements. It’s vital that any organisation that creates and stores data has a plan to safely dispose of it within a predefined, carefully crafted company retention policy across all stages of the lifecycle.

The retention periods established through data classification also help to determine suitable disposal dates. This can help organisations gain insights that would otherwise be difficult to obtain, leading to better decision-making and ultimately, better business outcomes.

And while it is best practice to follow standards and comply with data protection regulations; a standard is only a collection of guidelines laid down by a governing body, and it does not ensure regulatory compliance. This is even more important when working across borders, as different countries adhere to different privacy regulations. Businesses will face severe repercussions without the proper data management practices in place across the information lifecycle.

At Nextro, we understand the importance of implementing efficient cybersecurity measures to protect not only your company’s sensitive data but also your operations and finances.
If you want to know more about Nextro’s cyber security solutions, get in touch with our team of experts.

The post Understanding Financial Risks of Cybersecurity Complacency appeared first on Nextro.

]]>
Wi-Fi 7: What Should You Know? https://nextro.nz/wi-fi-7-what-should-you-know/?utm_source=rss&utm_medium=rss&utm_campaign=wi-fi-7-what-should-you-know Thu, 30 Nov 2023 00:38:49 +0000 https://rzw.pcv.mybluehost.me/.website_4fef5db6/?p=2781 Wi-Fi 7: What Should You Know? As Wi-Fi 7 gains more traction as the latest wireless advancement that continues to make waves in the technology world, RUCKUS Networks has been working on bringing the aspects of this new technology to our readers to help prepare the way for the eventual flood of new devices that...

The post Wi-Fi 7: What Should You Know? appeared first on Nextro.

]]>
Wi-Fi 7: What Should You Know?

As Wi-Fi 7 gains more traction as the latest wireless advancement that continues to make waves in the technology world, RUCKUS Networks has been working on bringing the aspects of this new technology to our readers to help prepare the way for the eventual flood of new devices that have already started to enter the market and are projected to expand even more as we enter 2024.

The next generation of Wi-Fi® technology will take your network to the next level.

The Wi-Fi Alliance’s new IEEE 802.11be standard defines Wi-Fi 7—and RUCKUS Networks defines a new level for your network. For enterprise, healthcare, education, large public venues and other environments, Wi-Fi 7 is your key to unlocking a more efficient, secure and responsive network.

Wi-Fi 7’s extreme speeds, low latency and increased capacity deliver exceptional user experiences and empower an entirely new class of advanced connected devices and demanding applications. Need a way to manage 8K video streams, extended reality (XR) video conferencing, massive social gaming, and more? Wi-Fi 7 is the answer you’ve been waiting for—and RUCKUS® will bring it to life for you as the first supporting enterprise-class devices hit the market in 2024.

In the Wi-Fi 7 age, RUCKUS will transform our entire portfolio to a three-radio architecture supporting the simultaneous 2.4 GHz, 5 GHz and 6 GHz bands required for the new standard. Wi-Fi 7 deployment will dramatically increase throughput, reduce latency and improve connection reliability.

Wi-Fi 7 is the next big thing we’ve all been waiting for. RUCKUS will be ready to make it work its hardest for your network.

Benefits of Wi-Fi 7

Offers dramatically better throughput

RUCKUS Wi-Fi 7 solutions will deliver massive throughput boosts over Wi-Fi 6 thanks to its wider channels and greater 6 GHz capacity gains. The result? Peak rates exceeding 40 Gbps, FOUR TIMES the throughput of Wi-Fi 6.

Offers dramatically better throughput

RUCKUS Wi-Fi 7 solutions will deliver massive throughput boosts over Wi-Fi 6 thanks to its wider channels and greater 6 GHz capacity gains. The result? Peak rates exceeding 40 Gbps, FOUR TIMES the throughput of Wi-Fi 6.

Provides wireless link aggregation with MLO

Multi-link operation (MLO) uses multiple bands to simultaneously connect AP and user devices. Aggregating these discrete links significantly increases throughput, reduces latency and improves connection reliability.

Conquers interference with preamble puncturing

Preamble puncturing enables a Wi-Fi 7 AP to transmit a “punctured” portion of a channel if a portion of that channel spectrum is being used by legacy users. This feature is what lets Wi-Fi 7 support 320 Mhz channel—double that of Wi-Fi 6—without letting interference degrade performance.

Supports the most demanding low-latency applications

Deterministic latency is a critical need for advanced applications like AR and VR that can’t tolerate highly variable latency levels. RUCKUS Wi-Fi 7 technologies will support time-sensitive networking (TSN) to provide the deterministic latency the applications need.

Will we actually see speeds of 46 Gbps?

The short answer is no. The major stumbling block now is the spatial streams. 16 spatial streams look good on paper, but in reality, the size and power needed to support 16 spatial streams make it something that won’t be seen outside of a lab.

With the release of the 6 GHz spectrum for Wi-Fi use, we get two of three criteria needed for 46 Gbps (4K QAM with Wi-Fi 7, 320 MHz wide channels in 6 GHz) but the lack of 16 spatial streams in client devices means we are looking at closer to 5 Gbps with the 2 spatial stream client devices we expect to see on the market. While that might seem like a little bit of a letdown, let’s be honest here, 5 Gbps is still a significant upgrade to the throughput we saw with the same parameters but using a Wi-Fi 6E client and AP. Also, while the United States is lucky to have been granted the entire 1,200 MegaHerz worth of spectrum in 6 GHz, not all regulatory domains were as lucky, so these super wide channels won’t be seen everywhere.

What we do get out of Wi-Fi 7 is a much better service to support applications like VR, AR, online gaming, cloud computing, and remote office workers.

Why Does Punctured Transmission Work with Wi-Fi 7?

Wi-Fi 7 introduces the concept of these narrow band “interferes” being a simple puncturing of the spectrum. The devices are then allowed to “heal” around that puncture and recover the spectrum that was lost in the past. Sure, it’s never great to have a puncture, but if and when that happens, it sure would be nice to just have to slow down a little bit instead of having a catastrophic blowout and wrecking the network.

What about wireless congestion?

This feature has three major operating modes, each bringing its own benefit to Wi-Fi. While not all the modes directly address this issue, any improvement in how the channel is utilised will naturally lead to higher Wi-Fi speeds, making your internet connection feel much faster, even though you might not meet the conditions of EHT outlined above.

  • Improved Resiliency using Link Redundancy
  • Improved Throughput using Link Aggregation
  • Improved Latency (or lower latency) using Link Selection, even in networks experiencing congestion

Of all the enhancements in Wi-Fi 7, MLO offers the best chance for peak performance in Wi-Fi to date. It also is a great lead into what 802.11bn is supposed to offer and a small glimpse into what the next 8 to 10 years of Wi-Fi could possibly look like.

If you want to learn more about the benefits WiFi-7 can bring to your business, get in touch with our team now.

The post Wi-Fi 7: What Should You Know? appeared first on Nextro.

]]>
What’s new in Genetec Mission Control 3.1? https://nextro.nz/whats-new-in-genetec-mission-control-3-1/?utm_source=rss&utm_medium=rss&utm_campaign=whats-new-in-genetec-mission-control-3-1 Mon, 07 Nov 2022 21:00:27 +0000 https://nextro.nz/?p=1643 Mission Control version 3.1 is now available and it includes exciting new features and enhancements as well as a new way for you to access it.

The post What’s new in Genetec Mission Control 3.1? appeared first on Nextro.

]]>
What’s new in Genetec Mission Control 3.1?

The latest version of Genetec’s collaborative decision management system includes exciting new features and enhancements. Automated emails have been improved to optimise communication among internal and external stakeholders. These emails can now include attached reports as well. You can also boost your system’s resiliency with new failover capabilities. Patrollers can add context for operators and facilitate investigations by attaching photos from the field using the Genetec Mobile App.

Keep Stakeholders in the loop

Automated emails are a great way to share information with stakeholders on your response teams. Expand the reach of these communications with the ability to send emails to external recipients that are not users within your system. You can also select specific cardholders from your access control database.

Attach reports to automated emails

Reports are essential tools when it comes to investigating incidents. Accelerate response times by automatically emailing pertinent reports to specific team members. For example, a report on door activities can be instantly shared with a patroller investigating an incident from a door forced open. Data reports can be sent in PDF, Excel, and CSV formats while graphical reports can be sent as PNGs and JPEGs.

Be prepared for the unexpected with new
failover capabilities

Failover planning is crucial in building resilient systems so that your team can respond to incidents without missing a beat. Hardware issues, network failures, and cyber-attacks are examples of threats that organizations must be prepared for at all times. Mission Control 3.1 allows you to set up failover for its messaging broker so that you can jump to a plan B should the unexpected occur.

Access websites without switching screens

Key information specific to certain incidents can often be found on web pages. For example, transit schedules, building information, and manuals may need to be consulted for specific procedure steps. Additional fields can now be used to display web pages within incident tiles to avoid operators having to shift their attention away from their monitoring screen. URLs can even be modified based on operator responses to the procedure to call up even more specific web pages.

Share information from the field

Patrollers often discover key information in the field that must be relayed to the security operations center. Mobile users can now attach photos to incidents to add context for operators and facilitate investigations. For example, they can take a picture of damaged property or evidence of a forced entry and attach it to the incident file.

Interested to know more? Please get in touch here.

The post What’s new in Genetec Mission Control 3.1? appeared first on Nextro.

]]>
Nextro wins Ruckus Networks “Best of Breed” Award at ANZ Event https://nextro.nz/nextro-wins-ruckus-networks-best-of-breed-award-at-anz-event/?utm_source=rss&utm_medium=rss&utm_campaign=nextro-wins-ruckus-networks-best-of-breed-award-at-anz-event Thu, 04 Aug 2022 04:48:04 +0000 https://nextro.nz/?p=1611 Nextro wins Ruckus Networks “Best of Breed” Award at ANZ Event Nextro praised for innovation, market-leading finance models, and redefining the delivery of managed network & security services in the New Zealand market The 2022 Ruckus ANZ Mini Dogs Partner Conference has concluded in Hobart with NZ-based Nextro taking out an important channel award. Nextro,...

The post Nextro wins Ruckus Networks “Best of Breed” Award at ANZ Event appeared first on Nextro.

]]>
Nextro wins Ruckus Networks “Best of Breed” Award at ANZ Event

Nextro praised for innovation, market-leading finance models, and redefining the delivery of managed network & security services in the New Zealand market

The 2022 Ruckus ANZ Mini Dogs Partner Conference has concluded in Hobart with NZ-based Nextro taking out an important channel award.

Nextro, the New Zealand managed network and security services provider, was awarded the Ruckus Channel “Best of Breed” title for its platform innovation and managed service model successes in the New Zealand market over the last year.

The award recognises Nextro’s customer wins and project delivery achievements in the hospitality, crowded-places security and large-scale facilities markets deploying and integrating Ruckus switching and WiFi equipment across New Zealand.

“This award is solid recognition for Nextro’s engineering and solutions teams’ accomplishments over the last 12-18 months. Nextro has continued to innovate and operate secure corporate and building services networks delivering clarity and certainty for its customers,” said Martyn Levy, Nextro’s Managing Director.

Nextro’s managed networks secure and support corporate and building services operations applications such as voice, secure cloud connectivity, video surveillance, intrusion detection, access control, and building management systems.

“Martyn and the team at Nextro are being recognised for the innovative approach they take to creating a holistic managed service proposition, providing the perfect combination of market-leading hardware solutions, cutting-edge innovation, and an industry-leading finance model. Nextro is redefining managed services on Ruckus-based networks in the New Zealand market,” said David Fenner, ANZ Regional Sales Manager, Ruckus Networks.

The post Nextro wins Ruckus Networks “Best of Breed” Award at ANZ Event appeared first on Nextro.

]]>