Until recently, the IT department didn't need to be concerned about AV equipment or control, nor did the AV department typically discuss AV equipment or control deployments with the IT department. With the growing sophistication of security threats and the rise of more and more connected devices, that has changed. It is now critical for AV and IT departments to understand how to talk each other's language, because the health of the institution depends on its level of security. This vital guide, put together by a leading expert in AV/IT security, provides the information you need to know for a successful and secure deployment.
The following white papers were written by Paul Zielie outside of AVCoIP LLC. They provide good non-brand specific information on AV technology integrated into Enterprise IT infrastructures using the standards and best practices expected for applications running on Enterprise IT.
The links will bring you to the websites of the coyright holders and may require registration in order to download the content.
When security requirements and configurations are overlooked when specifying an AV system, it can lead to a conflict later in the integration process. When expectations for the security features system of the system are not set, the proper requirements are not designed into the system. This crucial workbook explains which areas of IT security, user access control, and network security pertain to AV integration, and then suggests language to accurately convey the security requirements in a Request for Proposal (RFP) or proposal to set expectations for the security attributes of a system.
Video streaming is one of the most requested, and least understood, technologies within the workplace and campus. This workbook goes beyond the cameras, recorders, displays and devices, and dives into the details at the back end of the hardware, software and the network, providing the information you need to know for a successful deployment.
This document provides a network equipment neutral, technical overview of multicast protocols and a discussion of techniques and best practices for implementing multicast video on an Enterprise Network. It is intended for technical readers who wish to expand their knowledge of video management and distribution