Separate security hype from reality

September 2013 Surveillance, Perimeter Security, Alarms & Intruder Detection, Infrastructure

Peter Turvey
Peter Turvey

Wireless networks have been labelled as generally insecure, supported by all sorts of horror stories on the Internet and even mainstream press. Hi-Tech Security Solutions spoke to Peter Turvey and Nick Ehrke from Radwin SA to find out how insecure wireless really is.

Turvey is quick to point out that we generally lump all wireless communications in the same basket as public WiFi access. This is a mistake as the WiFi you access at a coffee shop or the airport is designed to be widely available to as many people as possible. These networks are designed for easy access, making them somewhat insecure by design.

When looking at wireless networks used for transmitting business data and, specifically to the security industry, video surveillance, Turvey explains that these systems are not WiFi and run on different protocols and frequencies.

“Radwin’s technology was designed for use in the Israeli military,” explains Turvey. “It needed to be secure, have a longer range than WiFi and be reliable enough to use in situations where loss of communications or hacking could lead to a loss of life. These systems are built to reliably support high throughput in harsh conditions.”

This need for secure communications led to the security settings being hardware encoded to ensure they can’t be changed. For example, Turvey says that when setting up a (non-WiFi) wireless connection, you don’t broadcast the network’s existence and ask people to log on. In Radwin’s case, the systems can be set up so that only a specific Radwin device will speak to another specific Radwin device based on each one’s Mac addresses. The communication is also encrypted.

This means that even if someone does find the network, the device will reject any communications from non-specified devices. Using the Mac address means that even if a hacker is using a Radwin device, if it does not have the specified Mac address (or addresses), it will be excluded from the network until an administrator physically adds the new address.

This is even more secure than cabled networks. If you plug a laptop into an Ethernet port at a company, you almost always automatically have access to the first layer of the network as the end point synchronises automatically. For most people this means nothing, but for a hacker with time and skills it’s a starting point. You can’t even get that far on secure wireless networks.

Radwin’s southern African sales director, Nick Ehrke says that the wireless option is finding more acceptance in areas where traditional cabling is impossible, unsightly or even inconvenient. An example is in residential estates where digging up the streets is unpopular. It also avoids problems of cutting cables, either by accident or intentionally, while permitting high throughput for high definition and megapixel cameras.

The benefits of wireless are self evident. Ehrke notes that the wireless cameras on some of Cape Town’s highways have reduced the average response time to accidents from around 20 minutes to about two. Safe City projects are also looking to wireless surveillance links because some city leaders understand that if they can provide a safe environment they will attract businesses and consumers, who will contribute to the city’s tax coffers. Additionally, wireless systems are quicker to deploy without digging up the streets.

Of course, in some smaller companies or private residences, WiFi might be the better choice when networking cameras. However, in these scenarios there are generally a limited number of cameras and constant HD viewing is not a necessity. Even in this scenario, setting up the network securely will make it more difficult for people to find it and hack into it.

The convenience of wireless networking is a given, and with the correct technology and configuration, users can be assured of the security of their data and the cost effectiveness of not having to lay cables. Wireless may not be the solution for every need, but effective planning and research will show that the right wireless solution is often exactly the solution companies require.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Here’s to a SMART 2026
SMART Security Solutions News & Events
This is the final news brief from SMART Security Solutions for 2025, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.