SIA Launches Effort to Create Security Device Network Protocols
SILVER SPRING, Md. — The Security Industry Association (SIA) Standards Committee will begin work on a security industry-specific set of attributes relating to simple network management protocol (SNMP) management information base (MIB) structure.
SIA’s decision to define the security-specific information bases stems from the surge of security devices hosted on enterprise networks. The SNMP allows monitoring and supervision of network devices. SNMP commands operate through MIBs embedded in the IP device. Currently, there are no standard MIBs defined by the security industry, leaving individual manufacturers to define custom MIBs in their products.
Characterizing a set of industry-wide MIBs, could essentially be used to provide a uniform means of monitoring security devices within the widely-used SNMP structure, according to SIA.
“This is an obvious opportunity for the SIA Standards Committee to plug a big hole,” says Ray Coulombe, managing director of SecuritySpecifiers.com says. “Most responsible vendors offer SNMP functionality, but there is no guidance on exactly what this should provide. This effort will bring the industry into closer harmony with a major IP-related protocol and allow for better integration of security devices into the network fabric.”
Coulombe will lead an ad-hoc SIA Standards Subcommittee that will begin working on the project in early August. Those interested in joining the subcommittee should contact SIA Director of Standards Joe Gittens at [email protected].
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.