Bynet Data Communications, A leading system integrator is honored to present the first newsletter edition.
Bynet provides a comprehensive range of end-to-end solutions and array of professional services, ranging from consulting, design and implementation through management, maintenance, and training that aim at meeting the rapidly evolving needs of customers across the globe. Bynet delivers value-added turnkey solutions to organizations within the Defense, Industrial, Utilities, Governmental, Healthcare, Telecom, Financial and Academic sectors.
Leveraging its affiliation with the world-renowned RAD-Bynet Group, a group of more than 20 high-tech companies with combined annual revenues of over $850 million, Bynet addresses the full spectrum of IT infrastructure and telecom network requirements across multiple vertical markets while Possessing high-level expertise in numerous technological disciplines and by maintaining a close-knit partnerships with dozens of the world's best-of-breed software and hardware vendors.
We will spare no efforts in order to furnish you with professional and interesting newsletter, and will be more than happy to provide further information.
I wish you an interesting and enjoyable reading Push to Talk - radio systems into Collaboration systems
Oren Sagi - VP Sales, International Division
Many organizations today are using traditional "Push to Talk" radio systems (PTT) as their main tool for enabling 2-way communication between their mobile agents spread around various geographical regions. Typical users of those systems are Public Safety Organizations (e.g., Police, Fire, EMS), Commercial (e.g., Taxi, Service Organizations), Military and others.
Those organizations suffer today from the effects of isolated, non-interoperable radio systems that inhibit their ability to communicate and coordinate effectively during emergencies or any single element failure. The disadvantages of traditional land mobile radio (LMR) networks— communication isolation, lack of scalability, and lack of flexibility—detract from their real advantages of high reliability, privacy, and local control.
Recognizing those challenges, Cisco developed the IPICS (Interoperability and Collaboration System) portfolio of products which offers a network-centric, information-based interoperability solution based on existing standards, proven technologies, and commercially available products.
This approach enables the organization to build a scalable, cost-effective communications network with existing LMR systems using a converged IP infrastructure.
Converting the current PTT infrastructure to IP provides the freedom and flexibility to choose the access method, device, and media type. Radio traffic from existing radios travels over the existing IP network just like any other kind of voice, video, or data traffic. The organization gain the inherent benefits of IP networks, including resiliency, scalability, and management, using widely available skills and tools.
Bynet has understood the growing need for these type of applications based on vast experience in Military and Public Safety agencies and joined Cisco in an early stage for becoming the first and only system integration company in Europe certified to sell, install and support the IPICS solution.
Aiming to be positioned as world leader for the Cisco IPICS technology, Bynet is already engaged in the implementation of two LMRoIP solutions in major customers in Europe and Asia using our team of experts in the field of radio communication and IP infrastructure.Ethernet over Anything & Anything over Ethernet
for more information:
Bynet Data Communications, the only Cisco IPICS (Radio over IP) ATP in Europe
Ethernet has finally come to the wide area network. It has arrived in the form of new Ethernet-based services and is being warmly embraced by carriers, service providers and their enterprise customers. This means that enterprise customers can take advantage of the benefits of an Ethernet-based network infrastructure to support individualized applications, such as video, mission-critical data and even voice, as well as Internet access and transparent LAN connectivity. Bynet Data Communications has developed a unique portfolio based on RAD Ethernet access product solutions, ranging from intelligent customer-located demarcation devices to channelized Ethernet gateways, integrated access devices, multiservice concentrators, wireless multiplexers and media converters, supporting multiservice Ethernet-based access over any infrastructure:
||Ethernet over Fiber - Intelligent Ethernet Demarcation in the Fiber Local Loop: enables service providers to deliver managed Ethernet services end-to-end over the fiber local loop with enforcement of service level agreements (SLAs). |
||Ethernet over PDH/SDH/SONET – Ethernet over “Legacy” Networks: Many organizations for reasons of cost and availability continue to run their Ethernet traffic over E1/T1 PDH links (or multiple E1/T1s) to access the carrier network. Bynet can offer a full range of converters and gateways, with multiple Ethernet user interfaces and access rates as well as Next Generation devices supporting GFP, VCAT , LCAS, etc. |
||Ethernet over DSL – ATM DSLAM and IP DSLAM Networks: Using the RAD IAD family, Carriers can still use the existing ATM/IP DSLAMs to deploy and deliver converged services. This improves network utilization and eliminates the need to invest in new infrastructure, thereby achieving increased profitability. The LA products guarantee QoS and end-to-end management up to the customer premises. |
||Ethernet over ATM – Using RAD’s CLE devices for Ethernet and circuit emulation services, ensures effective Ethernet to ATM conversion with end-to-end control and support of service level agreements, allowing both transparent and VLAN-aware bridging in point-to-point or point-to-multipoint topologies. |
||Ethernet over Wireless - enabling users to connect Ethernet and E1/T1 point-to-point over unlicensed broadband wireless links supporting radio air interface BW of up to 48 Mbps, yielding full duplex throughput of up to 18 Mbps. |
For more information: www.ethernetaccess.com Data Security, the Bynet Concept
With new security threats to IT infrastructure continuously cropping up, data security solutions must leverage the most advanced and emerging technologies.
Bynet has developed an innovative 7 layers security concept providing a wide array of state of the art data security solutions that feature application protection, content security, one-time password, strong device authentication, intrusion prevention systems, public key infrastructure, managibility, risk assessment and consulting services.
With threats to IT infrastructure implementations emanating from both within and outside the organization, we apply a multi-layered approach to data security, enabling both internal and external users to receive the same level of IT service and security, bringing its customers the extensive experience and excellence based on world's best of breed vendors.
The first layer of the module concept deals with protecting the communication infrastructure against various network attacks (such as DOS) by using , leading Network IPS solutions, advanced Firewalls, UTM technologies including security services for communications networks allowing full security virtualization. The communication layer also includes solutions based on the 802.1X standard.
Second layer of protection deals with various data and content types traversing over the infrastructure. Content solutions include handing different data types such as SMTP, HTTP, Instant Messaging, Voip and Video. Performing content filtering, Anti Virus/Span capabilities and more.
Moving into the IT datacenter environment requires different type of solutions for protecting both web applications and Databases. The solution enables audit of all traffic to and from the DB with the ability to act as an application level FW.
AAA solutions are considered as a separated layer including Identification solutions and secured remote access methods to corporate applications, with or without the need for a VPN Client, PKI solutions for digital signatures, strong identification and biometric authentication means as well as Token & OTP solutions for strong authentication.
Managing and securing the various types of End Points (e.g PDA, Mobile phones, Laptops etc.) faces one of the most challenging areas when defending IT infrastructure.
Solutions for this layer include external lock devices for computers, personal FW, IPS and IDS, strong devices authentication, Anti-Virus/Spam application and complete NAC capabilities for protecting the corporate network.
SOC/ SIM (Security Operation Center / Security Information Management) represent the sixth layer of Bynet's model which deals with central management and smart operation of events created by the various network elements.
IDM (Identity Management), represent another side of security management, controlling identities from one central location, providing self service capabilities as well as defining automatic processes (i.e., workflows, provisioning) for managing the life cycle of users in the organization.
The top layer approaches Risk Management in terms of cost/benefit ratios, providing to senior management and data security managers a comprehensive picture and tools for assessing the level of risk in the organization and improve data security as well as complying with regulations such as SOX, Basel II, HIPAA, GLBA and others.
So, If you're thinking about information security, think Bynet