SlideShare a Scribd company logo
1 of 7
www.kbcnetworks.com
ThruLink™
Craig Kennedy
Technical Solutions
KBC Networks
Introduction
www.kbcnetworks.com
What is ThruLink?
• Hardware Encrypted Secure transmission solution
• Designed to operate over any Private or Public Network
• Manages and maintains the network
• Simplified Layer 2 device with Advanced Layer 3 features
• Optimised for Video transmission
• Supports Multicast encrypted transmission
• Offers 4G/WAN failover function
• Traffic management feature
• Unlimited backup authentication servers
• Other additional features
www.kbcnetworks.com
Why use ThruLink?
• Simple to install
• License free solution
• No software or plugins required
• Does not require a Fixed public IP on remote sites
• Limited only by available network bandwidth
• Build in self-recovery and re-connection
www.kbcnetworks.com
Video Examples
www.kbcnetworks.com
Real world example use
• Police
• Covert monitoring over public networks
• Central management of Access control
• River and harbour patrol boats live streaming
• Town and City Centre
• Counter Terrorism
• Traffic Enforcement, ANPR, Traffic Radar and Traffic
Management
• Live vehicle streams
• Retail and Data Centre
www.kbcnetworks.com
Where can ThruLink be used
• ANY CCTV, Fire, Alarm and Access control system
• Cash in transit and valuable goods transportation
• Public transport Data, Video and Audio
• Government and hospital secure data transmission
• Retail and banking
• Traffic monitoring, control and enforcement
• Anything where you need to get information to and from
multiple locations over a public network
www.kbcnetworks.com
• Designed to offer a simple solution to a complex problem
• Make better use of existing low cost global networks
• Provide a secure connection
• Remove any ongoing costs, licenses and specialist skills
• Addressing todays cyber security in video, audio and data
Summary

More Related Content

What's hot

MQTT in the Internet of Things | Loop by Litmus Automation
MQTT in the Internet of Things | Loop by Litmus AutomationMQTT in the Internet of Things | Loop by Litmus Automation
MQTT in the Internet of Things | Loop by Litmus AutomationLitmusautomation
 
Fintech week london 2014
Fintech week london 2014Fintech week london 2014
Fintech week london 2014Mauro Rappa
 
Push! - MQTT for the Internet of Things
Push! - MQTT for the Internet of ThingsPush! - MQTT for the Internet of Things
Push! - MQTT for the Internet of ThingsDominik Obermaier
 
Next Gen Monitoring with INT
Next Gen Monitoring with INTNext Gen Monitoring with INT
Next Gen Monitoring with INTMyNOG
 
MQTT 101 - Getting started with the lightweight IoT Protocol
MQTT 101  - Getting started with the lightweight IoT ProtocolMQTT 101  - Getting started with the lightweight IoT Protocol
MQTT 101 - Getting started with the lightweight IoT ProtocolChristian Götz
 
inSIG 2021: Introduction to core Internet technologies and the APNIC PDP
inSIG 2021: Introduction to core Internet technologies and the APNIC PDPinSIG 2021: Introduction to core Internet technologies and the APNIC PDP
inSIG 2021: Introduction to core Internet technologies and the APNIC PDPAPNIC
 
Realising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVRealising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVNapier University
 
ProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center NetworkProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center NetworkOpen Networking Summits
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces conceptsMostafa El Lathy
 
Connect to the IoT with a lightweight protocol MQTT
Connect to the IoT with a lightweight protocol MQTTConnect to the IoT with a lightweight protocol MQTT
Connect to the IoT with a lightweight protocol MQTTKenneth Peeples
 
Consultech International:PacketViper Solution
Consultech International:PacketViper SolutionConsultech International:PacketViper Solution
Consultech International:PacketViper SolutionConsultech International
 
Enhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snortEnhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snortYaashan Raj
 
Davra IOT Platform - Zero Touch Deployment
Davra IOT Platform - Zero Touch DeploymentDavra IOT Platform - Zero Touch Deployment
Davra IOT Platform - Zero Touch Deploymentdavranetworks
 
SDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceSDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceOpen Networking Summit
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFVMary McEvoy Carroll
 

What's hot (20)

MQTT in the Internet of Things | Loop by Litmus Automation
MQTT in the Internet of Things | Loop by Litmus AutomationMQTT in the Internet of Things | Loop by Litmus Automation
MQTT in the Internet of Things | Loop by Litmus Automation
 
Fintech week london 2014
Fintech week london 2014Fintech week london 2014
Fintech week london 2014
 
Push! - MQTT for the Internet of Things
Push! - MQTT for the Internet of ThingsPush! - MQTT for the Internet of Things
Push! - MQTT for the Internet of Things
 
Next Gen Monitoring with INT
Next Gen Monitoring with INTNext Gen Monitoring with INT
Next Gen Monitoring with INT
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
MQTT 101 - Getting started with the lightweight IoT Protocol
MQTT 101  - Getting started with the lightweight IoT ProtocolMQTT 101  - Getting started with the lightweight IoT Protocol
MQTT 101 - Getting started with the lightweight IoT Protocol
 
inSIG 2021: Introduction to core Internet technologies and the APNIC PDP
inSIG 2021: Introduction to core Internet technologies and the APNIC PDPinSIG 2021: Introduction to core Internet technologies and the APNIC PDP
inSIG 2021: Introduction to core Internet technologies and the APNIC PDP
 
Realising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVRealising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFV
 
ProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center NetworkProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center Network
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
Connect to the IoT with a lightweight protocol MQTT
Connect to the IoT with a lightweight protocol MQTTConnect to the IoT with a lightweight protocol MQTT
Connect to the IoT with a lightweight protocol MQTT
 
Consultech International:PacketViper Solution
Consultech International:PacketViper SolutionConsultech International:PacketViper Solution
Consultech International:PacketViper Solution
 
Enhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snortEnhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snort
 
Davra IOT Platform - Zero Touch Deployment
Davra IOT Platform - Zero Touch DeploymentDavra IOT Platform - Zero Touch Deployment
Davra IOT Platform - Zero Touch Deployment
 
Sec conf london_v07
Sec conf london_v07Sec conf london_v07
Sec conf london_v07
 
SDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceSDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity Service
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFV
 
Virtual WAN
Virtual WANVirtual WAN
Virtual WAN
 

Similar to Kbc networks thrulink 15 minute presentation

Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networksKishor Satpathy
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationPaul Richards
 
03. Introduction to SDN – Software defined network.pdf
03. Introduction to SDN – Software defined network.pdf03. Introduction to SDN – Software defined network.pdf
03. Introduction to SDN – Software defined network.pdfssuser348b1c
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgEric Vanderburg
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure ServicesBizTalk360
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...SWITCHPOINT NV/SA
 
Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Brandon Albert
 
Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Brandon Albert
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
Operators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksOperators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksJakub Pavlik
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...SBWebinars
 

Similar to Kbc networks thrulink 15 minute presentation (20)

Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for Transportation
 
03. Introduction to SDN – Software defined network.pdf
03. Introduction to SDN – Software defined network.pdf03. Introduction to SDN – Software defined network.pdf
03. Introduction to SDN – Software defined network.pdf
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure Services
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 
Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_
 
Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Operators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 NetworksOperators experience and perspective on SDN with VLANs and L3 Networks
Operators experience and perspective on SDN with VLANs and L3 Networks
 
Networks
NetworksNetworks
Networks
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Kbc networks thrulink 15 minute presentation

  • 2. www.kbcnetworks.com What is ThruLink? • Hardware Encrypted Secure transmission solution • Designed to operate over any Private or Public Network • Manages and maintains the network • Simplified Layer 2 device with Advanced Layer 3 features • Optimised for Video transmission • Supports Multicast encrypted transmission • Offers 4G/WAN failover function • Traffic management feature • Unlimited backup authentication servers • Other additional features
  • 3. www.kbcnetworks.com Why use ThruLink? • Simple to install • License free solution • No software or plugins required • Does not require a Fixed public IP on remote sites • Limited only by available network bandwidth • Build in self-recovery and re-connection
  • 5. www.kbcnetworks.com Real world example use • Police • Covert monitoring over public networks • Central management of Access control • River and harbour patrol boats live streaming • Town and City Centre • Counter Terrorism • Traffic Enforcement, ANPR, Traffic Radar and Traffic Management • Live vehicle streams • Retail and Data Centre
  • 6. www.kbcnetworks.com Where can ThruLink be used • ANY CCTV, Fire, Alarm and Access control system • Cash in transit and valuable goods transportation • Public transport Data, Video and Audio • Government and hospital secure data transmission • Retail and banking • Traffic monitoring, control and enforcement • Anything where you need to get information to and from multiple locations over a public network
  • 7. www.kbcnetworks.com • Designed to offer a simple solution to a complex problem • Make better use of existing low cost global networks • Provide a secure connection • Remove any ongoing costs, licenses and specialist skills • Addressing todays cyber security in video, audio and data Summary

Editor's Notes

  1. Introduction: Craig Kennedy, Solutions Architect for KBC Networks will present a semi-technical overview of the product “ThruLink™”.
  2. Fully Hardware Encrypted Secure Transmission solution, SSL Based – ThruLink is a hardware encryption VPN, based on SSL technology, using a proprietary two way authentication system to ensure that the system is secure, and hardware encryption rather than software to provide a robust and reliable VPN. We use standards based encryption Ciphers, AES, Blowfish and Camellia at 128 to 256Bit encryption levels, with many inhouse developed features to ensure the device remains 100% secure at all times. (special sauce) Designed to operate over any private or public network – ThruLink requires nothing more than a physical connection to an internet accessible network. By that I mean if you have a local network that allows internet access (typical ADSL, Cable etc) then ThruLink will work with no network changes needed, but you can also put any data sim, 3G,4G,LTE and the system will operate in the same way over the public CEL/Mobile networks. You will not require any fixed public IP on any client, you only need a fixed IP or use of DDNS services at the authentication server side, and any ThruLink device can perform as the Authentication server/s Managed and maintains the network – ThruLink takes care of all routing requirements automatically. As a new ThruLink is connected or an existing ThruLink is disconnected from the network, ThruLink will automatically update all existing devices to ensure the network knows of the changes, this also applies to changing public IP addresses. Is a Layer 2 device with advanced routing functionality – ThruLink is inherently a Layer 2 device, in much the same way as a router performs, however we have added Layer 3 features to ensure the unit can be installed in any networking environment, no matter how complex it may be. Layer 3 features include Static routes and Alias Ips. Optimised for video transmission – ThruLink is constantly monitoring the available speed of the connection and ensures that at all times you always have the best speed available, while doing this ThruLink is also making dynamic adjustments to try and alleviate video jitter, though impossible to cure, ThruLink does a good job of handling this, better than most alternative solutions Support Multicast encrypted transmission– ThruLink is one of the few encrypted VPN systems available that can also encrypt and transmit multicast traffic. Offers 4G/WAN failover function – ThruLink can be configured with both a WAN connection to an existing network as well as a 3G/4G/LTE connection. One of these can be configured as the primary and the other as secondary, with automatic switchover and delayed recovery option to ensure network stability before switching back. Traffic Management feature – Our traffic management feature allows you to block access to anything outside of the VPN information itself. Essentially we can block access to the internet or local addresses allowing access only to any device configured within the VPN itself. This is particularly good when using a 4G link with limited data. Unlimited backup authentication servers – All ThruLink units are capable of authenticating new units onto a network, requiring only that there is the ability to port forward onto that individual ThruLink, this means you can have any number of units capable of authenticating new connections ensuring the network is always available globally. Other additional features – There are a number of features in addition to the above, listed as follows. Cisco Port 150 – ThruLink can support the Cisco port 150 option required for use in Cisco IP telephony systems. RS485 – ThruLink can support use of 2 wire RS485 telemetry, converting it to IP within the VPN Network scanner – A built in network scanner can be used to locate all pre-configured VPN devices on the local ThruLink unit
  3. Simple to install - ThruLink takes only a few minutes to configure, a quick reboot and the unit is fully operational, at this stage it can be handed to any person with very basic instructions to connect it to the network License free solution – ThruLink is a license free system. There are no limitations or restrictions other than available throughput and bandwidth. If you have the bandwidth you can have 10, 100, 1000 and more simultaneous VPN connections with no worry about running out of licenses, or the need to manage those licenses. No Software or plugins required – ThruLink is agnostic to what is connected to it. You can connect any IP based device to ThruLink and provided it is configured to communicate over ThruLink itself, it will work. No software, no plugins. It really is that simple Requires no fixed public IP on any remote client – Unlike many VPN systems, ThruLink operates without the need for any fixed public IP address on any of the remote locations. Limited only by available network bandwidth – ThruLink is limited to what the device itself can handle (15Mbs, 30Mbps, 100Mbps and 200Mbps) and what bandwidth is available form the network provider. Built in self-recovery and re-connection - As well as the self maintenance aspect, ThruLink will also automatically re-connect in the event of signal or power loss, with no user intervention required at any stage. ThruLink also has build in checks to ensure this works in any given scenario.
  4. Video 1 (upper left) – Streaming live from a vehicle during the entire Milipol Exhibition in Qatar. This was 4G to 4G Video 1 (upper right) – Same location and show as video 1, however here we have integrated into Milestone systems. The top left is a video playback within Milestone, lower right is local cameras on the booth and upper right is a ThruLink mounted camera outside a building in Qatar, switching over to the live Vehicle again, then finally switching to a camera in our UK office. Video 1 (lower) – Showing one of the many NVR systems we have tested with, in this instance Avigilon, with 4 remote cameras, 3 individual remote locations in the UK, one in California Other videos can be viewed on our Youtube Channel - https://www.youtube.com/user/kbcnetworks
  5. The above listed applications are real applications. Some of them we can generally talk about however we may not be at liberty to mention the police or government body using it or in which country. The main reasons ThruLink has been selected over the many alternative solutions available, are listed as follows. I have personally been involved in almost all of the above installs, providing guidance, training and consultancy on best practices for the said installation. I have also been the initiater, installer for POC (Proof of concepts) in Saudi Arabia banking and police, Bahrain Police and Militry, Kuwait Government, Qatar Special police, The Hague, Valuable goods transit, even mounting ThruLink to a Quad Copter for use in 4G based Facial recognition.
  6. What are the Key features of ThruLink 1. Always Encrypted, up to 256Bit AES, Blowfish, Camellia. ThruLink out of the box has 128Bit AES already configured. There is no option to disable encryption, however you can select up to 256 Bit, and change the Cipher to AES, BlowFish and Camellia. We can also add custom Ciphers if desired (recently we added Chinas own Cipher for their own use). 2. Optimised for transmission of video we dynamically adjust the MTU depending on available bandwidth at all times, this allows us to ensure we are always providing the system with the most bandwidth at all times. Operated over any public or private network, including 3G/4G/LTE ThruLink has been designed so it can be used with a Standard ADSL, DSL, Cable, V-Sat or internal LAN environment, and is immune to NAT. With the embedded 4G enabled modem, making use of the public mobile network allows the system to be used in areas where there is no alternative connectivity. It has been tested in private 4G network situations as well as public, and we regularly use it at Proof of concepts using a simple pre-pay sim. 4. No fixed public IP required on any client location ThruLink does not need to have a fixed public IP on any of the units on the network that are not required to authenticate. Essentially if you have a 500 remote site system, and you have 2 Authentication servers, the servers will need to have either a fixed IP, or make use of DNS addresses, while all 500 of the remote clients can be on any connection and any IP address. ThruLink will handle the route tables, so when a client detects that the public IP address it had has now changed, the first thing that happens is the client lets the Authentication servers know (part of the re-auth process), and the server then sends out the updated information to all other devices. 5. Selectable Route or Bridge mode for Multicast support Initially ThruLink was designed as a bridge only device, but as IP became the preferred option for security based systems, and networks got larger and more complexed, we developed route mode. Bridge has its place, and it is where there is still a need to multicast video transmission, while route mode is the preferred option due to it being more efficient. 6. Multiple Authentication Failover Facility ThruLink devices can be switched into Client or Server mode. As a server they are basically sitting listening for incoming Authentication requests from other clients, however its worth noting that the server can and does operate in the same was as a client, so if you are connected to the server, using whatever control software you have (Milestone, Digifort, Pelco etc) you can access the remote information just as you would connected as a client. By the same token, if the client or clients all have a fixed public IP or DNS address, then these can authenticate new clients. This essentially means you have a network of devices all of which can provide authentication redundancy. 500 ThruLinks could, if it was needed be remote clients, as well as backup Authentication servers, and the configuration for this in each unit is a simple matter of typing the IP/DNS and name. 7. Layer 2 with Layer 3 Advanced Routing facitliy The ThruLink is inherently a Layer 2 device, however due to, again, ever expanding and more complex networks, advanced routing has been added. We can now support multiple Alias IP subnets on the LAN and the WAN interfaces, as well as provide static routing where needed. A recent Proof of concept required that our ThruLink in a point to point scenario be capable of traversing 5 individual subnets, where their own L3 network switches would take care of the routing once it left our network. 8. WAN / 4G failover function You are able to utilise any WAN type of connection (ADSL, Cable etc) and have 4G on as a standby. Our system will detect the WAN disconnection, and switch over the 4G link with minimal down time. The reverse is also possible, where 4G is primary and WAN is secondary, and we have also included a function where you can specify the time it must wait before switching over to the resolved link. Basically if the WAN is primary and 4G is secondary. The WAN goes off line, and the 4G then becomes the active link. Periodically the system will check the WAN status, and if the status of the WAN is live, rather than switch immediately back over to the WAN, the system will wait for the pre-defined time (you can set this) and then switch over. This accommodates issues where the WAN comes back briefly and then fails again. 9. 100% clientless, no software or plugins required Unlike many systems that claim to be clientless, we truly are. You can connect your systems to our device, link established, and use whatever software you need to use, or hardware. No need to install anything on your computer, no plugins or browser add-on's needed, use the systems as if you were locally connected. 10. No licenses, no VPN tunnel limitations Many VPN solutions have rules in place, these come in the form of licensing, 10 user license etc, as well as max number of VPN tunnels that can be opened simultaneously. ThruLink has none of these. There are absolutely no licenses at all, nor do we restrict the number of VPN tunnels you can have. Basically if you buy the 30Mbps unit, then that is your limitation. If you have 240 remote sites, each requiring no more than100K, then you could essentially have 240 open VPN tunnels. It comes down to the maths. Our units come in 15Mbps, 30Mbps and 200Mbps, if you have bandwidth from your service provider that matches or is less than these your good to go. 11. Embedded WIFI Hotspot the embedded WIFI hotspot is still under development, but extensive tests have been conducted including over 2km distance using boosted omni directional antennas in a MESH configuration.