Juniper EX Series Base Configuration for CCTV and Security Networks
Juniper EX series (Junos OS) configuration template: VLANs, SSH, AAA, Virtual Chassis, port security, BPDU guard, aggreg...
— SECURITY AND INFRASTRUCTURE CONSULTING · ONTARIO, CANADA
Hans Study has spent 15 years working across enterprise IT infrastructure, industrial networks, and physical security systems for organizations across Ontario and North America. Organizations come to him when the problem is complicated and they need someone who'll tell them what's true, not what's profitable to say.
— ABOUT HANS STUDY
It started the way it does for a lot of people in this field: fixing computers for friends and family, then picking up work installing small business networks and CCTV systems. By 2010 that had grown into an IT firm. What followed over the next fifteen years is where the depth comes from.
Hans has spent his career working across public sector, defence, public safety, and critical infrastructure environments, designing and integrating the technology those organizations depend on. This includes years working directly in the federal space, tasked with mission-critical networks where failure was not an option.
That depth of knowledge led to teaching at the post-secondary level — Cisco CCNA, Introductory and Advanced Networking, and Network and Infrastructure Security. Teaching is where you find out how well you actually understand something.
As a CISSP, Hans brings formal security architecture credentials alongside the field experience. The advisory covers enterprise networks, OT security, physical security systems, and ICAT design across Canada and the United States.
Enterprise networks, cybersecurity, and physical security. Each understood well enough to advise on, and to see how decisions in one affect the others. Most consultants cover one area. Very few cover all three independently.
Across sectors and project types, including the ones that went sideways before they got fixed. That experience informs how risks get identified early, before they become expensive problems on a live project.
My recommendations don't change based on who's selling. I work with most of these vendors and I'll tell you when they've done something right and when they haven't. What you get is an honest assessment of what fits your environment.
A recommendation that ends at the design phase is a document, not advice. The goal is a system that performs in the field — which means staying engaged through delivery and being available when the integrator hits something unexpected.
— CONSULTING AND ADVISORY
Most engagements touch more than one area, because the problems rarely stay within a single boundary. Decisions in one area have a way of creating consequences in another.
Most enterprise network problems are architectural. Equipment gets blamed because it is visible. The actual issue is a design that was never there, or segmentation added as an afterthought.
Learn more →OT environments have constraints that enterprise network thinking does not account for. Systems that cannot tolerate a reboot. Legacy protocols with no authentication. Failure measured in operational disruption.
Learn more →Most physical security networks are under-designed and under-managed. The system that protects your facility runs on infrastructure that gets less attention than the cameras themselves.
Learn more →Independent Genetec consulting. Architecture review, deployment oversight, troubleshooting. Not a reseller. No license revenue.
Learn more →Physical layer problems are cheap to fix at design and expensive after construction. Pre-construction review catches them before they become installed facts.
Learn more →Design and gap assessment for access control, CCTV, and integrated physical security systems. From threat model to specification.
Learn more →Integrated facility systems advisory, owner's representative services, and commissioning oversight for complex physical security and technology projects.
Learn more →For integrators on complex bids, practitioners closing knowledge gaps, and organizations that need an independent technical voice on a project in progress.
Learn more →— STUDY BYT3S
Juniper EX series (Junos OS) configuration template: VLANs, SSH, AAA, Virtual Chassis, port security, BPDU guard, aggreg...
Alcatel-Lucent Enterprise OmniSwitch 6360/6560 (AOS 8) configuration template: VLANs, SSH, AAA, Virtual Chassis, port se...
Power plan, NIC buffers, SQL Server memory, antivirus exclusions, video drive configuration, and camera stream settings ...
— CONTACT
If you have a project coming up, a system that is not performing the way it should, or an upcoming procurement that needs independent technical input, reach out directly. No minimum project size. No retainer required.