Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Motorola Unveils Public Safety, Video Server Products

The hardware, which centers on the 4.9-GHz band, is aimed at providing improved secure wireless connectivity.

Motorola on Tuesday unveiled new public-safety solutions in the 4.9-GHz band that are aimed at providing public-safety agencies with improved secure wireless connectivity.

Announced Tuesday, the Point-to-Point (PTP) 49600 series wireless Ethernet bridge and the Point-to-Multipoint (PMP) 49400 series wireless network access solution complement Motorola's MOTOA4 back-end hardware portfolio. The PTP 49600 provides backhaul across land mobile radio systems, while the PMP 49400 delivers point-to-multipoint broadband access and distribution.

"Both the PTP 49600 and the PM 49400 are affordable licensed band solutions that can help public-safety agencies and local governments support applications requiring additional bandwidth, reduce costs associated with leased lines, or backhaul the traffic on their two-way radio networks," Phil Bolt, VP and general manager of Motorola's wireless broadband unit, said in a statement.

Designed for users who need always-on connectivity and backhaul applications, the PTP 49600 bridge is easily deployed in harsh environments. The IP-based radio can deliver up to 150-Mbps connectivity and features integrated T1/E1 ports for mission-critical public-safety applications.

The PMP 49400 is aimed at government agencies and municipalities that operate networks in the 4.9 GHz licensed band and are often used in leased-line replacement or wireless video surveillance situations.

In another product announcement Tuesday, Motorola's Home and Networks Mobility unit introduced its B-3 Video Server in its B-1 server family, which the company said is the world's most widely deployed solid-state on-demand server. The new server technology enables users to optimize streaming and network resources while also reducing storage costs, Motorola said.

InformationWeek Analytics has published an independent analysis of the challenges around setting business priorities for next-gen Web applications. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-17
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocki...
PUBLISHED: 2019-08-17
In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
PUBLISHED: 2019-08-17
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloo...
PUBLISHED: 2019-08-17
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data.
PUBLISHED: 2019-08-17
extenua SilverSHielD 6.x fails to secure its ProgramData folder, leading to a Local Privilege Escalation to SYSTEM. The attacker must replace SilverShield.config.sqlite with a version containing an additional user account, and then use SSH and port forwarding to reach a service.