Cyber Secure CCTV
Stopping attacks at delivery
A very effective technology to stop attacks at delivery is network detonation. Detonation software, FireEye or Palo Alto Network Wildfire, see executable code coming over the network, determines whether it is malware (based on what it does versus matching against a signature), and if bad, detonates it. Network detonation software is incredibly useful and moderately effective at protecting activity for devices inside a corporate network. However, network detonation solutions will not protect a device when an employee is working offline – an increasingly common scenario with mobile employees. In addition, many solutions monitor the network passively and are not in line. In these instances, there can be a lag between execution and detonation. This lag can provide an opportunity for an attacker to deploy a secondary payload that can go undetected. To help address this issue, leading endpoint security solutions offer integrations with network detonation services to extend these capabilities beyond the network by sending files from off-network endpoints for analysis.
Even if any employee is working online, bad conditions do not always present initially on the network. If a file comes in over an encrypted tunnel like SSL, and you do not have a SSL man in the middle, you might not see it. If that file comes in some type of sandbox, like a ZIP, RAR, or 7Z file for example, the network detonation software cannot examine that sandbox and will let a bad condition get into the network. Lastly, a USB stick with a Trojan virus is also going to be first seen at the endpoint.
IP CCTV and other web cams are vulnerable to cyber attacks and while passwords protect some access the level of security is still compromised. Many of our government customers as a precaution will still use IP CCTV on a closed IT network. This is reminiscent of the analogue closed circuit TV which was replaced by IP CCTV, due to the limitations of upgrading video software, adding cameras and recording technology. But this is all negated and does not maximize TCO (Total Cost of Ownership) if IP networks cannot communicate with one another.
Our technologies use analytics within the cloud for deep learning and being able to use classification from all types of databases, so creating silos ill reduce the effectiveness of a system.
This figure displays where the vulnerabilities of a network exist and where Cyber Attacks are orchestrated on a network.
Because of this problem we have created a Cybersecurity for Bikal cameras and retrofit to existing cameras (with ONVIF compatibility). This will secure your end to end CCTV video data stream so you do not have to close off networks. The level of encryption allows for cloud storage.
The software encrypts the data the instant it is created. The network never decrypts the data, ensuring secure communications over public networks and other untrusted systems. By removing the need to generate decrypted data in the network we can drastically reduce the number of points that are at risk of cyber attacks
Contact us for more details on how we can provide a Cyber Secure IP CCTV system, email@example.com