MOBOTIX CCTV Software(11)
MOBOTIX AG launches the new Lowlight Exposure Optimisation (MxLEO) software and new hardware for its building automation/home automation offering. The MxLEO is part of the latest MOBOTIX firmware 4.1.9 that also includes support for Hemispheric 5 Megapixel technology sensor modules. "MxLEO is the latest in MOBOTIX image enhancing technology," says Dr. Ralf Hinkel, founder and CEO of MOBOTIX AG. "The main benefits for all MOBOTIX users are that our camera solutions now offer a dramatically enhanced sharpness of images, considerably less noise in these images, extremely user-friendly light settings in the camera(s), optimised recording and alarm results using the added MxActivitySensor intelligence. All these benefits in low-light conditions are made possible through the new MOBOTIX 5 Megapixel technology". MOBOTIX is adamant that one of the most important criteria for a security camera is to offer high-quality images no matter what. "Our users do not have the luxury to choose when and how they want to use MOBOTIX camera solutions whether it is day, night, good/bad weather or whatever. Our technology is put to test everyday and in the worst conditions imaginable for a camera. The sun is shining directly at it - no problem the camera handles it through the built-in automatic exposure settings, unwanted movement in the images triggering alarms - no longer a problem as the MxActivitySensor in the camera reduces these alarms and now in extreme low light conditions - the MxLEO enhances the images to a completely new level", continues Dr. Hinkel. The Lowlight Exposure Optimisation software is included in the firmware release 4.1.9 and is as all MOBOTIX software and firmware free of charge. It can be downloaded on all 5 Megapixel MOBOTIX cameras and is included as standard from today. Apart from the MxLEO does the 4.1.9 also include support for MOBOTIX new Hemispheric sensor modules for the newly released S15 and M15 camera platforms. The firmware 4.1.9 enhances the MOBOTIX door station offering further as MOBOTIX recently launched the AudioMount for the S14/S15 camera platform. "We have customers around the world that want to build their own building automation/home automation solutions," says Dr. Hinkel. "As a customer-focused company we have seen the possibilities and advantages of using our core strength in decentralised product technology to allow the S14/S15 product platform to be the main product for our partners to build their own door station offerings around. For instance mailboxes, different steel casings, etc. are solutions that MOBOTIX does not offer but we can help our customers through sharing our technology solutions with them. The AudioMount is extremely simple to install and integrate for the users." MOBOTIX also offers a new door opener, the MxDoorMaster for their users to integrate in their own solutions. MOBOTIX also launches a new component for the T24 Door Station product platform, the BellRFID keypad. The BellRFID keypad offers the possibility of adding a simplified keypad for usage in the T24 Door Station product platform. "The BellRFID is modular doorbell concept that simplifies the usage for many users. We have also integrated the latest in RFID technology so that users can open their doors completely secure with an RFID card. Of course the BellRFID includes the standard in MOBOTIX Door Station technology including leaving and retrieving messages from the integrated mailbox and connection through the MOBOTIX App ", continues Dr. Hinkel. MOBOTIX also offers a unique service for their customers. "All MOBOTIX customers using the new BellRFID module can free of charge order their wanted and needed personalised name signs for the BellRFID module using optimised paper against UV radiation. We thought all our users were worth that", says Dr. Hinkel.Add to Compare
MOBOTIX has released an enhanced version of the intuitive Video Management Software platform, the MxManagementCenter for Windows and Macintosh. The latest version has been optimised to provide a full range of functions required for efficient and professional video surveillance management. The new MxMC has no system limits and can handle hundreds of cameras and users, live and recordings up to terabytes per camera. The number of recording servers is unlimited. MxMC 1.1 can be downloaded free of charge and is licence free. Playback technology MOBOTIX power playback technology of MxMC provides with direct fileserver access 60-times high-speed rewind and fast forward search capability of the recordings as well as a comfortable time lapse search, which reduces a 24-hour video footage down to nearly one minute for example. Remote access Thanks to the integrated scaling of image size and frame rate, MxMC supports optimised remote access of live images and playback of recordings over limited bandwidth connections, and is still able to retrieve related image details in full resolution. MxMC includes a complete user rights management. All functions and views can be easily defined per individual user, even down to a simple quad view arrangement with dedicated camera views. In order to become familiar with the exciting new features of MxMC. MOBOTIX is offering a number of free-of-charge trainings worldwide.Add to Compare
MOBOTIX, the world's largest manufacturer of megapixel network video surveillance systems, recently unveiled a major update to MxControlCenter, its network video management platform. Focusing on operator usability, MxControlCenter 2.5 introduces a host of new features, including: saved search profiles to make user defined common search queries a single-click operation, unlimited users and groups rights management control with full action audit log, and video motion search on recorded footage to identify critical events quickly. Playback is improved, putting common functions in user friendly locations. MxControlCenter 2.5 also improves initial system setup, allowing recording paths for multiple cameras to be configured in a single operation. "Other vendors charge tens of thousands of dollars for their video management platforms," said Steve Gorski, General Manager, Americas, MOBOTIX. "We provide this software to our customers with no per-server or per-camera licenses and no installation fees with unlimited instances, plus phone and e-mail support for the life of the system." "ControlCenter allows users to easily manage and monitor their cameras and footage on-the-fly. This new release cements ControlCenter's position as a market leader and strengthens the overall MOBOTIX offering," Gorski said. These new features build on MxControlCenter's already strong capabilities including: alarm notification and management, system and software configuration management and backup, automatic camera discovery and setup using built-in Bonjour services, and flexible grid and background layouts. MxControlCenter 2.5 integrates features for managing video walls using readily available thin client PCs & LCD screens, making command center setups simple and cost efficient. The new software has an improved export function with additional container formats. Live recording of camera streams - even different cameras - as one clip on the local archive, means that someone tracking suspicious persons in an MxCC layout across several cameras can track that group or individual and record it as one clip. "The new MxControlCenter update from MOBOTIX has made my day-to-day use of the system much easier. I've always loved this software, and the new features make it an even more powerful tool for managing our security system," said Adam Lewis, Operations Manager, Canada Bay Club.Add to Compare
MOBOTIX is pleased to announce the latest major release of our new video management software. Download and experience the enhanced features of MOBOTIX ManagementCenter 1.2. New Features of MxMC 1.2 Enhanced export capabilities. MxMC allows the export of the complete video as an overview or the zoomed part of the image in different formats. This new function supports the export into different resolutions, frame rates, virtual PTZ views, including the transformation from 360° hemispheric (fisheye) to surround, panorama or special views independent from the export source. Histogram with MxEventStatistics. The display of events in a Histogram allows a fast graphical analysis of irregularities and related information. This is a perfect tool to get a quick overview of all events from the database, generated inside the camera without any additional PC. Playback analysis with post video motion. Automatic post video motion analysis allows high-speed search including time lapse of the complete video footage to find particular motion events. This will help to reduce playback research considerably. Smart Alarming features & scalable display area. Different events in the individual camera configuration can be defined as an alarm. This way, you can focus on the most important events, which can be defined as alarms depending on the specific application. Immediate display change between events and alarms is supported as well. User action log & system health check. If the recording path is not valid or accessible, you can analyse the correct server settings. Connection failures to cameras are directly shown for further investigation.Add to Compare
The MOBOTIX Q24M-Sec hemispheric camera, which can capture an entire room with no blind spots, has now even more to offer with the new integrated MxAnalytics video analysis tool. MxAnalytics is an efficient tool for process optimization or marketing purposes and can be used in small retail stores as well as in public buildings such as museums or airports in order to receive important information. Heat Map: Track and evaluate movements Which shelves in the shop are attracting the most customers? Which products at the exhibition booth hold the attention of the visitors most? Which waiting areas in the departure hall are preferred on Mondays between 8 a.m. and 12 p.m.? MxAnalytics makes it possible to reliably capture and evaluate the movement of people or objects in the live image. The most frequented areas are highlighted in color on a heat map in a predefined area. The areas with the most movement are displayed in red, and those with little movement in blue. Counting Lines: Count people and objects Using counting lines to count people and objects and generate observation data is a valuable tool. How many people pass by a specific entrance in an hour or a day? And what direction were they coming from? MxAnalytics also stands out when it comes to user-friendliness thanks to quick, user-friendly configuration, when creating reports, for example. Another highlight: The results of the video motion analysis can be saved as daily, weekly or monthly reports in a table and exported via various interfaces. Whether via web interface, e-mail or as a MxControlCenter prompt, the reports are automatically collected in the camera and can be easily accessed or sent at any time. This can take place fully automatically and individually for any number of addressees. Reduce costs with MxAnalytics In addition to the count feature, the analysis of statistical behavior data makes an essential contribution to process optimization, thus further reducing costs. MOBOTIX cameras like the Q24M differ from most traditional video systems thanks to their decentralized system architecture. Each camera includes a high-speed computer with long-term memory. It is no longer necessary to use a computer or server to record or analyze image material. Video analysis takes place decentralized in the camera, without network load. This reduces total costs and maintains the system's high performance. MxAnalytics is available free of charge with the latest en firmware version 126.96.36.199 and from the MOBOTIX website with no usage restrictions. It can also be easily integrated into all older Q24M-Sec models via software update. The new release (2.5.2) of the free MxControlCenter video management software supports MxAnalytics, too. This allows evaluating the results from different cameras in a more convenient manner. The update enables the configuration of MxAnalytics on a Q24M camera and subsequent analysis of the created and stored data. MxControlCenter 2.5.2 can now be downloaded free of charge from the MOBOTIX website. MOBOTIX is continuing to develop MxAnalytics for image data processing inside the camera for the Q24 initially. The robust MOBOTIX camera needs very little maintenance and can be discreetly integrated into any environment thanks to its elegant design and compact size. The next step will be the integration into further MOBOTIX camera models.Add to Compare
During ISC West 2017, MOBOTIX, the German System Manufacturer of Professional Video Management (VMS) and Smart IP Cameras presented its latest IP video security products and innovations including vertical specific solutions for IoT, retail, home automation, perimeter, transportation and industrial markets.Mike Bomas, General Manager for the Americas at MOBOTIX Corp. said, “Our innovative decentralised camerasystems and efficient video analytics within our ultra-reliable chassis are designed for a wide range of applicationsrequiring quality video along with flexible automation and integration tools to deliver a customer & applicationspecific solution.”As part of a strategic focus to open up its technology to the market, MOBOTIX demonstrated its latestinnovations and integrations with key technology alliance partners including Genetec, Accel Robotics, SierraWireless, E-Holovision and Overland.The event also featured demonstrations of MxActivitySensor 2.0, the intelligent 3D motion detection systemusing on-board analytics to reduce false alarms caused by atmospheric conditions, animals and debris.The MOBOTIX range of award winning Thermal radiometry cameras were also showcased, including dual lensconfigurations able to offer both video and thermal imagery with alerts for up to 20 different kinds of temperatureevents in a range from -40 to +550°C for both security applications and fire detection.“Our diverse portfolio combined with innovative application interfaces and system development tools enablesystem integrators to build high value solutions that seamlessly combine a wide range of technologies to meet theneeds of our customers, while preserving the integrity & security of their computer networks”, Bomas adds.Add to Compare
The intuitively designed user interface of the new MOBOTIX MxEasy offers quick access to all the main camera functions. This software represents an innovative new approach to the monitoring and controlling of MOBOTIX cameras. Up to 16 cameras can be managed using the software's easy-to-understand layout and four cameras can be viewed simultaneously. All of the camera settings in MxEasy - such as image section, zoom, brightness, volume, microphone sensitivity, image storage, connections - are immediately active and instantly stored to the current camera's configuration file.The software's calendar functions are an innovative tool for managing time-based settings, for single as well as multiple cameras. For example, it is now possible for the first time not only to control the recording time according to dates and times, but also to activate/deactivate the motion sensor, brightness or the microphone in a time-controlled way. Easy-to-use video management softwareIdeally designed for the wide range of functions of the MOBOTIX camerasMonitoring of up to 16 MOBOTIX camerasSupports decentralized system concept and works with internal camera recording Simple, quick setup; user-friendly and intuitive operationTransparent layout of operating elements; compatible with touch panelsIdeally suited for small office and home security environmentsPlatform-independent format (Windows, Mac, Linux)! Absolutely free of charge! MxEasy is available for Microsoft Windows, Linux and Mac OS X operating systems as a free download.Add to Compare
Video Management Systems have gone through a major evolution over the last decade. With advances in video capture, the switch to IP and more powerful processors; a modern VMS can handle a lot more cameras and provide higher levels of automation around event detection. Decentralised video technology However, one of the most significant changes is simplification that has made life easier for operators. Much of this change has been spurred by the popularity of decentralised video surveillance technologies that carry out more imaging tasks directly inside the camera instead of having to transfer raw images to the VMS for processing. MxManagementCenter 1.5 features As a concept pioneered by MOBOTIX in the early 2000’s, the benefits of decentralisation are visible in its recently upgraded MxManagementCenter 1.5 which provides a simple and intuitive interface for both MOBOTIX and other third party IP cameras. Designed to work on any modern Microsoft Windows or Apple Mac OS based PC or server, MxManagementCenter offers full screen display of a camera via a mouse-click, multi-monitor support, a clear representation of events and alarms, and the control of door stations, with many functions accessed by a simple "drag and drop" feature.Add to Compare
Browse CCTV Software
CCTV software products updated recently
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four per cent of global revenue or up to 20 million euros. Cyber-crime potentially affects every connected network device. In the biggest cyber-crime to date, hackers stole $1 billion from banks around the world, by gaining access to security systems. It’s more important than ever for organisations to be vigilant when it comes to their cyber security strategy. To help avoid becoming the next victim, I’ve put together a five-point cyber plan to protect your video surveillance system. 1. Elimination of default passwords A small change to a memorable, complex password could have huge consequences for your business It is estimated that over 73,000 security cameras are available to view online right now due to default passwords. ‘Password’ and ‘123456’ are among the top five most popular passwords with a staggering 9,000,000 login details matching this description. Guessable passwords create an unsecure security system which can result in an easy way for hackers to gain access to your organisation’s data, making you vulnerable to a breach. A small change to a memorable, complex password could have huge consequences for your business. Removing default passwords from products and software forces individuals to think of their own to keep their data safe. If a password system is not provided by your organisation we recommend that your password uses two or more types of characters (letters, numbers, symbols) and it is changed periodically. 2. Encrypted firmware Encrypting firmware is an important part of any organisations overall security system. Firmware can leave an open door, allowing hackers to access your data. All firmware should be encrypted to reduce the possibilities of it being downloaded from the manufacturers website and deconstructed. If the firmware posted is not encrypted, there is a risk of it being analysed by persons with malicious intent, vulnerabilities being detected, and attacks being made. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis There have been cases where a device is attacked by firmware vulnerabilities even if there are no problems with the user's settings, rendering it inoperable, and DDoS attacks being made on other servers via the device. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis. There is also a possibility of being attracted to spoofing sites by targeted attack email and firmware being updated with a version that includes a virus, so firmware must always be downloaded from the vendor's page. It may also be advantageous to combine this with an imbedded Linux operating system which removes all unused features of the device, it can help to reduce the chances of malicious entities searching for backdoor entities and inserting codes. 3. Removing vulnerabilities within the operating systems Vulnerability is the name given for a functional behaviour of a product or online service that violates an implicit or explicit security policy. Vulnerabilities can occur for a number of reasons for example, due to an omission in logic, coding errors or a process failure. Network attacks exploit vulnerabilities in software coding that maybe unknown to you and the equipment provider. The vulnerability can be exploited by hackers before the vendor becomes aware. You should seek to minimise these issues by looking for a secure operating system which is regularly updated. Panasonic has developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping As a provider of security solutions, Panasonic is taking a number of steps to ensure its consumers remain safe and secure. We have developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping. We have combined with a leading provider of highly reliable certificates and technology for detecting and analysing cyber-attacks with its own in-house embedded cryptography technology, to provide a highly secure and robust protection layer for its embedded surveillance products. 4. Avoiding remote login using Telnet or FTP Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures. File transfer protocol or transfer through cloud-based services means the files and passwords are not encrypted and can therefore be easily intercepted by hackers. An encrypted software removes the risk of files being sent to the wrong person or forwarded on without your knowledge. Telnet predates FTP and as a result is even less secure. Hyper Transfer Protocol Secure is a protocol to make secure communications by HTTP, and it makes HTTP communications on secure connections provided by SSL/TLS protocols. The major benefits of using this system is that HTTPS and VPN encrypt the communications path, so data after communications is decrypted and recorded. If recorded data is leaked, it will be in a state where it can be viewed. With data encryption, however, it remains secure and can even be recoded to storage. Thus, even if the hard drive or SD card is stolen or data on the cloud is leaked, data cannot be viewed. 5. Use of digital certificates Private and public keys are generated at manufacture in the factory and certificates installed at the factoryDigital certificates are intended to safely store the public key and the owner information of the private key it is paired with. It provides assurance that the accredited data from a third party is true and that the data is not falsified. It is beneficial for all data to be encrypted with digital certificates. Digital certificates are far safer when issued by a third party rather than creating a self-signed version unless you are 100 percent sure of the receiver identity. From April 2016, some models of Panasonic series iPro cameras come with preinstalled certificates to reduce the risk of interception and the hassle of having to create one. With i-PRO cameras with Secure function, private and public keys are generated at manufacture in the factory and certificates installed at the factory. As there is no way to obtain the private key from the camera externally, there is no risk of the private key being leaked. Also, certificates are signed by a trusted third party, and the private key used for signing is managed strictly by the authority. In addition, encryption has been cleverly implemented to reduce the usual overhead on the IP stream from 20% to 2%.
The role of IT in physical access controlDownload
Powerful video surveillance protects Red Bull RacingDownload
Making your surveillance cyber secureDownload
Orion Entrance Control to launch DoorGuard System at GSX Global Security Exchange Cybersecurity Summit 2018
- Louisa County Public Schools uses Vicon security solutions to prepare for emergency situations
- Genetec and Appriss Retail integration enables instant video correlation with suspicious transactions to detect theft and fraud
- 360 Vision upgrades London Borough’s camera system with Invictus to ensure public safety at a major event
- Matrix develops centralised time-attendance solution for Varsity Management across India