Salient Systems
Download PDF version Contact company

The security networks have evolved from where they were 20 years ago. With these changes, there have been many amazing advances in the scope of technology and the connectivity between the systems that comprise modern complex security systems.

All these advancements have also brought concerns on how to secure these systems and the data within them. When looking through the headlines, it seems a new data breach or network vulnerability is exposed daily, and this is why securing the system should be a top priority.

Data confidentiality, integrity and availability

In cybersecurity, many refer to the three pillars for security - confidentiality, integrity, and availability

In cybersecurity, many refer to the three pillars for security, which are confidentiality, integrity, and availability. But what do these pillars represent, and how do we address these? Confidentiality is often considered the primary goal of security. To maintain confidentiality, the system and data should only be accessible to authorised users.

To address the concern or integrity, the system should employ functions to ensure the data is untampered and accurate. Finally, if a system is not available, then this can create additional risks for a company, which is why the systems should provide safeguards to provide access for authorised users to the data and system resources when they need it.

Enhancing end-point security

Like other IT systems, there are some similar components found in the security system, and their security capabilities can be applied in a similar fashion. In a typical security network, the components which should be secured are the endpoint devices, the network, and the data.

When addressing end-point security, users need to look at devices such as cameras, recorders, and workstations. Each of these points represents a means to access the overall security system. The first line of defense for these devices should be implementing strong passwords and disabling default user accounts.

Strong password security and regular updating

Next, these devices should be regularly updated. While updates for cameras, recorders, and workstations may provide new functionality, they will often include fixes to known vulnerabilities found in these systems or implement new security functionalities.

Additionally, many devices come enabled with a host of services that can be used by the customer. If these services are not used, then they should be disabled to minimise exposure on the network. Finally, logging of the endpoint devices and regular audits can reveal unexpected behaviour or potential vulnerabilities in these devices.

Ensuring authorised access

When moving from the end-point to the network, users need to identify how to fortify the security network from cyber threats. The biggest concern with network security is access. Network resources, such as switches and routers, should be located in secure TM spaces where physical access is controlled.

Further, if the system architecture permits, the security system should be isolated from the corporate network. Segmentation can be achieved either by physically isolating the networks or by segmenting them through Virtual LANs. There are even technologies such as MAC filtering or 802.1X, which will only allow access to authorised devices.

‘No personal electronic device’ policy

Implementing a ‘no personal electronic device’ policy will further protect from data breaches

Finally, to protect the data within the security system, users can take the following steps. First, defining user access to the system data is critical. Even though user access to the system may be controlled, when watching the video, users may use a personal electronic device to capture the data displayed on their screen.

Implementing a ‘no personal electronic device’ policy will further protect from data breaches. In the event data needs to be exported from the system, it should be done in an encrypted method. This safety measure ensures the data remains protected, and only an authorised user can decrypt the data for use.

Maintaining systems’ cybersecurity

Securing the security system should be a top priority, and it can be achieved with planning and proper implementation. Even with this practice implemented, the system should be reviewed regularly to ensure the latest patches are applied, the security plan is in place and operational.

Users need to ensure that any new equipment or system integrating with the system meets the minimum standards in place for the system. These simple steps will help in maintaining the systems’ cybersecurity.

Download PDF version Download PDF version

Salient Systems news

How can the security industry provide affordable and cost-effective solutions?

Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical securi...

What is the potential of deep learning in physical security and surveillance?

“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Exper...

Salient Systems’ CompleteView 20/20 platform attains regulatory approval from Dubai’s Security Industry Regulatory Agency (SIRA)

After undergoing rigorous vetting and testing, Salient Systems announced that it has earned prestigious regulatory approval from Dubai’s Security Industry Regulatory Agency (SIRA) on its CompleteView 20/20 platform, opening new opportunities for the company in the Middle East region. SIRA approval With Security Industry Regulatory Agency’s seal of approval, Salient Systems is now on a short list of certified manufacturers, who have undergone a rigorous vetting process by the Dubai-...

Salient Systems case studies

New England Craft Cannabis farm to deploy Salient Systems’ VMS platform at its eight locations

Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include...

Video systems generate cash in the logistics vertical, as per Salient Systems study

Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximis...

Salient Systems provides best of breed security systems to launch Bexar County Metro’s Emergency Operations Centre

It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Centre (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations centre unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio...