IDIS video technology’s industry-beating reputation for robust cybersecurity was given a further boost last month in a series of ethical hacking attempts at the ESS+ International Security Trade Fair in Bogotá, Columbia, which attracted over 15,000 visitors and 150 exhibitors.

IDIS was one of only three vendors willing to submit their technology for a public Video Security Product Hacking event and defeated all attempted attacks.

Software vulnerability analysis

There has been growing concern about the vulnerability of surveillance systems to malicious hacking 

There has been growing concern about the vulnerability of surveillance systems to malicious hacking in recent months, with several high profile breaches, and the broad nature of current cyber threats was reflected in the ten attack types featured in the tests: identification and enumeration of devices; port and service scanning; software vulnerability analysis; penetration testing; brute force testing; network protocol analysis; man-in-the-middle attack testing; denial of service (DoS) testing; privilege escalation testing, and data security testing.

The IDIS NDAA-compliant products subjected to attacks by professional ethical hackers were an IDIS DR-6516P 6500 series H.265 4K recorder, and an IDIS 4K vandal-resistant IR dome camera (DC-D4831HRX), popular hardware options that make up IDIS DirectIP® plug-and-play and end-to-end video solutions, extensively in commercial and government applications.

Multi-layered cyber protection

All IDIS video technology benefits from multi-layered cyber protection. IDIS DirectIP assures true plug-and-play connection of all devices with instant operability of cameras. NVRs ranging from 4 to 256 channels are protected by firewalls and two-factor authentication, eliminating complexity and the potential for human error associated when engineers need to manage manual passwords when installing multiple cameras. 

IDIS’s FEN (For Every Network) technology is an advanced DNS service which enables users to set up remote monitoring without knowledge of NAT routers, making system configuration easy with one-click connection – it is protected by Secure Data Transmission (Transport Layer Security).

Cyber secure data recording

The integrity of all video evidence is protected by IDIS Chained Fingerprint technology

iBank, IDIS’s proprietary multimedia file system and database architecture, is not based on off-the-shelf software and provides the most robust, cyber secure data recording, searching, and management platform.

And the integrity of all video evidence is protected by IDIS Chained Fingerprint technology, which makes undetected attempts and forgery or image tampering impossible.

Importance of cybersecurity

IDIS led the industry in recognising the importance of cybersecurity, and from the early days of IP video we built in the strongest, multi-layered defences against hacking attacks and other cyber threats,” said Joon Jun, President of the Global Business Division and Senior Executive Vice President, IDIS.

Joon Jun adds, “With growing awareness of the risks associated with network surveillance systems, and the vulnerabilities posed by some other brands, we continue to invest in the most robust protection to give our users complete confidence as demonstrated by this public testing at the ESS+ event.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...