Eagle Eye Networks

3 Questions to Video Surveillance

January 14, 2019 Eagle Eye Networks

protection securite mag

CCTV is not always very well protected against cyber attacks. And everything that turns around the cloud worried. How do you secure your solution on the cloud?

First, VMS applications in the cloud refuse all connections from Internet and the company’s professional network. They use authentication based on a
digital certificate to secure their connections to the VMS cloud. That the hackers and the malicious programs are outside or within the corporate network, they can not not access VMS cloud. Second, the cloud VMS blocks outbound connection attempts from infected cameras and put them in quarantine against robot networks. Finally, on-premise cloud-managed applications are automatically updated cybersecurity, without any action on the part customer or installer is required.

Why is it better protected than some solutions from your competitors?

Competitor VMSs generally record videos on site or in a managed server room by the customer. This requires assistance, repair and preventive maintenance of the service computer. Eagle Eye Networks Cloud VMS is provided as a service, allowing the user final or the integrator to not perform these tasks. This saves money. Otherwise, Eagle Eye VMS includes mobile apps fully functional. An installer and an integrator do not need a computer to install it. The Eagle Eye Networks Cloud VMS is designed to be cyber-safe against hackers. Eagle Eye has an expert security team who monitors the system at all times. The video is encrypted at any time, even when stored.

What advice to give to a user who wants to protect your surveillance system?

Cybersecurity issues must first be tackled are treated and taken into consideration as they should be. Do not neglect them when choosing
of this or that hardware or software solution. In addition, it is necessary to examine in particular the way whose cybersecurity is organized in a solution on-site and compare it to cybersecurity of a cloud solution, both in terms of costs and efficiency. A well-designed cloud VMS crypt video data when its memory device on-site buffer receives them from the camera, using 256-bit AES encryption. He then transmits it safely to the VMS cloud. It can also provide two-factor authentication for access users to the VMS application, as well as authentication for mobile devices.

In the News

Covered on these news sites. Click image to read more.

Tags

Other posts that might interest you

loading

ASMag: Eagle Eye Networks announces UK data center for cloud video recording

With smartphone usage overtaking laptop usage in the UK, secure remote access is critical. The Eagle Eye Security Camera VMS has cyber-secure access from all iOS and Android mobile apps…

March 4, 2016 Eagle Eye Networks

SIW: 12 best practices for securing surveillance networks against cyber attacks

“Our physical security systems - access control, fire alarms and video surveillance systems – basically have all kind of quietly become internet-connected,” said Dean Drako, president and CEO of Eagle…

April 30, 2015 Hans Kahler

Best Home Security Companys: Eagle Eye Networks Releases Annual Video Surveillance Report

Just yesterday Eagle announced that their first “Video Surveillance Report” would now be available to the public. The report analyzed the responses of 250-500 IT professionals regarding topics like: video…

July 1, 2014 Hans Kahler