Eagle Eye Networks

Video Management Software

Everything you need to know about modern, cloud video management software from the experts at Eagle Eye Networks.

reboot-blog-image

Integrated Managed Switches Bridge PoE Ports

Eagle Eye launched a new feature within the Eagle Eye VMS that allows users to remotely power cycle cameras connected to ports on Eagle Eye managed switches and bridges. Any individual port or all ports can be power cycled. Eagle Eye managed bridges and switches appear in the Eagle Eye

Read More »
Verizon-FI

Verizon Modem Integration

Eagle Eye Networks is now integrated with the Verizon MiFi 4G LTE Global USB Modem U620L. This means that any Eagle Eye Bridge or Eagle Eye Cloud Managed Video Recorder (CMVR) can be connected to the Eagle Eye Cloud Data Center using only a cellular connection. The Verizon MiFi cellular

Read More »
Vulnerabilities-WIFI-Cameras-FI

Vulnerabilities in WiFi Cameras

Inexpensive WiFi cameras are widely available over the internet. That might sound compelling, but it’s important to understand their security holes and the risk they bring to your network. Pierre Kim, an IT security blogger, has recently discovered 1,250 different camera models that are modified and branded by hundreds of

Read More »
Bandwidth

Enhanced Transmit Modes

Eagle Eye Networks has recently added three new bandwidth modes for users to choose from: Percentage of Available – You can now adjust the transmit rate for the Bridge to be set to a percentage of available bandwidth. This affects the default transmit rate, as well as the scheduled transmit

Read More »

Cloudflare Security Bug

Eagle Eye Networks does not use Cloudflare – a website performance enhancement service. There was a relatively severe security issue detected by Tavis Ormandy at Project Zero in the Cloudflare service. He found that certain private information could be extracted under some rare circumstances. It’s a severe security issue, but it’s

Read More »
cloud-car-web

Using Cloud to Avoid Traffic

Using cloud to avoid traffic?  How does that work? It’s true, today I used cloud computing to avoid traffic.  Here’s a little background.  At Eagle Eye, we not only are a cloud service provider, but we also use cloud services to run our business.  There are the obvious tools such

Read More »
API-Server

Live Camera Preview Stream

There have been many questions on how to use our API. One of the most frequent questions we get from our customers is, “How can we play a live preview stream for a camera on our public website?” For those that do not know what a live preview stream is,

Read More »
camera-settings-from-layout

Accessing Camera Settings

With the proper permissions, camera settings can be accessed from the dashboard or from layout view. From the dashboard, click the gear icon to open the cameras settings. From a layout, click the dropdown in the upper right corner over the preview image and select settings. Related posts:  Adjusting Motion

Read More »
motion-settings-overview

Motion Settings Overview

The Eagle Eye Networks VMS records two video streams from each camera: preview video and full video. Preview video is typically a lower frame rate and resolution so that no matter the motion settings, there is a recording of everything. At default, preview video is transmitted in real time to the

Read More »
Adjusting Motion Settings

Adjusting Motion Settings

Regions and Alerts The Eagle Eye Networks VMS allows an unlimited amount of regions and alerts per camera. These can be added by opening camera settings and selecting the motion tab. In this example, a region named Entry-Exit is shown with separate motion sensitivity from the overall motion sensitivity of

Read More »
Technology Transformation-FI

Technology Transformation and the Security Integration Business Model

Recently, an article by Ray Bernard entitled, «Technology Transformation and the Security Integration Business Model» was posted on Security Info Watch. «According to software-as-a-service (SaaS) management platform provider BetterCloud, by 2020, more than 50 percent of all surveyed SMB organizations expect to run 100 percent of their IT in the

Read More »
Infrastructure

Eagle Eye Infrastructure

Our infrastructure includes three tiers. We have a backend, a middleware, and a frontend tier. The backend relates to our on premise edge appliance called the Bridge. The Bridge can be thought of as a DVR, but more appropriately, it is a video buffer appliance that is responsible for pushing

Read More »

Cyber Attack – D.C. Cameras

Over the past few months, more and more IOT devices, including DVRs, and cameras, are being reportedly compromised and proven vulnerable to cyber attacks. Most recently, the Washington Post reported that unidentified hackers managed to compromise almost 70% of the D.C. police closed-circuit surveillance cameras eight days prior to the

Read More »
Safari-Chrome

Dangers of Browser Autofill

The browser autofill feature, which usually kicks in automatically, is a huge cyber security issue. Sure, it’s convenient at times, but it also makes it easier for hackers to access your personal information. We strongly discourage anyone from using autofill, whether it’s through the password capabilities built into your browser

Read More »
Checksum to Ensure Data Integrity

Ensure Data Integrity with Checksum

At Eagle Eye Networks we are often asked about ‘Watermarking’ on our recorded video to ensure data integrity. This can be guaranteed by using the ‘checksum’ approach as used in many digital data transfers. The article below from ‘Online Tech Tips’ explains ‘Checksum’ and how it is used to ensure

Read More »