{"id":12729,"date":"2017-01-24T00:00:49","date_gmt":"2017-01-24T06:00:49","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=12729"},"modified":"2023-12-08T12:44:50","modified_gmt":"2023-12-08T18:44:50","slug":"eagle-eye-networks-implements-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.een.com\/pt-br\/blog\/eagle-eye-networks-implements-two-factor-authentication\/","title":{"rendered":"Eagle Eye Networks Implements Two Factor Authentication"},"content":{"rendered":"<p><em>Further Protects Eagle Eye Security Camera VMS from Cyber Threats<\/em><\/p>\n<p><strong>Austin, TX \u2013<\/strong> Eagle Eye Networks today announced implementation of Two Factor Authentication across the Eagle Eye Security Camera VMS including its iOS and Android mobile applications. Two Factor Authentication provides enhanced security for all Eagle Eye Users by establishing trusted devices and only allowing camera and video access from those trusted devices. Two Factor Authentication is utilized by most banks to protect online access to bank accounts and money transfers.<\/p>\n<p>&#8220;Cyber security is of paramount concern at Eagle Eye Networks and implementation of Two Factor Authentication across our entire system ensures that our customer assets are even more secure.\u201d said Dean Drako, President and CEO of Eagle Eye Networks.<\/p>\n<p>Eagle Eye Network\u2019s Two Factor Authentication has been deployed globally across its 7 data centers. All users of the Eagle Eye Security Camera VMS can employ this added layer of security.<\/p>\n<p>&#8220;Our customers are highly concerned about their Cyber Security in addition to their physical security,\u201d said Vincent Scarpelli, Manager of Product Strategy in Video Solutions at Tyco Integrated Security. \u201cEagle Eye\u2019s Industry leading implementation of Two Factor Authentication ensures that our customers\u2019 video will not be compromised. We are pleased to offer this additional cyber security measure to our customers.&#8221;<\/p>\n<p>Two Factor Authentication is an extra layer of security for each Eagle Eye Account designed to ensure that only authorized users can access each Eagle Eye Account and cameras, even if someone obtains a password.<\/p>\n<p><span style=\"text-decoration: underline;\">How it Works<\/span>:<br \/>\nWith Two Factor Authentication, an Eagle Eye Account can only be accessed on devices that are trusted, like a mobile phone or a computer. When a user wants to utilize a new device for the first time, that user will need to provide two pieces of information\u2014 a password and a six-digit security code that must be obtained via a trusted phone number or a trusted email address.<\/p>\n<p>Because a password alone is no longer enough to access an Eagle Eye Account, Two Factor Authentication dramatically improves the security of each Eagle Eye Account and access to corresponding cameras and video.<\/p>\n<p>Once logged in, an Eagle Eye User won\u2019t be asked for a security code on that device again unless the user logs out completely, erases the device, or needs to change a password for security reasons. When an Eagle Eye User logs in on the web, that user can choose to trust a browser so the user won\u2019t be asked for a security code the next time that user logs in from that same computer.<\/p>\n<p><span style=\"text-decoration: underline;\">Terms<\/span>:<\/p>\n<p>Trusted devices: A trusted device is a mobile device or a browser on a particular computer that has previously successfully logged in using Two Factor Authentication. It&#8217;s a device that is known to be associated with that Eagle Eye User.<\/p>\n<p>Trusted phone numbers and emails: A trusted phone number is a number that can be used to receive a security code by text. A trusted email address is the email address for the Eagle Eye User on the Eagle Eye Account.<\/p>\n<p>Security code: A security code is a temporary code sent to a trusted device or phone number when the user logs in to a new device or browser.<\/p>\n<p>To learn more about Eagle Eye Networks, visit <a href=\"https:\/\/www.een.com\">www.een.com<\/a> .<\/p>\n<p>About Eagle Eye Networks<\/p>\n<p>Eagle Eye Networks delivers the first on-demand cloud based security and operations video management system (VMS) providing both cloud and on-premise recording. Eagle Eye also provides a cloud video API for integrations and application development. The Eagle Eye Platform offers secure, encrypted recording, camera management, mobile viewing and alerts, and first responder real-time video access \u2013 all 100% cloud managed. The Eagle Eye <a href=\"https:\/\/www.een.com\/product\/cloud-vms-system-overview\/\">Cloud Security Camera Video Management System <\/a> supports a broad array of IP and analog cameras while using Intelligent Bandwidth Management\u2122, making it easy to deploy at single and multiple sites. The API platform uses the Eagle Eye Big Data Video Framework\u2122, with time based data structures used for indexing, search, retrieval and analysis of the live and archived video. Eagle Eye Networks sells through authorized reseller and installation partners. For more information, please visit <a href=\"https:\/\/www.een.com\">www.een.com<\/a> or call +1-512-473-0500.<\/p>\n<p>Download this <a href=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Two-Factor-Authentication.pdf\">Press Release<\/a>.<\/p>\n<p>###<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Further Protects Eagle Eye Security Camera VMS from Cyber Threats Austin, TX \u2013 Eagle Eye Networks today announced implementation of Two Factor Authentication across the Eagle Eye Security Camera VMS &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/pt-br\/blog\/eagle-eye-networks-implements-two-factor-authentication\/\"> <span class=\"screen-reader-text\">Eagle Eye Networks Implements Two Factor Authentication<\/span> Leia mais &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":23218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"15010,6110,46726,85957,46193,137641","_relevanssi_noindex_reason":"","footnotes":""},"categories":[71,74],"tags":[],"class_list":["post-12729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-press"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/12729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12729"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/12729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media\/23218"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}