Eagle Eye Networks

Cloud Videoövervakning

Lär dig mer om fördelarna med moln och varför fler och fler företag övergår till molnvideoövervakning.

Cloudflare Security Bug

Eagle Eye Networks does not use Cloudflare – a website performance enhancement service. There was a relatively severe security issue detected by Tavis Ormandy at Project Zero in the Cloudflare service. He found that certain private information could be extracted under some rare circumstances. It’s a severe security issue, but it’s

Read More »
cloud-car-web

Using Cloud to Avoid Traffic

Using cloud to avoid traffic?  How does that work? It’s true, today I used cloud computing to avoid traffic.  Here’s a little background.  At Eagle Eye, we not only are a cloud service provider, but we also use cloud services to run our business.  There are the obvious tools such

Read More »
API-Server

Live Camera Preview Stream

There have been many questions on how to use our API. One of the most frequent questions we get from our customers is, “How can we play a live preview stream for a camera on our public website?” For those that do not know what a live preview stream is,

Read More »
camera-settings-from-layout

Accessing Camera Settings

With the proper permissions, camera settings can be accessed from the dashboard or from layout view. From the dashboard, click the gear icon to open the cameras settings. From a layout, click the dropdown in the upper right corner over the preview image and select settings. Related posts:  Adjusting Motion

Read More »
motion-settings-overview

Motion Settings Overview

The Eagle Eye Networks VMS records two video streams from each camera: preview video and full video. Preview video is typically a lower frame rate and resolution so that no matter the motion settings, there is a recording of everything. At default, preview video is transmitted in real time to the

Read More »
Adjusting Motion Settings

Adjusting Motion Settings

Regions and Alerts The Eagle Eye Networks VMS allows an unlimited amount of regions and alerts per camera. These can be added by opening camera settings and selecting the motion tab. In this example, a region named Entry-Exit is shown with separate motion sensitivity from the overall motion sensitivity of

Read More »
Technology Transformation-FI

Technology Transformation and the Security Integration Business Model

Recently, an article by Ray Bernard entitled, ”Technology Transformation and the Security Integration Business Model” was posted on Security Info Watch. ”According to software-as-a-service (SaaS) management platform provider BetterCloud, by 2020, more than 50 percent of all surveyed SMB organizations expect to run 100 percent of their IT in the

Read More »
Infrastructure

Eagle Eye Infrastructure

Our infrastructure includes three tiers. We have a backend, a middleware, and a frontend tier. The backend relates to our on premise edge appliance called the Bridge. The Bridge can be thought of as a DVR, but more appropriately, it is a video buffer appliance that is responsible for pushing

Read More »

Cyber Attack – D.C. Cameras

Over the past few months, more and more IOT devices, including DVRs, and cameras, are being reportedly compromised and proven vulnerable to cyber attacks. Most recently, the Washington Post reported that unidentified hackers managed to compromise almost 70% of the D.C. police closed-circuit surveillance cameras eight days prior to the

Read More »
Safari-Chrome

Dangers of Browser Autofill

The browser autofill feature, which usually kicks in automatically, is a huge cyber security issue. Sure, it’s convenient at times, but it also makes it easier for hackers to access your personal information. We strongly discourage anyone from using autofill, whether it’s through the password capabilities built into your browser

Read More »
Checksum to Ensure Data Integrity

Ensure Data Integrity with Checksum

At Eagle Eye Networks we are often asked about ‘Watermarking’ on our recorded video to ensure data integrity. This can be guaranteed by using the ‘checksum’ approach as used in many digital data transfers. The article below from ‘Online Tech Tips’ explains ‘Checksum’ and how it is used to ensure

Read More »
Add Camera Enhancements

Add Camera Enhancements

Feature Release December 13, 2016 Add Camera Enhancements When adding a camera, some settings can be edited while waiting for the add camera process to complete. Name and tags are presented for editing while adding. Clicking ”more settings” allows editing the On/Off/Schedule, Time Zone and Notes. Examples From the Dashboard,

Read More »
NetGear-transparent

Netgear Router Vulnerability

Netgear R7000 and R6400 routers, and maybe other ones too (see list below) were discovered to have a severe vulnerability on Dec 9, 2016. Netgear responded within 3 days with a new firmware to solve the problem. Good work on their part. But if you don’t patch and upgrade it is

Read More »
SEC-Consult

Sony IP Cameras

Vulnerability affects over 80 different camera models Today some associates at Sec Consult found 2 different back doors in SONY IP Cameras. Sony has responded, but be sure to update your firmware on all your cameras immediately. This is a severe vulnerability that can lead to takeover of the camera

Read More »
Afraid-of-the-DVR-2

Are You Afraid of Your DVR?

You should be if it’s connected to the internet. It could be the doorway for hackers to access your entire network. Once a DVR is compromised, it can be used for many types of nefarious activities. These activities include: • Stealing private or confidential information • Crashing your networks or

Read More »