Home IDIS Network Security

Network Security

by PSI Magazine

Robust and Resilient Network Security

Most often, network security breaches are not caused by the exploitation of encryption technology weaknesses. Rather, they are mostly the result of human factors, such as not enforcing network security best practices. For example, when an organization deploys a video management system (VMS) with 300 IP cameras, the installer needs to manage around 300 IP addresses, 300 MAC addresses, and 300 login credentials for each IP device. This creates a high level of complexity to manage throughout the whole lifecycle of the system.

Most IP cameras now ask users to change the login credentials at the first login, with upper and lower case letters, numbers, and special characters. However, when you have 30 0 separate logins, installers often do one of two things: use a single login for all 300 cameras or create separate logins and record them in an Excel spreadsheet—both of which make the system very easy to breach.

The Elimination of Complexity and Human Error

IDIS has eliminated this complexity and designed its Total Solution with network security in mind. DirectIP™ utilizes true plug-and-play with the implicit pairing of devices, and in doing so, the system reduces the amount of information that needs to be managed. This is also the case for multi-site applications through our For Every Network (FEN) technology.

The registration (i.e. pairing) of IDIS IP cameras and network video recorders (NVRs) is implicit and hidden from users, like a Bluetooth headset paired with a mobile phone; once paired, the headset communicates exclusively with the paired phone. Using this approach, IDIS ensures that installers do not have to manage the device, minimizing the level of human risk during implementation. This is a huge benefit because it can easily reduce the complexity by 30-60fold. A user only needs to manage one IP device, the NVR. At IDIS, we call this “manageable complexity.” It becomes an even more useful concept for large applications or as an organization’s system grows.

DATA INTEGRITY

IDIS has developed the cornerstone of our offerings to ensure data integrity and combat the risk of damaged hard drives. These core technologies were developed to ensure the usability, reliability, integrity, and safety of our customers’ footage data.

 

Reliable Video Evidence

IDIS uses a proprietary integrity check algorithm called IDIS Chained Fingerprint. Every single neighbouring image is chained with a fingerprint value. This chained fingerprint value is stored along with the images, so whenever the stored images are exported, if this chain is broken, it signifies that there was a possible tampering of the images. This is incredibly important in terms of evidence since video footage is often dismissed from courts because tampering cannot be ruled out. In addition, IDIS video streams are protected by Secure Sockets Layer (SSL) cryptographic protocols when communicating across a network, making them incredibly difficult to tamper with or alter.

 

Built-In Resilience

IDIS also uses a proprietary and patent-protected database file system, IDIS iBank. This purpose-built file system provides every IDIS NVR and external eSATA storage device with high-performance playback and stable use of HDD disk drives. IDIS iBank automatically restores and restructures damaged index info within the HDD disk drives, making it possible for IDIS NVRs and external storage to run properly, even in extreme cases of damage, providing the stability and reliability for even the most mission-critical of surveillance operations.

Read more…

 

Related Articles