Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Video vendors stand ready to combat cybercrime

Video vendors stand ready to combat cybercrime
For 2017, video surveillance players cited various trends, such as advanced compression, analytics and managed service. But according to vendors, none of those compares with the issue of cybersecurity, especially after the distributed denial-of-service (DDoS) attack last year.
For 2017, video surveillance players cited various trends, such as advanced compression, analytics and managed service, to help end users achieve more savings and business intelligence. But according to vendors, none of those compares with the issue of cybersecurity, especially after the distributed denial-of-service (DDoS) attack last year.
 
The DDoS attack against a US Internet performance and management company resulted in a shutdown of service on famous sites such as Amazon and Netflix. It was later found out a variety of IoT devices, including cameras and NVRs made with Chinese-made components, were used as robotic attackers after being infected with the Mirai malware. The incident again raised awareness on cybersecurity, especially as more and more video equipment has migrated to the Internet.
 
“What was most unexpected about the last year was the significant impact of cyber security on the IoT. The security of connected devices has been a continued concern, but many were taken by surprise at the extent of the outlying vulnerabilities and how easily hackers can take over the control of devices and gain access to stored data,” said Brandon Reich, Senior Director for Surveillance Solutions at Pivot3.
 
“In 2017, we’ll see businesses as a whole be much more focused on cyber threats, a growing paradigm that challenges business and security leaders to stay one step ahead of crime and fraud trends,” said Kevin Wine, VP of Marketing at Verint Systems.
 
Vendors, meanwhile, have made efforts to make their devices securer than ever. Bosch Security Systems, for example, equips its cameras with a so-called trusted platform module (TPM), which is a vault inside the camera that stores some of the most critical information such as certificates, keys, and licenses. According to Bosch, having a TPM integrated, no attempt to access critical information will be successful as any activities involving a private key occur only inside the TPM.
 
Axis Communications, meanwhile, also makes sure its devices are hardened and protected. “Cybersecurity remains a top priority for Axis Communications in 2017, especially as our products are placed in larger and larger IoT environments,” said Johan Paulsson, CTO of Axis Communications. “We train our partners through our comprehensive Axis Academy Program and offer tailored cybersecurity advice for end users of all levels on our website, not to least mention our Axis Hardening Guide.”
 
With so much video data being collected, the issue of privacy arises. “People masking technology such as that available from Panasonic helps deliver the reassurance that the identity of clients and workers can be protected.” said Karen Sangha, UK Marketing Manager at Panasonic.
 
Education, meanwhile, also plays a big role. “The fact is that we have more and more IP devices and systems that are improperly secured and the responsibility for cybersecurity doesn’t fall only on IT departments. Every player in the physical security market, from manufacturers, to consultants, integrators and end-users, will have a part to play,” said Francis Lachance, Director of Video and Appliances Product Group at Genetec. “So, the challenge is going to be one of education: we will need to inform customers on what is insecure, teach them how to void pitfalls and how to protect themselves and show them how to better manage the risk of deploying non-secure security devices and systems.”


Product Adopted:
Others
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: