Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

Why do you need an intrusion prevention system for cybersecurity?

Why do you need an intrusion prevention system for cybersecurity?
In order to provide users a total security solution, combining physical and cyber security protection, VIVOTEK partnered with Trend Micro to offer the world’s first surveillance devices equipped with hosted intrusion prevention system (IPS) and brute force attack protection.
Since the security products were first connected into the Internet, the system has been more at risk of cyberattacks. Just like any other IoT device, security systems have been acknowledged as one of the most vulnerable systems. In one joint announcement from Trend Micro and VIVOTEK, it was reported that Trend Micro has blocked 5 million attempted cyberattacks against IP cameras in just five months, by analyzing data from 7,000 IP cameras. It was reported, “The IP-based surveillance industry is fighting massive cyberattacks, but few countermeasures have been taken by the majority.”
 
However, lacking the real understanding of cyber threats and the correct method to mitigate the threats, most of the video surveillance cameras manufacturers can’t provide a proactive cybersecurity solution. Neither can end users really follow the right procedure if their systems get attacked.
 

IP cameras with IPS

 
Shengfu, Director,
Product Management
Division, VIVOTEK

In order to provide users a total security solution, combining physical and cybersecurity protection, VIVOTEK partnered with Trend Micro to offer the world’s first surveillance devices equipped with hosted intrusion prevention system (IPS) and brute force attack protection.
 
“We are the only company in the security market that offers a total solution in IPS. With IPS, any malicious and suspicious packets can be detected. Once the system gets attacked or detects any intrusions, it will terminate the Internet connection and block all the malfunctions of the system to minimize the damage to users,” said Shengfu, Director of Product Management Division of VIVOTEK.
 
For future development, it will implement a “secure boot” to ensure the integrity of firmware and software running on a system. Only the software or firmware that is signed with approved keys are able to restart the system. However, if the software or firmware is signed with unauthorized keys, the system will not function.
 

Risk management

 
Speaking about how the company optimized their cyber protection, Shengfu said, “This year, we launched a backend cybersecurity management system, like a dashboard, to show users a scale of cyber threats in the system, during the past week or month, such as how many cyberattacks have you encountered and what types of attacks they are. We will also give suggestions on the risk management in regards to how much your system is at risk from cyberattacks in the near future.”
 
As soon as the computer is connected to the Internet, it is already at a high level of risk. “One of our banking customer’s security cameras were hacked, through the affected security camera, the hackers tried to steal their customers’ ID and passwords. It has shown that the security cameras need to be well protected in order to ensure the data security of all your systems,” said Shengfu.
 

Market education

 
The physical security industry needs to understand more about the importance of cybersecurity, from protection to prevention. VIVOTEK takes efforts to develop a total cybersecurity solution and SOP for users if their systems get attacked. However, the market still needs more education to really understand and develop what the best practice is when encountering attacks or how to react to these attacks to make sure the best prevention and risk management is maintained. All these are the true value of a proactive cybersecurity solution.


Product Adopted:
Surveillance Cameras
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: