Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

ISC West 2023: i-PRO AI cameras, Active Guard, scene analytics and hacking demo

ISC West 2023: i-PRO AI cameras, Active Guard, scene analytics and hacking demo
A fun event at ISC West this year is i-PRO’s aptly-named press breakfast “Hack-browns and Egg-cryption,” where i-PRO shared their latest company/product news and gave a live demonstration on how hackers can use readily available tools to gain control of security systems.
A fun event at ISC West this year is i-PRO’s aptly-named press breakfast “Hack-browns and Egg-cryption,” where i-PRO shared their latest company/product news and gave a live demonstration on how hackers can use readily available tools online (and in stores) to gain control of your security systems.

i-PRO marks first year of independence from Panasonic 

According to Bill Brennan, President of i-PRO Americas, the company is building on its legacy in Panasonic (65 years in the industry) to develop AI technology for proactive security – utilizing AI to help prevent attacks and security incidents, especially in the K12 education sphere.

i-PRO aims to achieve this through being “flexible, agile, bold and open.” Their flexible open platform strategy enables technology partnerships with edge app developers Optex and Vaxtor and VMS providers Milestone and Genetec, equipped with SDKs for further system integration.
 
The current portfolio covers security cameras, edge AI security cameras and video management systems as well as public safety applications – evidence management systems, in-car videos and body-worn cameras. Among the product lineup this year at ISC West are their 4K dual sensor cameras with AI at the edge which can support four camera AI analytics and the smallest outdoor multidirectional PTZ camera that supports up to 6 camera analytics with discreet form factor.

i-PRO network cameras are now TAA-compliant

Another important bit of news shared at the press breakfast is that i-PRO cameras are now TAA-compliant (with their cameras manufactured again in Japan), along with being NDAA-compliant, FIPS 140-2 validated, GlobalSign verified and all powered by Ambarella chipsets.
Bill Brennan, President of i-PRO Americas

i-PRO solution highlights at ISC West 2023

Adam Lowenstein, Director of Product Management for i-PRO Americas, pointed out that it was important for the security hardware, processor and AI analytics to work with the right VMS to fully realize the potential of AI in security and safety. iPRO’s Active Guard is a software plugin for VMS that creates a dashboard for security professionals to quickly review videos and search for incidents or people (able to look up to 98 attributes including face, vehicle, people and people counting).
 
Another highlight this year is the i-PRO AI scene analytic software which can monitor specific areas and tie these in with time parameters. Use cases can be easily found in retail as changes in the scene can be easily identified, such as doors left open, grocery store shelves are empty or assembly line backups.

Network camera cybersecurity needs to be a priority   

Will Knehr, Senior Manager of Information and Data Privacy at i-PRO, gave a live hacking demonstration at the event, showing how hackers can exploit open-source tools available online or an Ethernet cable with an embedded Bluetooth chip to gain access to user cameras and NVRs. Online penetration testing tools list down cybersecurity vulnerabilities for various camera models, making it relatively easy for would-be hackers to gain usernames and passwords to not only view private RTSP feeds and knock a camera offline. Knehr further demonstrated how the hacked cameras can be used to deliver an attack to the network itself by exploiting SSH (common communications protocol) to create a path to insert malware or ransomware.   
 
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: