13.08.2019 Views

International Security Journal - August 2019 - Special Report

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

special report knowledge partner<br />

knowledge partner<br />

What keeps you<br />

up at night?<br />

From traditional risks to modern threats, one surveillance manufacturer<br />

is taking a comprehensive approach to ensuring users’ peace of mind<br />

Since the global roll out of IDIS’ branded<br />

surveillance business—beginning<br />

in 2013 in Europe and continuing<br />

through the company’s Americas<br />

launch in 2015—South Korea’s largest<br />

in-country security and surveillance<br />

manufacturer has presented its “total<br />

solution” as a market differentiator. Designing,<br />

developing, manufacturing and delivering<br />

(completely in-house) a complete end-to-end<br />

range of analogue and IP technology – from<br />

recorders, through cameras, software and even<br />

monitors—the company is increasingly known<br />

for its total solution concept and approach.<br />

However, in most discussions of the IDIS<br />

Total Solution, the focus is on the company’s<br />

wide range of high-performing analogue<br />

and IP hardware options, VMS software and<br />

innovations in AI/Deep Learning. Here, we<br />

explore how the company’s “total solution”<br />

approach extends well beyond its branded<br />

and product offerings, into the R&D and<br />

technological underpinnings of the offerings<br />

themselves and how that “total solution”<br />

approach has resulted in one of the industry’s<br />

most complete, multi-pronged approaches to<br />

managing both traditional video surveillance<br />

headaches and truly modern, still evolving<br />

threats to cybersecurity and data integrity.<br />

We’ll look at the specific steps IDIS has taken<br />

and incorporated at every step of the product<br />

lifecycle to ensure and enhance peace of<br />

mind for its partners, end-users and their<br />

stakeholders, while still keeping its marketresponsive<br />

innovation aggressive, performance<br />

standards and ease of use high and total cost<br />

of ownership low.<br />

The headache: Cybersecurity<br />

In <strong>2019</strong>, cyberthreats against video surveillance systems have<br />

reached an all-time high, with little relief in sight. This makes<br />

cybersecurity a top area of concern—and in many cases, a new<br />

area—for security professionals and their stakeholders. Beyond<br />

traditional local and hardware security measures, the integrity,<br />

confidentiality and accessibility of video surveillance data must be<br />

protected during recording, retrieval and while in-transit.<br />

IDIS considers and addresses cybersecurity concerns from R&D<br />

through customer installation and has developed a comprehensive<br />

set of technologies and features to ensure maximum protections<br />

for end users. It starts with a best practice: educating installers<br />

and integration partners on the importance of designing and<br />

implementing a physically separate network (or partitioning an<br />

isolated VLAN on shared network equipment) and continues<br />

through a comprehensive, layered and multi-pronged approach to<br />

ensuring maximum cybersecurity for users, focusing on securing<br />

data access, securing data transmission and securing data<br />

recording.<br />

Securing data access<br />

• IDIS NVR<br />

products have<br />

their own<br />

firewall installed<br />

that monitors and<br />

controls incoming<br />

and outgoing network traffic<br />

based on a predetermined set of security rules, including IP,<br />

MAC address and port authentication. The firewalls on IDIS<br />

NVR products are designed and pre-configured to prevent<br />

unauthorised access.<br />

• IDIS’ use of Multi-factor authentication system utilising user<br />

accounts and a registered mobile app to further limit access<br />

44 | Isj <strong>International</strong><strong>Security</strong><strong>Journal</strong>.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!