Cyber security is something that end users ate taking very seriously when it comes to network-based security systems, and increasingly installers and integrators are being asked to demonstrate the steps they have taken to deliver a secure solution. Camera Defense from Razberi Technologies can help deliver protection.
What is it?
Camera Defense is a cyber security software package which is currently included as standard on Razberi Technologies’ ServerSwitch IQ range of video surveillance appliances. Designed to simplify and automate some of the important steps that need to be taken to protect against cyber risks, it delivers assurance to end users that appropriate security measures have been put in place.
A simple dashboard delivers real-time status information about the cyber security measures for the surveillance system, and also provides evidence to the customer that the installer or integrator has taken all risks seriously.
Camera Defense not only protects the server, but also applies appropriate security to edge devices such as cameras and other field equipment.
Will I need IT support?
Camera Defense is a surveillance-specific product, and as such has been created with the installer or integrator in mind. Many of the security processes have been automated, ensuring that it is both simple and quick to deploy. It will not impact on other parts of a corporate network.
Indeed, one of the stages of protection offered by the Camera Defense software is to isolate the surveillance part of the network traffic from any other activity, thus creating a separate and defined entity.
Because the software runs from the surveillance server, it can work with all supported edge devices. This additionally ensures that installers and integrators can enjoy a greater level of protection for the system they are implementing.
How does it work?
Camera Defense takes a three-pronged approach to cyber security. Firstly, it automatically hardens edge devices by binding authorised units to the network, thus preventing unknown nodes from being added. It also restricts unknown IP addresses with regards to connectivity and disables high risk services.
Secondly, it isolates the security network by creating a secure VLAN. An embedded TPM (trusted platform module) manages system boots and encryption, and it applies virus and malware protection to the system architecture.
Finally, it then monitors traffic to detect and notify for any threats or risks. The software uses dynamic threat detection, which allows it to evolve to handle emerging threats through machine learning processes.
There is also on-going system health monitoring to ensure that performance is not impacted by any infrastructure issues.