Achieve video cybersecurity and peace of mind

Issue 1 2022 Cyber Security

Connected IT systems create so much opportunity for modern organisations, but also make them more susceptible to cyberthreats. In fact, cybercrime is believed to be costing organisations $2,9 million every minute. Even worse, it can put people’s personal safety at risk and cause irreparable brand reputation damage.

The fact is that most cybersecurity breaches are caused internally — employees innocently opening phishing emails and similar security slips. This makes internal cybersecurity just as important, especially as many breaches are not detected for a long time.

A partner you can trust

With more than 20 years of experience in video technology, we know there is no quick fix here. That’s why our approach to cybersecurity is a carefully developed and proven combination of features, expertise, training and close collaboration with you. With Milestone you have flexible technology with uncompromising security.

• Physical separation: Possibility for physical separation of camera networks and client network.

• Digital signature: Digital signing of video databases and exports.

• Web and mobile safe: Secure and encrypted (HTTPS) access for web and mobile client users.

• HTTPS: HTTPS-secure camera connectivity.

• NTLM authentication: Option for Windows AD user authentication via Microsoft NTLM or Kerberos authentication.

• Audit reports: Audit log provides full traceability of user actions.

• Encryption: Encryption and password protection of video databases and exports.

• User rights management: Strict and time-controlled user rights management, enforced on the server side.

• Third-party safety: Full authentication and authorisation of third-party applications integrated via Milestone Integration Platform SDK (MIP SDK).

Milestone helps you reduce your cybersecurity workload so you can focus on growing your business.

For more information contact George Psoulis, Milestone Systems, +27 82 377 0415, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Building a holistic application security process
Altron Arrow Cyber Security
Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.

Managing data privacy concerns when moving to the cloud
Cyber Security
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

The democratisation of threats
Cyber Security
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Exploiting Android accessibility services
Cyber Security
Pradeo Security recently neutralised an application using Android accessibility services that exploits the permission to perform fraudulent banking transactions.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Keeping devices in check
Cyber Security Asset Management, EAS, RFID IT infrastructure
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

Considering cloud downtime insurance?
Arcserve Southern Africa Cyber Security IT infrastructure Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.