Cybersecuring surveillance devices

Issue 2 2022 Surveillance

Check Point Software Technologies has announced it is partnering with Provision-ISR (Israel). The partnership will involve the Check Point Quantum IoT Protect Nano Agent being embedded in Provision-ISR’s CCTV cameras for on-device runtime protection against zero-day attacks. The solution brings a new level of cybersecurity to the video surveillance market.

CCTV plays an integral role in keeping people and organisations safe, everywhere from transport hubs to retail, banks and critical infrastructure. According to cctv.co.uk, there are about 691 000 CCTV cameras in London. As surveillance video is increasingly IoT-connected, unfortunately, these devices are prime targets for cybercriminals. Nano Agent is an embedded runtime protection solution that provides built-in security against attacks such as access control, memory corruption, shell injection, import table hijacking, control flow hijacking and more. It guarantees 100% firmware coverage, including third party components, without compromising the device’s performance.

Modern CCTV cameras are essentially functioning as small computers that run operating systems, applications, have various networks and radio frequency (RF) interfaces. As such, they are also susceptible to hacking attacks. One of the biggest issues is that end-users will often keep the default usernames and passwords, essentially leaving the door open for hackers. Even with a strong password, traditional CCTV cameras are not supplied with adequate on-board security.

But why even hack a CCTV camera? Criminals may wish to gain access to the camera’s controls, to turn it off, point it in a different direction and manipulate images and associated information or just to watch the activity covered by the camera. In addition, as a network device, once hacked, it can be used to gain access to sensitive resources on the corporate network via lateral movement, where cybercriminals can then exploit vulnerabilities and deploy botnets or crypto miners.

Ami Finer, VP sales at Provision-ISR commented, “On a global scale, even the companies with the most considerable market share have been proven to have crucial vulnerabilities. This is because IP cameras have limited processing power, leaving little room for traditional security software. At Provision-ISR, we want to lead from the front with 100% secure CCTV devices that will give customers peace of mind. To do that, we needed an optimised threat solution with an extremely small footprint that would also be completely reliable. This is where Check Point comes in. From uncovering firmware security risks, hardening the devices with runtime protection and managing devices with granular policies, we now have a robust end-to-end security solution.”

Oded Gonda, VP Technology and Innovation at Check Point Software says, “The expanding threat landscape is making it an absolute must to protect IoT devices from cyberattacks. And the technology is available to do it. From IP cameras, such as Provision-ISR’s, to routers, medical devices and industrial controllers, Quantum IoT Protect provides on-device runtime protection against even the most sophisticated fifth generation cyberattacks – serving as a powerful line of defence for all IoT devices.”


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Video Analytics Selection Guide 2024
Surveillance
The Video Analytics Selection Guide 2024 highlights a number of video analytics/AI solutions companies offer to enhance and optimise video surveillance operations.

Read more...
Optimising your camera-to-operator ratio
Surveillance
Learning from critical data points in your security systems is the key to quality monitoring, effectively deploying resources, and scaling control room profitability. The golden equation is your true Camera-to-Operator ratio.

Read more...
Storage Selection Guide 2024
Storage Selection Guide Surveillance
The Storage Selection Guide 2024 includes a range of video storage and management options for small, medium and large surveillance operations.

Read more...
Directory of suppliers
Surveillance
The Directory of Suppliers and Solution Providers provides a selection of companies involved in various aspects of surveillance projects, from consulting to implementation and ongoing maintenance, as well as equipment suppliers.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Cloud or onsite, a comparison
Astrosec Surveillance
In the realm of electronic security, the choice between cloud-based and onsite software solutions for offsite CCTV monitoring can significantly impact operational efficiency, cost-effectiveness, and overall effectiveness.

Read more...
On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...