Are you prepared for a cyber-attack?

August 2018 Surveillance

There are two types of companies in the world, those that know they have been hacked and those that don’t know it yet. With cybercrime on the rise, never before has it been so crucial to every company’s safety to have cybersecurity technology installed and integrated to their security system.

IndigoVision offers customers a complete end-to-end security management solution. Not only does IndigoVision have a cybersecurity offering, but it has also released a security hardening guide which contains information on the best practices for protecting security systems.

IndigoVision first released a cybersecurity offering in early 2017 with the release of its intelligent, VMS integrated cybersecurity technology device, CyberVigilant. In early 2018, IndigoVision added to this offering with the release of CyberVigilant in Camera.

The CyberVigilant device simply connects to a managed edge network switch to monitor connected devices using Switched Port Analyser (SPAN) functionality. In the event that any anomalies are detected, alarms are sent directly into the Control Center user interface enabling users to respond immediately to a cyber-attack. These anomalies include, but are not limited to, unauthorised configuration access attempts, network reconnaissance/scans, device access from unauthorised clients, shell access, use of unauthorised DNS, NTP and SMTP servers and Denial Of Service (DoS). It is available for purchase in two options, suitable for monitoring 16- or 24-channel edge switches.

CyberVigilant in Camera is designed around the same principles as the CyberVigilant device, but the technology is inside selected BX cameras, made possible through a firmware update. CyberVigilant in Camera is able to track any attempts from unauthorised devices trying to access them, sending real-time alerts to Control Center, and refusing to communicate with any device that’s not on the whitelist.

All IndigoVision’s software and hardware products enable customers to deploy and maintain a secure security system, however, sometimes a few tips are needed to ensure you are getting the most from the functionality available. IndigoVision has therefore released a Security Hardening Guide that allows customers to ensure their security system is securely setup. The guide covers topics such as Security Physical Access to Components, Network Setup and Authentication via Passwords, and can be downloaded by visiting www.indigovision.com/security-hardening-guide.

For more information contact Alex Penhaligon, IndigoVision, +27 72 496 8570, a.penhaligon@indigovision.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
IQSight SmartSuite integration with XProtect
Surveillance News & Events AI & Data Analytics
Milestone Systems and IQSight have strengthened their collaboration with the release of SmartSuite, a consolidated plug-in suite for Milestone XProtect video management software, to cut installation time for system integrators by 70%.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.