Manage your devices centrally

CCTV Handbook 2018 Surveillance, Information Security, Products & Solutions

Axis Communications has announced the release of AXIS Device Manager, an on premise device management tool that offers a cost-effective and secure way to manage all major installation and operational device management tasks. Moreover, in a world where security threats are becoming more common, AXIS Device Manager facilitates proactive device and network protection. It is suitable for managing up to a couple of thousand Axis network cameras, access control and audio devices on one site, or several thousand devices across multiple sites.

The broad range of device management functions available include:

• Automatically assign IP addresses.

• Install, configure, replace and upgrade any single device.

• Copy configurations between thousands of devices.

• Connect to multiple servers/systems.

• Restore points and factory default settings.

• Upgrade device firmware.

• Manage and update user accounts and passwords.

• Deploy, and renew HTTPS & IEEE 802.1x certificates.

Supporting cybersecurity

Importantly, in an environment where technology is in a state of constant change and evolution, and threats from cybercriminals become more sophisticated, it is essential that any infrastructure related to safety and security is managed dynamically day-to-day. The Device Manager delivers significant enhancements to device security by enabling centralised account, password and certificate management as well as hardening devices according to the Axis hardening guide. This makes it easier and more cost efficient for system installers and administrators to proactively manage and implement important security management features.

“Being able to access and efficiently install, adapt and secure all of the devices on your network saves a tremendous amount of time and effort. AXIS Device Manager is the go-to tool for reaching all Axis devices – whatever stage of their lifecycle – and make needed adjustments,” commented Ola Lennartsson, global product manager, system management at Axis Communications. “In today’s fast-paced world, any device or network that is static is not only old-fashioned, it is potentially prone to cyber threats. Therefore, it is important we ensure our customers can use a tool that allows them to easily, rapidly and decisively manage all of the devices on their network. AXIS Device Manager is that tool.”

AXIS Device Manager will replace AXIS Camera management. It is available as a free download at https://www.axis.com/za/en/products/axis-device-manager.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Risk Management & Resilience Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...