Physical security industry knows it needs to be proactive to address issues of malicious takeover of private and corporate networks

The potential costs and consequences of hackers getting through firewalls and onto the user’s computer networks can be devastating

Theft of NATO data. Leakage of emails. Hackers setting up a live streaming website for over 100 New York City private webcams and even hacking the infrastructure servers of the U.S. government. As news of malicious takeover of private and corporate networks as well as incidents of malicious software programs, referred to as malware, continues to reach critical mass, the physical security industry knows it needs to be proactive to address these issues. At ASIS 2015, manufacturers indicated they are doing just that to secure data and, especially, networked video surveillance  and camera streams.

Secure Communication’ For Panasonic IP Devices

Panasonic, Newark, N.J., announced a new partnership with Symantec to develop more secure video transmission solutions to prevent data takeover and malicious activity called Secure Communication. Panasonic’s launch of the Norton Secured powered by Symantec solution at ASIS is designed to provide secure management of data in video surveillance and address recent cyber security incidents that continue to occur, including hacking, data breach, password takeover and tampering.

Secure Communication is PC-level security for built-in devices and protects video streams with data encryption, communication encryption and verification to maintain evidence and safety of video streams

Charlie Hare, Panasonic’s National Category Manager, Security and Mobile Video Solutions, said Secure Communication is PC-level security for built-in devices and protects video streams with data encryption, communication encryption and verification to maintain evidence and safety of video streams. Secure Communication specifically protects against spoofing (false data), altering (changing images) and snooping (stealing passwords) of protected surveillance communications.

“All IP end points are connected to the network. And each time an installer hangs an IP camera there’s vulnerability to the network,” says Hare. “With Secure Communication, Panasonic IP devices have an extra layer of protection. It encodes data and encrypts transmission. This is a big effort now on behalf of Panasonic, to put this type of protection on our cameras,” he says. He adds that Secure Communication is available on all new Panasonic 3, 5 and 6 Series Models.

Protection At The Appliance Level

Rich Anderson, CMO and CTO of Razberi Technologies, Farmers Branch, Texas, says the company’s line of appliances that host video management systems also include measures to protect against data loss and cyber security threats. The company’s LocBeri Cyber Security System is designed to prevent unauthorized users from accessing network ports intended for use with surveillance cameras. Anderson says the potential costs and consequences of hackers getting through firewalls and onto the user’s computer networks can be devastating.

"Whenever you install IP cameras, especially outside on a building, you’re potentially opening the network up to others", says Rich Anderson, CMO and CTO of Razberi Technologies

“Whenever you install IP cameras, especially outside on a building, you’re potentially opening the network up to others,” Anderson says. “One example is a college where students unplugged cameras and plugged their laptops into the ports to get into the network and alter their test scores. LocBeri automatically populates the MAC addresses of all ports through a utility software scan and locks down those ports with a single click. It’s one-button security,” he says. The company recently introduced LocBeri as a new standard feature on all Razberi™ ServerSwitch units.

The LocBeri system scans attached cameras and automatically configures the switch so only those cameras work on those ports. There is no major downtime or labor involved when undergoing system maintenance or changing a camera, because one push of a button unlocks all ports to allow for system changes and another push when finished re-locks the system, saving the installer programming and installation costs as well, Anderson adds.

Cyber security and outsider threats of compromise to the network is something the security industry continues to address with new layers of detection and protection.

Download PDF version Download PDF version

Author profile

Deborah O'Mara Owner, DLO Communications

Deborah L. O’Mara, SourceSecurity.com's dealer/integrator correspondent, is a veteran of the security marketplace, having extensive experience in security, fire alarm technology and integrated systems.

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...