Is Your VMS as Smart as Your Phone?

Is Your VMS as Smart as Your Phone?

Is your software up to date? Years ago, that question was probably intended for your desktop computer, but today it could also refer to your laptop, tablet, smartphone and much, much more. Professional security systems are no different in terms of their dependence on software. Access control, identity management, video surveillance, communications and every other critical security and safety function in some way relies on software to operate properly and effectively.

Hackers and other cyber criminals are relentless in their attempts to breach networks and access sensitive data. Software vulnerabilities are a favorite target in this ongoing quest largely because of the rate of success in exploiting them – and hackers frequently share success stories online, which exacerbates the problem. A simple Google search will turn up websites dedicated to providing lengthy – and constantly growing – lists of known “loopholes”. Software providers are well aware of this risk, and are equally relentless in their efforts to close these “open doors” with security patches delivered in regular updates.

Which all leads to the question, are we actually keeping our software up to date?

Cybersecurity firms and researchers have confirmed the unfortunate reality that to a large extent, we are not. A recent study found that almost all of the network software vulnerabilities detected in the last year could have been prevented by software fixes and patches that were readily available before a breach occurred. More alarming, particularly considering the critical nature of security is that a good percentage of these fixes had been available for five years or more – but had simply not been installed.

From a security perspective, how are we doing at updating our solutions compared to other critical software? Sadly, the answer is that we are probably doing a much better job of keeping software up to date on our phones than for our critical security applications. A primary reason for this is the auto-update feature available on most smartphones and computers. In fact, the software that drives most smart devices automatically updates on a daily basis without the need for human action – or even awareness.

Video management systems (VMS) may offer the greatest potential to change this trend. Often serving as the hub of security applications, open-architecture VMS are capable of collecting, sorting and analyzing the growing amount of data generated by access control, video surveillance and other integrated security and non-security systems. Analysis generates intelligence that can help make people, property and assets safer and more secure.

With this in mind, it should be obvious that keeping VMS software up to date is critical in security. But no amount of updates can help if they are not installed. Fortunately, some VMS providers now include the same auto-update capabilities as our smartphones to ensure users are running the most current – and most secure – version. As an added bonus, some solutions offer auto-update in conjunction with other features designed to expedite system updates, deliver more efficient recording and help protect systems from cyberattacks.

By removing the need for human action or intervention in the software updating process, new VMS software with auto-update features helps ensure that users’ systems are always current and that any potential vulnerabilities are closed. Combined with flexible, intelligent device drivers, VMS delivers a range of benefits for users and integrators alike, not the least of which is peace of mind. As a result, today’s VMS can indeed be as smart – and as secure – as your phone.

About the Author

Ken LaMarca is the CEO of Active Intelligence.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3