IDIS Video Tech Comes Out Top In Public Demonstration Of Cybersecurity Measures

White Hackers Fail to Breach IDIS Cyber Defenses at the ESS Exhibition While Exposing Competitor Vulnerabilities

IDIS video technology’s industry-beating reputation for robust cybersecurity was given a further boost last month in a series of ethical hacking attempts at the ESS+ International Security Trade Fair in Bogotá, Columbia, which attracted more than 15,000 visitors and 150 exhibitors.

IDIS was one of only three vendors willing to submit their technology for a public Video Security Product Hacking event and defeated all attempted attacks.

There has been growing concern about the vulnerability of surveillance systems to malicious hacking in recent months, with several high profile breaches, and the broad nature of current cyber threats was reflected in the ten attack types featured in the tests: identification and enumeration of devices; port and service scanning; software vulnerability analysis; penetration testing; brute force testing; network protocol analysis; man-in-the-middle attack testing; denial of service (DoS) testing; privilege escalation testing and data security testing.

The IDIS NDAA-compliant products subjected to attacks by professional ethical hackers were an IDIS DR-6516P 6500 series H.265 4K recorder, and an IDIS 4K vandal-resistant IR dome camera (DC-D4831HRX), popular hardware options that make up IDIS DirectIP® plug-and-play and end-to-end video solutions, extensively in commercial and government applications.

All IDIS video technology benefits from multi-layered cyber protection. IDIS DirectIP assures true plug-and-play connection of all devices with instant operability of cameras. NVRs ranging from 4 to 256 channels are protected by firewalls and two-factor authentication, eliminating complexity and the potential for human error associated when engineers need to manage manual passwords when installing multiple cameras.

IDIS’s FEN (For Every Network) technology is an advanced DNS service which enables users to set up remote monitoring without knowledge of NAT routers, making system configuration easy with one-click connection – it is protected by Secure Data Transmission (Transport Layer Security).

iBank, IDIS’s proprietary multimedia file system and database architecture, is not based on off-the-shelf software and provides the most robust, cyber secure data recording, searching, and management platform. And the integrity of all video evidence is protected by IDIS Chained Fingerprint technology, which makes undetected attempts and forgery or image tampering impossible.

“IDIS led the industry in recognizing the importance of cybersecurity, and from the early days of IP video we built in the strongest, multi-layered defenses against hacking attacks and other cyber threats,” said Joon Jun, president of the Global Business Division and senior executive vice president, IDIS. “With growing awareness of the risks associated with network surveillance systems, and the vulnerabilities posed by some other brands, we continue to invest in the most robust protection to give our users complete confidence as demonstrated by this public testing at the ESS+ event.”

For more information on IDIS solutions go to www.idisglobal.com or email info@idisglobal.com.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3