Meeting Modern Video Surveillance Cybersecurity Challenges


Meeting Modern Video Surveillance Cybersecurity Challenges

How one manufacturer’s comprehensive, multi-pronged approach to security helps prevent successful cyberattacks and simplify operations

In the past, security considerations for video surveillance were far simpler and easier to address. Typically, video surveillance systems were separate from the Local Area Networks (LAN) and the Internet, using direct connections via coaxial cable to send data directly to a recorder. Cybersecurity requirements were low due to this isolation, and primary concerns were physical attacks, including destruction of the equipment (most often the cameras), unauthorized deleting or copying of recorded data, severed video cabling, or the obstruction of lenses and views.

Today, many video surveillance systems use IP-based equipment, which sends recorded video across ethernet cabling to local, remote, and cloud-based recorders, often using the same LAN infrastructure that is used by general office workers. Additionally, remote monitoring and control of these systems via network clients or mobile applications is common. Modern systems also support data communication with third-party systems for access control, intrusion detection, and video analytics. Each opens up new cyber vulnerabilities and challenges, complicating the security picture for users as never before.

In the modern environment, the threat of cyberattack against a video surveillance system has greatly increased, making cybersecurity a top area of concern for customers and operators. The same local security issues of past systems are also still present and must be addressed in the overall security posture, while the integrity, confidentiality, and accessibility of video surveillance data must be further protected during recording, retrieval, and while in-transit—whether across the local network or across a public network to a remote location. Users look to manufacturers and the leveraging of modern technology, best practices, and features to meet these modern challenges.

South Korean technology innovator IDIS has consistently and aggressively considered cybersecurity concerns in their R&D process, focusing on developing a rich and comprehensive set of technologies and features to ensure maximum protections for end users of their popular end-to-end line of hardware and software solutions, a total solution hardening process that begins with a key best practice: the IDIS Total Solution uses a dedicated IP camera subnet for video transmission, separate from a customer’s corporate network, making it very difficult to establish an unauthorized connection into the corporate network. IDIS educates installers and integration partners to design a physically separate network, or to partition an isolated VLAN on shared network equipment, which begins making a difference from the time of installation through a fundamental first step: keeping video surveillance data away from the end-users existing corporate network.

The IDIS total solution features a comprehensive, layered, and multi-pronged approach to ensuring maximum cybersecurity for users. This approach incorporates enhanced secure data access, data transmission, and recording.


IDIS DirectIP™

Network security through a powerful mutual authentication system

IDIS DirectIP® is a proprietary mutual authentication system, supported by all IDIS IP products. When IDIS IP cameras are connected to an IDIS NVR, both devices mutually authenticate each other automatically through DirectIP. This ensures both sides identify and recognize who they are communicating with before the communication session is established. The authentication data is stored and protected on both the IP camera and the NVR.

Firewall on NVR

IDIS Firewall on NVR utilizing IP and port authentication system

IDIS NVR products have their own firewall installed that monitors and controls incoming and outgoing network traffic based on a predetermined set of security rules, including IP, MAC address, and port authentication. The firewalls on IDIS NVR products are designed and pre-configured to prevent unauthorized access.
Two-Factor Authentication
Multi-factor authentication system utilizing user accounts and a registered mobile app
Two-factor authentication (2FA) is a type of multi-factor authentication system. To gain access to an IDIS NVR, the user needs to certify themselves with the IDIS Mobile App after going through the usual login process by typing in a user ID and password. All IDIS NVRs safely protect user accounts with 2FA.


TLS (Transport Layer Security)

Data transmission security system combines IDIS’s proprietary technology with TLS

TLS (Transport Layer Security) is a cryptographic protocol designed to provide communications security and data integrity over networks. By integrating TLS into IDIS’s proprietary data security solutions, there is minimal performance impact on video surveillance data transmission. TLS helps prevent malicious activities such as sniffing, modification, and destruction of data as it is transmitted between devices across a network.

FEN Security (For Every Network Security)

Access and data transmission security system over a public network

FEN from IDIS is an access and data transmission security system independently developed by IDIS using point-to-point (P2P) technology. FEN is an automated network configuration service which simplifies installation of networked surveillance systems. FEN enables the user to setup and configure secure surveillance systems without needing a professional knowledge of the routers and NAT devices on the network.



Protect data using IDIS’s proprietary database system

IDIS iBank is a database system, independently developed by IDIS, specifically for video recording. This system maximizes storage efficiency and enables fast data processing. In addition, storage devices that implement the iBank solution cannot be read by external devices such as PCs, keeping the data safe from forgery and alterations. The iBank system is used in all IDIS’s recording systems.

Chained Fingerprint

Preventing data forgery and maintaining data integrity

IDIS’s Chained Fingerprint technology extracts distinctive features of recorded video data to create fingerprints for each frame and then embeds each fingerprint into the data of the next frame, connecting each frame together with the next like a blockchain. Video data created with Chained Fingerprint technology can be submitted to courts as evidence since an alteration to any frame is easily and quickly detectable, making it simple to prove the footage is authentic and unchanged. It is a highly efficient technology for ensuring and proving the integrity of users’ recorded video data.

Edge Encryption Recording

Efficient and powerful technology for encrypted video data recording

Edge Encryption Recording technology encrypts the video data at the IP camera before storing and sending it over the network. Therefore, additional encryption and decryption processes on storage and data transmission systems are not necessary. The encrypted data is recorded directly to the SD cards and HDDs, so the stored data is safe from unauthorized access and alteration if the SD cards or HDDs are stolen.

To learn more about the IDIS Total Solution and comprehensive cybersecurity protections, visit .


  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • ResponderLink


    Shooter Detection Systems (SDS), an company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3