securitylinkindia

VSS Announces Recording Appliances For Milestone Systems

Video Storage Solutions (VSS) has recently released its portfolio of video recording appliances specifically pre-engineered for Milestone Systems XProtect video surveillance software. The systems range from desktop tower and 1U short-depth to 2U rack models capable of housing up to 364TB of storage. For those Milestone-based projects requiring long-term archiving, 1PB external storage options are also available. This extensive family of products also includes client viewing stations with multiple GPU support. All systems are bandwidth-guaranteed and VSS-certified to support Milestone XProtect surveillance projects. V-series models are perfect for budget-challenged projects that still require professional-grade quality, reliability, and maximum uptime. All systems come standard with Intel® Core™ 9th generation processors. These appliances include options of single or dual-SSD operating system drives, single or redundant power, and Microsoft Windows 10 Pro or Windows Server 2016 operating systems. All of the V-series systems utilize Seagate Skyhawk surveillance drives and come standard with a three-year worldwide on-site warranty. The Enterprise-grade M-Series incorporates a variety of Intel processors, including, Intel® Xeon® E-2136 Processor, Intel Core 9th generation, and second-generation Xeon Scalable Processors, optional SAS hard drives, and a five-year worldwide on-site warranty. The M-series also features the VSS storage accelerator, which, with data speeds exceeding 2500MB/s, allows for continuous read and write of video data. This eliminates the need for live video drives within the system and delivers the highest throughput rates ever recorded on a Milestone XProtect-based appliance without the use of 15K live video drives. The M-series systems are capable of recording hundreds and hundreds of high-resolution cameras on a single video recording appliance. The M-series portfolio also includes management appliances supporting over 5000 cameras. As data integrity is more critical than ever, every VSS system comes standard with the keep-your-hard-drive feature, in addition to the on-site warranty. This allows the customer to retain control over their most sensitive data and be compliant with data privacy regulations and internal company policies. This also protects against civil liability and safeguards the organization from the risks associated with third-party mismanagement. The keep-your-hard-drive warranty extends to the client viewing stations, which also includes a five-year on-site warranty. This entire family of products is exclusively available through Milestone Systems’ worldwide authorized distribution channel and immediately available for delivery in less than two weeks upon order.  

Read More

Invictus Camera Enlisted to Protect Endangered Sea Turtles

Endangered nesting green sea turtles are now being protected by 360 Vision Technology’s Invictus ruggedized Hybrid PTZ camera. The Invictus camera has been deployed as part of Security Centres International’s high-performance mobile advanced safety tower (MAST), rapid deployment camera solution, which is now installed on the Cayman Islands, British West Indies. The MAST unit was deployed after a funding campaign led by Caymanian, Michael Ridley, to install video surveillance at a key nesting beach at Sand Hole Road in Boatswains Bay. “Sand Hole Road is a critically important nesting beach for the female turtles, who crawl out onto the beaches to dig nests and lay eggs during the night,” explained Michael, “Unfortunately, poaching poses a constant threat to the survival of the nesting sea turtles at many locations. In addition, economic development of the island has seen more beach front property being built and a subsequent squeeze on places available for the turtles to nest safely after migrating long distances between feeding grounds. “After analysing the Cayman Islands Department of Environment (DoE) detailed nesting data accumulated over 20 years, to identify the most vibrant turtle nesting grounds, I selected the beach to implement a pilot program to monitor nesting turtles and protect them from poaching activity. The beach site has been dubbed, ‘Turtle Beach’ and provides a perfect nesting ground for turtles due to its minimal property development, zero light pollution, and enough sand and vegetation to support the turtles’ nesting activity.” “The Invictus based MAST solution was perfect for the application at the beach,” said Stuart Bostock, Executive Group President at Security Centres International, “Featuring world-class HD surveillance imaging from the 360 Vision Invictus camera, leading-edge design, robust build, zero infrastructure requirements and seamless video management system (VMS) integration, MAST is the only product of its kind. It’s also 100% self-powered, using solar energy and a 100-hour back-up battery; a feature supported by the use of the low power requirements of the 360 Vision Invictus camera.” Monitored 24/7, images from the camera enable DoE and Royal Cayman Islands Police Service (RCIPS) officers to be alerted and dispatched when nesting turtles arrive at the beach, assisting the DoE to monitor the beach and provide the highest level of protection against poaching. “We are all very confident that the data obtained from this project will prove invaluable in assisting the DoE with their conservation efforts and assist them with their Island-wide monitoring efforts,” continued Michael, “Sand Hole Road is a critically important nesting beach with poaching posing a constant threat to the survival of the sea turtles that nest there, so high-performance CCTV via the MAST solution was specified as the best way to protect them.” The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability, operating without the need for any supporting local infrastructure. Plus, the MAST system is silent in operation, posing no environmental impact, and thanks to the 360 Vision IR LED illuminator equipped Invictus camera, the system can operate without a visible light source that may disturb, or draw unwanted attention to the turtles nesting site. Mark Rees, Managing Director at 360 Vision Technology added, “The Invictus is a high-performance, ruggedized all-in-one PTZ camera with full 1080P HD and Predator ultra-low-light camera technology, making it the perfect choice for off-grid temporary/ rapid deployment mobile surveillance rigs such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical off-grid battery power when deployed in remote applications, extending MAST’s operational performance and meaning fewer maintenance visits to the camera, with the benefit of less disturbance to the green sea turtles. “The Invictus camera’s unparalleled mix of competitive cost and advanced functionality make it the perfect imaging component for the innovative MAST system, where it is now providing much needed surveillance protection and research video.” To date, the use of the MAST unit has proved a huge success in protecting the sea turtles from poachers and providing evidential video of the turtles’ feeding and nesting activity on the beach. Calculating population, nesting patterns and survival rates from the footage gained during this season, plans have already been made for additional protection measures and the extension of the MAST based surveillance program to other locations on the British West Indies island.  

Read More

IDIS Advanced Lightmaster Ptz Camera

IDIS is extending its award-winning DirectIP® camera range with the introduction of its new flagship 2MP 36x Lightmaster IR PTZ outdoor-ready camera for fast and precise pan/ tilt/ zoom performance. The new DC-S6283HRX Lightmaster builds on the specification of IDIS’s successful PTZ models, with a highgrade lens combined with advanced sensor technology and finely tuned, client-side image processing, allowing the capture of vivid true colour video in extremely low light conditions. Excellent performance at long distances, with minimum motion blur, makes the DCS6283HRX ideal for perimeters, shopping centres, stadia, outdoor spaces and public area applications. The camera benefits from IDIS’ signature true plug-andplay, one-click configuration and features 36x optical zoom, IR up to 350 metres, true wide dynamic range (WDR), digital image stabilization (DIS), a built-in heater and a vandal proof casing. “Designed for 24/7 accurate pan/ tilt/ zoom operation this new Lightmaster PTZ camera delivers unparalleled performance and exceptional detail when zooming. The camera is equipped with a variety of intelligent features and can move between pre-set positions and zoom in automatically in response to detected events. The result is maximum protection for a wide range of applications,” said James Min, Managing Director, IDIS Europe. The user experience is enhanced with IDIS Smart UX Controls, which is an award-winning, advanced and simple to use interface featuring intuitive slingshot and rubber-band style controls. Operators can smoothly and seamlessly follow moving objects in real-time with ground-breaking accuracy by panning images at different speeds and in different directions – literally without lifting a finger – by using a CTRL button and mouse combination. The camera uses H.264 and H.265 combined with IDIS Intelligent Codec to deliver significant bandwidth and storage savings and benefits from low Power-over-Ethernet (PoE) energy consumption. The risk of gaps in footage is eliminated with IDIS Smart Failover. In the event of network instability, the camera automatically records data to an integral 256GB SD card and transfers it to the network video recorder (NVR) once connection is restored, which avoids the need for engineer call outs to retrieve footage. “We are listening and responding to customer demands with our new 2MP PTZ Lightmaster camera, providing an easy to deploy, low-storage and bandwidth solution for wide area coverage and perimeter detection,” continued James Min, “It’s particularly suited to town centre and city surveillance, stadia, outdoor retail parks, manufacturing and logistics sites and high-security perimeter applications where outstanding performance and ease-of-use combined with a low total cost of ownership are becoming essential.”  

Read More

Securing IP Surveillance Cameras in the IoT Ecosystem

The security for devices connected to the Internet of Things (IoT) has been a hot topic, and Internet Protocol (IP) surveillance cameras, in particular, have been the subject of growing scrutiny. IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed-denial-of-service (DDoS) attack in history. As a result, packet flow experienced outbursts of up to 50 times higher than its normal volume, with internet traffic estimated at a record high of 1.2 Tbps. The traffic was triggered by remote commands, and the hijacked devices were primarily IP surveillance cameras. Multiple variants of Mirai-like malware have since surfaced to further take advantage of vulnerable IP surveillance cameras. Rightfully, cybersecurity is now becoming a major consideration for IP surveillance devices, with some governments, for instance, already at work on regulations to elevate cybersecurity implementation. It is becoming a new decisive factor in the market of IP surveillance cameras. Motivations for targeting IP surveillance cameras One of the major motivations for hacking IoT devices is financial gain; and when it comes to monetization, IP surveillance cameras are distinct targets for the following reasons: Constant connectivity Like many other devices, IP cameras need to be internet-connected to function properly. However, exposure to the internet also makes it easy for hackers to find the cameras and potentially exploit the devices. Once hacked, the devices will be able to serve the hackers’ needs. Low hacking investment Unlike with hacking a PC, once hackers see a way to break the security of an IoT device such as an IP camera, the same approach can usually be applied to other devices of similar models, resulting in a very low per-device hacking cost. Lack of supervision Unlike PCs, especially those used in offices, IP cameras have low user interaction and are not well-managed in terms of security. Installation of an after market anti-malware application is not available either. High performance The idle computing power of an IP surveillance camera is usually good enough to perform hacking-related tasks such as cryptocurrency mining, and without being noticed by end users at that. High internet-facing bandwidth The always-connected, fast and huge bandwidth designed for video communications makes for a suitable target for hackers to initiate DDoS attacks. Typical attack chain The typical attack chain around IP surveillance cameras consists of the following steps. 1.      Initial infection After locating a device with open ports such as Telnet, Secure Shell, and Universal Plug and Play (UPnP), the attacker uses the device’s default credentials (as with Mirai), or exploits un-patched system vulnerabilities (as with Persirai and Reaper) to gain access control. 2.      Command and control After gaining control of the device, the attacker downloads and executes malicious scripts or samples that report to the command-and-control (C&C) server. That server issues commands instructing the affected IP camera to perform malicious activities such as cryptocurrency mining or DDoS attacks on other devices via user datagram protocol floods. 3.      Propagation Depending on its kind, the malware used can scan the network and employ the same infection methods to propagate itself to other vulnerable devices. The attacker can trigger this action automatically (as in the case of wormlike botnets), or manually by receiving instructions from the C&C server. Risks to public and closed networks Most home IP cameras offered in the traditional, doit-yourself (DIY) consumer market are connected directly to the internet. This means that home IP cameras are exposed to the internet at a very similar level as personal computers in homes, but lacking the user capability to install security software. Although home IP cameras amount to only a small portion of all installed devices, they make up a fast-growing market because of their increasing affordability and accessibility to the general public. On the other hand, many people claim that IP cameras are not exposed to that level of risk because most products are usually designed for enterprises, which basically deploy IP cameras in local area networks and make them unsearchable on the internet. This claim may hold true, but it may overlook several real-world factors: The system integrators may not install the IP cameras as expected. In many cases, people just choose whichever approach is more convenient for them to install everything and get the devices working. Ease of maintenance is another incentive for them to do so. This explains why the IP addresses of many IP cameras that are supposed to stay in a local area network can still be found. The business model around IP cameras is changing. Service providers are using IP cameras to run customized services (such as elderly care), and making the cameras available on the internet is the easiest way for both users and remote operators to access the cameras as needed at the same time. Modern value-adding functions such as video analysis features are often deployed in the cloud to reduce the overall hardware and software costs, with the flexibility to switch specific features on or off, or to add a new feature regardless of the hardware performance of the cameras. Hooking up IP cameras to the internet at large is a clear trend. Given the considerable number of IP cameras deployed globally, a small portion of IP cameras that expose themselves on the public domain can serve as a great incentive for hackers. Another thing to consider is how network isolation is one of the frequently mentioned approaches for cybersecurity. Being in a local area network though, does not guarantee the protection of IP cameras against hacking. For one thing, well-designed malware can easily spread across the local area network, and any portable device brought into the same local area network can easily turn into an infection vector. Take the infamous Mirai botnet as an example – a Windows-based trojan plays an important role to distribute it, even though the targets are…

Read More