Tag Archives: Security

Cyber Security Assessment

Today’s businesses are faced with unprecedented threats from sabotage, theft of intellectual property and compromised sensitive data. Have you considered how your physical security products affect your cyber security?

TSP Cyber Protection Program Flowchart

Take a look at our infographic and assessment quiz to see if you are asking the right questions and taking the next step to be cyber secure.

Access the InfographicTake the Assessment Quiz
Learn more about Tyco’s industry-leading Cyber Protection Program.

Cyber Security Language

Security breaches are in the news today more than ever before. Security integrators and security officers must work with IT departments to ensure the physical security system is successfully deployed, maintained and upgraded on the network with minimal impact and without compromising network security.

cyber crime

To create a complete cyber secure environment, IT and security departments must effectively work together. However, physical security and IT often use the same words to mean different things – resulting in everyone being confused. Sometimes security integrators and security officers even avoid the IT department due to the misunderstanding.

For example, IP may mean intellectual property to a corporate security officer but internet protocol to IT security professionals. Or perimeter may mean the exterior building wall to the security officer and network connection to the outside to the IT professional.

To make sure all departments are speaking the same, common language, we suggest developing a list of terminology definitions that everyone can use.

Terms to be Clearly Defined:

  • IP
  • CredentialsTyco Security Products Cyber Protection Program
  • Key
  • Patch
  • Firewall
  • Vulnerability
  • Social engineering
  • Perimeter
  • Intrusion detection
  • Bandwidth
  • Directory
  • Security logs
  • Revocation
  • Signature

Having a common subset of terms will help you understand how to ask the right questions and quickly comprehend the answers. After establishing your company common language, clearly explain the information you need from IT to be able to define the network and security requirements.

Learn more about the Tyco Security Products Cyber Protection program.

Cyber Protection Program – Four Features that Go Beyond Device Hardening

What Comes After Device Hardening?

It’s common knowledge that encrypted communication and other device hardening features are necessary for cybersecurity, but it’s vitally important to think beyond hardening.  Now that the security industry has adopted IP technology, manufacturers and integrators must consider not only the security operator’s needs, but also those of the IT manager.

An unsecured device can be the target of a cyber attack that might affect the entire network. While IT managers in government agencies, utilities, transportation, retail operations and financial enterprises are most acutely aware of the dire consequences of a successful hack, IT managers in all sectors are demanding security measures that go well beyond hardening before accepting devices onto their networks.

Here are four features that Tyco Security Products offers to achieve network acceptance for our Software House C•CURE 9000 Access Control Systems and American Dynamics victor Unified Video Management Systems that incorporate iSTAR controllers:

  1. Archive and Failover features to ensure continual operation and fast recovery
  1. LDAP Support to manage credentials.
  1. FIPS 140-2, Level 2, end-to-end validated encryption
  1. Network Storm Protection that ensures an iSTAR controller continues to operate during a denial of service attack.

Not every industry or enterprise requires the same security features for network acceptance. Our application specialists are available to advise which features are relevant to a specific application.

Learn more about our Cyber Protection Program and how we’re working to protect our physical security products from attacks, damage, disruptions and misuse. Watch this video to find out more about the program.

Tyco Security Products’ Connected Partner Program welcomes victor and EntraPass

Tyco Security Products adds American Dynamics victor video management system software and Kantech EntraPass access control system and Hatrix managed access control system to its Connected Partner Program.

Connected Partner Program

This program gives third-party technology partners including access control, alarm/intrusion, building management, elevator, emergency communication and RFID the opportunity to integrate with our security solutions. Our robust integration development packages, including software, documentation, sample codes and engineering support time, offer partners the tools to achieve a direct integration.

Benefits of partnering with Tyco Security Products through the Connected Partner Program:

  • Provide a unified solution to your customers and increase your business potential
  • Access to Tyco Security Products fully equipped labs
  • Easily complete the self-certification process
  • Support from dedicated Connected Partner Program, technical and engineering teams
  • Access the development system from anywhere with a remote login [Kantech only]

View the current victor integrations. Interested third-party partners can submit an online interest form.

Get started today!

If you have questions regarding the Connected Partner Program, contact us at tspconnect@tycoint.com.

Responding Rapidly to Security Vulnerabilities

While hardening is important, it does not guarantee that the device you install today will be secure tomorrow. Potential problems can lie dormant for years and then provide easy access for hackers when uncovered. For example, Shellshock was actually introduced as a product feature in 1989. Its vulnerability existed undetected in numerous products — including “hardened” versions of Linux and Unix operating systems — for 25 years. But within a single day of the vulnerability announcement in 2014, hackers reportedly were taking advantage of this critical bug.

At Tyco Security Products, we understand that a vulnerability discovered in one of our security products could potentially put your entire business at risk. That’s why we’ve put a team and process in place designed to deliver a fast, actionable response to help protect your investments from harm.

Our Cyber Protection Team continuously monitors for vulnerabilities using multiple resources. When a new bug is discovered, the Cyber Protection Team and key product engineers work quickly to tackle and resolve security concerns before they become critical to your operation.

This dedicated response enables us to create a security advisory, typically within 24 hours. The notification includes information about which products are vulnerable along with mitigation steps. It also lists products that we have confirmed are not vulnerable for greater peace of mind.

In the case of significant vulnerabilities, advisories are updated as needed until the issues are resolved. Quality engineers ensure that software patches are fully tested and validated. While we cannot predict how long it will take to resolve an issue, it took the team just two weeks to deliver patches for ShellShock and Heartbleed, both critical vulnerabilities.

BugHeart

Learn more about our Cyber Protection Program and how we’re working to protect our physical security products from attacks, damages, disruptions and misuse. You can also sign up to receive security advisories.

American Dynamics Introduces victor and VideoEdge 4.8

The latest version of American Dynamics victor and VideoEdge reduces case investigation time. Version 4.8 includes the following new features:

Download now.

Incident Management Clip Builder

Clip builder allows users to quickly edit video clips and more efficiently manage incident reporting. Users can organize video clips for investigations fasters. With clip builder, users have a single, complete, convenient location to store and view all relevant clips for each investigation.

  • Drag and drop clips into the clip builder
  • Use the intuitive red playhead line and toolbar to crop, cut, split
  • Add the edited video clip to an incident or quickly export for use with an incident report

Watch a video on how to configure the clip builder.

Incident Management Image Editor

The new image editor gives users the ability to better illustrate and call out the actions happening in a particular incident. As part of the incident management tools, users can right click on image clips to open the image and begin adding content to the clip. The toolbar at the top allows users to:

  • Crop the image
  • Add text of any size or color
  • Add shapes such as an ellipse or square
  • Save both the original and enhanced image

victor and VideoEdge 4.8

Surveillance Window Recording

Simultaneously records all streaming video in your selected layout into a single clip file. Easily create a clip Click the red button to begin and select the red button to end. Once the recording has been ended, it can be saved, saved to an incident or exported. The clip will play back exactly as it was in the surveillance window.

Watch a video on how to configure this feature.

victor and VideoEdge 4.8

Schedule Clip Downloads

The new schedule clip download tool enables operators to schedule the automatic retrieval of reoccurring video clips they need to review daily, saving on bandwidth usage and operator time spent manually queuing videos for download. Queuing regular video footage downloads such as locking a cash drawer up at the close of business, automates routine processes and increases operator productivity. Schedule clip download allows users to customize the length of the clip, saving location and clip expiration.

Custom Layouts

Users can create their own custom video layouts tailored to their own needs. By navigating to system values and video layout preferences, you can define your new layout.

  • Name your unique layout
  • Define the number of columns and rows
  • Select aspect ratio: standard, widescreen or portrait
  • Merge multiple cells together
  • Split images further horizontally or vertically
  • Add images to deactivated cells
  • Save layouts, export and easily import into other victor systems within a few clicks

4.8-Custom-Layout

VideoEdge Storage Management

Users will also be able to specify minimum and maximum camera recording rates and receive notifications in the event log on their specified levels through the VideoEdge NVR and VideoEdge Hybrid NVR Client or through victor. The new storage management feature ensures improved health monitoring and optimal storage capacity.

Enhanced exacqVision Support

victor offers enhanced camera management capabilities, including 360 fisheye camera client-side dewarping for exacqVision NVRs in live and recorded mode. Client-side dewarping records one video stream and eliminates the possibility of redundant recording, allowing users to zoom in and navigate within the image for greater detail.

victor-exacqVision-Fisheye-dewarp

Third-Party Integrations

victor is now supported by the following integrations:

  • 3VR video recorders
  • Bosch video recorders
  • Thyssen Krupp Elevators
  • Kone Elevators
  • Otis Elevators
  • Galaxy Intrusion panels

Transcoding Optimizes Video Bandwidth

Whether it’s the casino operator who needs high resolution video from more than 100 cameras or the security director who needs access to a live event from his/her iPhone and requires a real-time high quality image stream from multiple cameras, American Dynamics advanced stream management brings video transcoding to the next level.

Network Bandwidth, CPU Resources and Memory Usage Reduced

While IP video and mobile devices offer greater surveillance capabilities, these come at a price. Increased CPU bandwidth associated with today’s high resolution and full featured cameras adds overhead costs and network resource constraints.

lower bandwidth

During critical situations, users may need to access video remotely from a device that is readily available, oftentimes a smartphone or a tablet. However, when transmitting video from IP cameras to these devices, latency can occur, which delays the time between the alarm and the transmission of a usable image.

VideoEdge and victor streams are managed to provide users with video tailored to fit their physical viewing conditions. By managing the stream, network bandwidth is greatly reduced with no visible difference to the user, and CPU resources are conserved while using less client memory than possible before.

VideoEdge Transcoding Requires No Additional Server or Configuration

VideoEdge users can achieve greater efficiency and higher definition image quality while using their existing cameras through transcoding — a video stream method that reduces the scale of video, converting it to one best suited for the available network connection, such as MPEG-4 to H.264. While transcoding is not a new tool, what is different is that the optimal results now are even easier to realize with an NVR and a video management system, without the need for an extra server, new workstations or expensive super computers to run the video management system (VMS) software.

no server requiredThe automatic stream management in VideoEdge requires no additional configuration. VMS systems can automatically determine the optimal image quality required to view video from multiple, different resolution megapixel cameras on a 1080-pixel monitor.

And when end users need to access multiple views during an active security event in progress like a building alarm going off or a hostage situation unfolding, the VMS can enable access to up to four live video feeds on a smartphone — up to six on a tablet — in a format that is sufficient for viewing on mobile devices without overcompensating.

iPhone/iPad transcoding

Improves User Experience and Reduces Total Cost of Ownership

Just by leveraging the components already required for a video surveillance setup, end users can get the video quality they want in the format that works best for their requirements, when and where needed. For example, users can respond to alarms and other events on the system without being hindered by a slow client. The overall user experience with American Dynamics stream management improves usability for live and recorded video.

And that’s important these days because video systems are diverse. Users are combining multi-megapixel cameras with different bandwidth needs and viewing all of them on a single monitor.

Together, transcoding and the other aspects of optimal stream management help to balance systems, allowing the most challenging situations regarding image quality and delivery to be handled seamlessly from within the VideoEdge system. This ensures that users only have to be concerned with addressing an event as it unfolds before them.

Download our Resource Management whitepaper to learn more about stream management technology and transcoding.

Tyco Security Products Provides Complete Video Surveillance Solution

The Challenge
The new Royal Caribbean Club Casino at the Port of Spain in the Republic of Trinidad & Tabago’s city capital required a surveillance solution to easily monitor slot machines, cashiers, players and money transactions. The Casino needed a cost-effective way to utilize analog and IP video into a unified security system.

Additionally, security managers needed a way to quickly pull up video footage when they detected anomalies. Beyond monitoring the casino floor, security personnel oversee the casino entrances and parking lots.

Casino Monitors

The Solution
To meet their needs and stay within budget, Royal Caribbean Club Casino selected a complete, end-to-end Tyco Security Products video security solution. This solution created a cost-effective, seamless transition from analog to IP. Tyco Security Products’ surveillance system proved to be the most intuitive and reliable to operate. The system included:

exacqVision A-Series

Benefits
Royal Caribbean Casino was satisfied with the extreme ease of installation and use as well as the new benefits they received from their integrated security system. “The video survelliance system left a very positive impression with our Security/IT management team because of its characteristics, on-time execution and cost-effective plan,” said Alexander Calito, Royal Caribbean Club Casino Director.

Benefits of the new security solution include:

  • Combines analog and IP into one, cost-effective solution
  • Reduces investigation time on gaming table activity
  • Delivers high quality, color video images for faster identification
  • Reliable operation with no downtime or maintenance required
  • Easy for all staff members to navigate and use
  • Faster response to critical events with remote video access 24/7
  • Ensures a safe environment for visitors and staff

Learn more about Tyco Security Products solution to migrating from analog to an IP security system.

Expansion Provides Opportunity to Upgrade

Posted by Phil Dashey on Wed, Feb 18, 2015 @ 02:55 PM

The decision to move to an IP-based security platform can be triggered by a variety of things, but one of the driving factors can be a major renovation or expansion to a facility.

Having to make such a significant change in systems or surroundings gives an organization the opportunity to explore the latest technology and make investments in hardware and systems that will serve them well into the future.

man in front of cctvWhen Uniphar, a leader in Ireland’s healthcare and pharmacy sector, constructed a new 180,000 square foot distribution facility, it prompted the company to review its security strategy and replace its analog-based camera system with a new IP solution.

Going hand in hand with Uniphar’s need for a more up-to-date video system was also the desire to get more out of the surveillance platform from both a physical security and a logistics standpoint.

The same cameras and NVRs that ensure the basic security of pharmaceuticals could now be deployed to record and monitor the entire ordering process — something that was important to many of Uniphar’s customers who wanted to ensure the integrity of the order fulfillment system.

Working with its integrator, Pioneer Security, Uniphar selected a suite of Illustra cameras that included mini domes, PTZ domes, bullet cameras, IR domes and fisheyes. When completed, the new installation included more than 250 IP cameras.

Along with the cameras, Uniphar adopted the VideoEdge video management system to allow managers to monitor the order process within the warehouse from the time an order was placed and entered into the system all the way through the picking of the order.

Customers concerned about the handling of certain items, such as drugs that require temperature-controlled conditions, also can be shown how items are handled because the video management solution can easily capture and show that data — either recorded or, if customers were at the warehouse, in real time via dozens of monitors.

For Uniphar, the decision to update their system during a facility expansion showed returns far beyond just more and better cameras. The company now has the ability to review and improve its overall logistics and work with customers on addressing their needs and requirements.

And because the system is forward compatible, Uniphar can be ready for its next expansion opportunity and can easily add in cameras, recorders or monitors as required.

Security Hardening & Its Importance to Protecting Your Security System

Not a day goes by, it seems, that we are not hearing about some sort of security breach involving a major retail operation or corporation. Hackers seem determined on getting at protected data, such as credit card information or Social Security numbers, by any means possible.

For the security industry, every such attack brings new concerns about the safety of network-based systems. The network is the back door to accessing all kinds of information, whether it is financial, personal or something specific to the security of an operation.

Protecting Your Security SystemFor instance, a cyber criminal may be looking to interfere with a security system by interrupting the video stream, altering camera views so someone can make a physical attack on a location or hijacking the servers to perform illegal functions. Even a camera, if left vulnerable, may be used as an entry point to a larger network.

As a result, it is increasingly important to know what steps a security system provider is taking to ensure that its network-based equipment such as NVRs and video management system software are hardened against cyber attacks.

While the U.S. Federal Information Security Act mandates a specific level of compliance, it is critical to work with a supplier that understands what is involved in the compliance process, and is invested in taking a lead on this critical issue.

Here are some questions to ask a security system supplier:

  • How often are updates provided for the product and how are security vulnerabilities handled?  More frequent updates to the product means more opportunity to remove vulnerabilities. Also, by monitoring new vulnerabilities found through international databases a supplier can release a patch quickly to address a critical vulnerability.
  • Is the company undergoing third-party assessments of its products? Having an independent, third-party undertake penetration testing will point out what vulnerabilities exist and allow the company to take the proper action to harden the system against cyber attacks.
  • How often does the vulnerability testing take place? Each time the software within a product or system is altered, there should be a new test so the development team can address any new software issues before the product is released.
  • Has the company documented what it is doing? Knowing what the vulnerabilities are and how they have addressed them can go a long way toward ensuring your comfort level with a product. Ask if the company has prepared a white paper or some other document on its products and processes.

Cyber criminals continue to develop new methods for gaining access to information and systems. Knowing how a supplier is safeguarding its products is a good first line of defense.

 

What questions do you have about security hardening? Please leave it in the comments section below.