IDIS Video Technology Tops Public Cybersecurity Demonstration

White hackers fail to breach IDIS cyber-defenses at the ESS+ exhibition while exposing competitor vulnerabilities.

IDIS Video Technology Tops Public Cybersecurity Demonstration

Photo courtesy of IDIS

COPPELL, TexasIDIS video technology’s reputation for robust cybersecurity was given a further boost last month in a series of ethical hacking attempts at the ESS+ International Security Trade Fair in Bogotá, Columbia, which attracted more than 15,000 visitors and 150 exhibitors.

IDIS was one of three vendors willing to submit their technology for a public Video Security Product Hacking event and defeated all attempted attacks.

There has been growing concern about the vulnerability of surveillance systems to malicious hacking in recent months, with several high-profile breaches, and the broad nature of current cyber threats was reflected in the 10 attack types featured in the tests:

  • Identification and enumeration of devices;
  • Port and service scanning;
  • Software vulnerability analysis;
  • Penetration testing;
  • Brute force testing;
  • Network protocol analysis;
  • Man-in-the-middle attack testing;
  • Denial of service (DoS) testing;
  • Privilege escalation testing, and
  • Data security testing

The IDIS NDAA-compliant products subjected to attacks by professional ethical hackers were an IDIS DR-6516P 6500 series H.265 4K recorder, and an IDIS 4K vandal-resistant IR dome camera (DC-D4831HRX), popular hardware options that make up IDIS DirectIP plug-and-play and end-to-end video solutions, extensively in commercial and government applications.

More About IDIS Video Technology Products

All IDIS video technology benefits from multi-layered cyber protection. IDIS DirectIP assures true plug-and-play connection of all devices with instant operability of cameras.

NVRs ranging from 4 to 256 channels are protected by firewalls and two-factor authentication, eliminating complexity and the potential for human error associated when engineers need to manage manual passwords when installing multiple cameras.

IDIS’s FEN (For Every Network) technology is an advanced DNS service which enables users to set up remote monitoring without knowledge of NAT routers, making system configuration easy with one-click connection – it is protected by Secure Data Transmission (Transport Layer Security).

iBank, IDIS’s proprietary multimedia file system and database architecture, is not based on off-the-shelf software and provides the most robust, cyber secure data recording, searching, and management platform.

And the integrity of all video evidence is protected by IDIS Chained Fingerprint technology, which makes undetected attempts and forgery or image tampering impossible.

“IDIS led the industry in recognizing the importance of cybersecurity, and from the early days of IP video we built in the strongest, multi-layered defenses against hacking attacks and other cyber threats,” says Joon Jun, president of the global business division and senior executive vice president, IDIS, in the company announcement.

“With growing awareness of the risks associated with network surveillance systems, and the vulnerabilities posed by some other brands, we continue to invest in the most robust protection to give our users complete confidence as demonstrated by this public testing at the ESS+ event,” he says.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.

A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters