Security Dealer & Integrator

JUN 2017

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: http://sdi.epubxp.com/i/835749

Contents of this Issue

Navigation

Page 36 of 59

June 2017 www.SecurityInfoWatch.com / Security Dealer & Integrator 37 Consequently, the physical security industry is lagging; in fact, when it comes to cyber protection, secu- rity devices, attack protocols and overall defenses may be 10-15 years outdated. Leveraging a VMS for Cybersecurity Misconceptions about effective defense strategies have additionally hindered cybersecurity advances in physical security equipment. Prior to the increased demand for system integration and transition of devices from analog to IP, security con- trols were predominantly viewed as disconnected – CCTV cameras ran on exclusive analog signals, access control mechanisms operated on an isolated network, and people gen- erally believed that anything held inside a physical building was safe. is became known as "hard shell" security, which refers to the assump- tion that the outside physical wall protects everything. Unfortunately, this technique is simply no longer relevant in an era where infected USB drives can be directly plugged into a server, cam- eras can be hacked via web server attacks, and users can accidently infect an entire network with mal- ware in seconds by opening an email or using an internet browser. To adequately address both the cyber and physical security issues of today, integrators and their cus- tomers must implement a solu- tion that incorporates a structural approach that covers all the system's end-points. As cyberattacks become increas- ingly sophisticated, having the capacity to effectively manage and protect a large population of devices on one system through a VMS is essential. As part of an enterprise security system, the VMS acts as a centralized data hub located at the solution's core. It is capable of pro- viding an excellent view into the entire infrastructure, with regular assessments of device behavior, oper- ations, general system health and more. However, this ability to access every part of the network is a dou- ble-edged sword, as it also makes the VMS a primary target for attacks. Both end-users and integrators are looking to vendors for direction on how to combat this challenge. In terms of cyber, both the physical security devices and VMS itself are being attacked; thus, an organization can only truly be defended by secur- ing both ends. Multi-Layered Defense While ensuring a VMS is developed from the beginning with cyberse- curity at top of mind is crucial, it is just as important for integrators to create a system in which regularly scheduled malware defense and so- ware updates can be automatically applied. is preventative measure minimizes the amount of time a sys- tem is vulnerable and helps protect against the extensive, diverse and unpredictable repertoire of today's cyber attackers. ere have been some cases where an individual has actually pulled a camera from a wall and unplugged it to utilize the network connection for a laptop computer. Occurrences like these and others make setting up net- work security systems updates and features like firewalls a strategic must. Deploying a multi-layer solution that maintains a secure connection end- to-end, and conducts constant mon- itoring and enforcement of elements such as encryption keys, security certificates, and admin credentials is imperative. "In short, a complete cybersecu- rity solution needs a VMS that can be self-sufficient," explains Rodney ayer, renown network infrastruc- SECURITY THAT SCALES WHEN SECURING A COMMERCIAL PROPERTY, GO WITH AN INDUSTRY LEADER AND GO WIRELESS. Intrusion Alarms, Panic Alarms, Environmental Sensors • Simple and flexible integration • Single facility to campus coverage • Mission-critical reliability View our entire suite of wireless security products at: www.inovonics.com/sts5 It just works. www.SecurityInfoWatch.com/10213994

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUN 2017