Surveillance Access Management
Prevent and Protect the IoT Environment
from varied security attacks
A Robust Solution to secure existing Surveillance Systems and reduce the attack surface
Video surveillance systems have been integrated into the Internet of Things during the previous decade (IoT). Surveillance technology has progressed from analogue to packet-switched systems during the previous few decades. The adoption of IP-based wireless CCTV cameras is becoming a trend in the current environment due to technological advantages such as flexibility, simplicity of use, and cost. These IP-based surveillance systems are extensively used in crucial locations such as home security, industrial buildings, petrol stations, public transit, banks, ATM centres, city centres, airports, and public highways, and they serve an important role in securing essential infrastructures.
Unfortunately, like with other IoT systems, there are inherent security concerns that can lead to serious breaches and hostile assaults. IP-based systems have varied topologies and technologies, making them significantly more complicated and resulting in a much broader attack surface. (e.g. access control systems, Wifi, multiple servers, network topology, gateways, etc.) Because these systems are vulnerable to a variety of threats, recognising them and evaluating appropriate security measures is critical.
What is an IP Camera?
An Internet Protocol Camera, often known as an IP camera, is a digital video camera that, like a webcam, transmits and receives data over a network (or internet). Unlike a standard camera, it is a piece of stand-alone equipment with its own IP address that requires nothing more than a network connection to relay images/video.
How does an IP Camera work?
IP cameras take images in much the same manner as digital cameras do, but they compress the files before sending them over the network. IP cameras can be utilised with a wired network linked via Ethernet cable to a broadband modem or router, or wirelessly with a WiFi router. Most IP camera setups use a PoE Switch Environment to reduce wire costs.
Introduction to Surveillance Access Management
Information Security and Access Control are the two most essential components for a robust IT ecosystem. Manually managing each IP Camera becomes a long-drawn process. As a result, remembering different credentials as well as their URLs for respective IP Cameras becomes cumbersome and frustrating for a user. Furthermore, more than 60% of Installations continue to have OEM given Default Passwords and also at times note them down on paper or in excel, thus increasing credential theft probability. Hence, robust surveillance access management is essential to thwart insider threats, third-party risks and advanced cyber-attacks. Access Management practice helps to ensure that any unauthorized access to target IP Cameras is denied.
- IP Camera Onboarding
IP Camera Onboarding allows administrators to seamlessly add new IP Cameras and map them with user accounts on ARCON | SAM. It enables administrators to auto-provision and de-provision users or devices by interacting with the active directory. With user onboarding, organizations can ensure that all information collected while onboarding stays confidential and locked in a virtual database and out of reach from any kind of physical or unauthorized access.
- Single Sign-On
The solution provides Single-Sign-On (SSO) features to connect to a different category of IP Cameras without entering the login credentials. These are ready built-in connectors for all standard industry IP Camera systems.
- Multi-factor Authentication
User account access requires well-established identity references (validation) for users accessing critical IT components. Multi-factor authentication (MFA) provides a robust validation mechanism. The solution’s MFA functionality acts as a strategic entry point to identity management systems and helps in managing system based users. ARCON offers native software-based One-Time-Password (OTP) validation to begin a privileged session and the tool seamlessly integrates with disparate third-party authentication solutions such as Gemalto, RSA, Vasco, 3M, Precision, SafeNet and Safran.
- Session Monitoring
Session monitoring provides auditing and monitoring of user activities around the enterprise IT network. This feature enables the IT security team to spot any suspicious activity around user accounts.
- Password Vaulting
Password vault secures all the passwords and stores them in a highly secured electronic vault. The storage methodology is proprietary and is highly secured by several layers of protection that ensures a virtual fortress. The password configuration is parameterized such that the user can select the appropriate parameters based on the IT Security Policy of the organization. The electronic vault provides authorized access to these passwords.
- Password Management
A highly mature password management module that generates strong and dynamic passwords and the engine can change passwords for IP Camera Systems at one go. ARCON’s Password management is one of the strongest modules in the industry. The password communication between the ARCON client and ARCON server is in AES-256 encrypted form. Password changelogs are also generated and are tamper-proof.