TRINET TECHNOLOGIES PTE LTD
Are your CCTV protected? Do you feel like you are being watched instead? With the rise of cyber security threats, CCTV systems are also targeted by hackers. With the increase in data breaches and attacks, stringent regulations have also been made to ensure data security compliance. Moreover, those found to be in breach of the Personal Data Protection Act in Singapore could be fined up to $1 million.
Due to cases of cyber attack threat against a video surveillance system has greatly increased, making cyber security a top area of concern for customers and operators.
Let us introduce you to the IDIS total solution Featuring a comprehensive approach to provide maximum cyber security to users, it incorporates enhanced secure data access, data transmission and recording.
Network security through a powerful mutual authentication system
When cameras are connected to the DVR, both devices will mutual authenticate with each other through DirectIP. Authentication Data is stored and protected in both the cameras and NVR.
Multi-factor authentication system utilizing user accounts and registered mobile apps
In order to access the system, the user must be certified by using the IDIS “Mobile App”. With the two-factor authentication, user accounts are safely protected.
TLS ( Transport Layer Security )
Data transmission security system combining IDIS’s proprietary technology with TLS
The TLS minimizes performance impact on video surveillance data transmission and helps prevent many potential malicious activities, including data snooping, alteration, or destruction of data during transmission over networks
FEN Security (For Every Network Security)
Access and data transmission security system over a public network
FEN is an automatic network access system. Expert knowledge of routers or NAT devices isn't needed to set up the system
Protect data using IDIS's proprietary database system
iBank maximizes storage efficiency and enables fast data processing. Besides, storage devices that implement the iBank solution cannot be read by external devices such as PCs, keeping the data safe from forgery and alterations.
Preventing data forgery and maintaining data integrity
Chained Fingerprint is a highly efficient technology that verifies the integrity of data, proving it to be authentic. These video data can be submitted to courts as evidence if needed
Efficient and powerful technology for encrypted video data recording
Edge Encryption Recording technology encrypts the video data at the IP camera before storing and sending it over the network. The data is recorded directly to the SD cards and HDDs, so reading and altering stored data is impossible even if the SD cards or HDDs are stolen.
By Michelle Choo