Securing today’s networked video solutions can be a complex technical challenge. Video systems and equipment can be purpose-built with pre-hardened, securable systems. The Eagle Eye Cloud Security Camera VMS is a cyber-secure cloud-based system that replaces traditional DVRs and NVRs.
Eagle Eye video appliances provide a Bridge for receiving and buffering video, audio, alarm and event data from cameras and video encoders. Data is then sent to the Eagle Eye Cloud Data Center and Cloud-Managed Video Recorders (CMVRs) for storage. Third-party network routers, firewalls and switches are not needed. Instead, the required functionality is built into Eagle Eye’s software, ensuring the integrity of on-premise solutions.
Eagle Eye Networks, originally the first of its kind, is the leading global provider of cloud-based video surveillance solutions. They address the needs of businesses, alarm companies, security integrators, and individuals. Eagle Eye’s 100% cloud managed solutions provide cloud and on-premise recording, bank level security and encryption, and broad analog and digital camera support – all accessed via the web or mobile applications.
Simple Secure Deployment & Self-Configuring System
Securely deploying Eagle Eye’s solution is simple. Designed as a “locked down” device, there are no open ports, no inbound communications are accepted, and they are pre-configured to automatically authenticate and connect to the Eagle Eye Cloud Security Camera VMS. Cameras are auto discovered and must be manually approved before they’re enrolled to the system; no configuration is required to establish network connections. This self-configuring system is designed to eliminate the need for installers or end-users to log on to on-premise video solutions.
Camera and Data Isolation
With the system not having the typical username and password vulnerabilities, cameras are isolated from the Internet and cannot be exploited by Internet-based botnet malware or remote manual hacking attempts. Eagle Eye appliances use digital certificates to establish encrypted data connections and authenticate themselves to the Cloud Security Camera VMS in the Eagle Eye Cloud Data Center.
For off-premise recording, Eagle Eye Bridge appliances buffer video data and use Eagle Eye’s Intelligent Bandwidth Management technology to enable secure encrypted transmissions to the Eagle Eye Networks Cloud Data Center. For on-premise recording, Eagle Eye CMVRs record locally and continue to ensure cameras have no direct link to the Internet, ensuring a high level of confidentiality. Both Eagle Eye Bridge and the CMVR provide a physically separate port for cameras, so they do not reside on the general business network and cannot be reached by employees or other personnel. It also means cameras cannot be directly reached by hackers from the outside.
Real-Time Video Access From Anywhere
Thanks to mobile computing, the Eagle Eye Cloud Camera Security VMS can securely extend its always-on availability to any location where the Internet can be accessed. It also allows for the pre-designation of first responders who can receive immediate real-time security camera access during an emergency, via the free Eagle Eye Viewer mobile app or any major web browser.
First responder permission can be restricted to specific groups of cameras and admin users can specify the personnel they wish to authenticate. Cameras are kept private and only shared when an authorised user activates first responder access. When activated, first responders are sent an email containing links to specific cameras they are authorised to view. These links will open camera views in the app or web browser.
The Eagle Eye cloud-based video management system, combined with Eagle Eye purpose-built on-premise equipment provides a cost-effective way to effectively address the cyber security vulnerabilities of Internet-connected security camera systems. This well-managed subscription-based service allows for the highest levels of confidentiality, integrity, and availability of surveillance video.
Cyber Security Features
The market for surveillance cameras is competitive and includes many suppliers from different countries. It is difficult to determine the source of many camera makes and models, and to discover the level of attention manufacturers have given to camera cyber security.
Eagle Eye Network’s cloud-based, purpose-built VMS infrastructure provides high assurance of security for surveillance video using a variety of standards-based cyber security best practices. Appliances do not accept inbound connections, so hackers and botnets are not able to access the connected cameras. The firewall functionality blocks any outgoing connection attempts so if a camera is infected with malware and tries to connect to a command-and-control server on the Internet, it can’t.
The only connection Eagle Eye appliances make is an outbound connection to the Eagle Eye Cloud Security Camera VMS. This connection is authenticated using digital certificates and encrypted using Transport layer Security (TLS) and public/private keys. Public/private key encryption is where one key is kept private and only by sharing the other key (the public key) can someone gain access.
Eagle Eye on-premise video appliances are managed from the Eagle Eye Cloud Data Center and are automatically kept up to date with security and feature updates, rather than having to be carried out by staff. All servers and databases reside in multiple cloud data centers to ensure continuous system uptime regardless of the state of individual servers or data storage devices. This multi-layered approach to network security includes perimeter firewalls, network intrusion prevention systems, network address translation (NAT), and network segmentation where database servers are not visible to the public.
Camera Cyber Lockdown
Eagle Eye’s Camera Cyber Lockdown is a set of cyber security features released as part of the Eagle Eye Cloud Security Camera Video Management System (VMS). The purpose of Camera Cyber Lockdown is to significantly reduce or eliminate the impact of camera cyber security issues. With Cyber Camera Lockdown, the cameras in your surveillance system are far more safe and secure.
Live and recorded video are accessed securely via the Cloud Security Camera VMS which offers a choice between two-factor or biometric user authentication to grant user access to cameras and recorded video.
Types Of Physical Access Control Best Suited to Eagle Eye Networks
Eagle Eye Network solutions can provide buildings with notifications and video evidence of spills, blocked hallways, hallway travel hazards, and prohibited activity to help maintain a safe environment. Analysis of room usage statistics, room occupancy on certain days, times and the duration of visits can help inform daily schedules like the cleaning of a building.
IT teams can use Eagle Eye systems alongside security video surveillance to remotely inspect IT rooms and other infrastructure. Device troubleshooting can be supported by allowing the remote inspections of wiring, receiving notifications and visual evidence of physical access into IT infrastructures to see who was near a device when an issue occurred.
Types Of Business Best Suited to Eagle Eye Networks
Businesses of all types and sizes can utilise Eagle Eye Network solutions for operational optimisation and security. All Eagle Eye products benefit from a developer friendly RESTful API platform and Big Data Video Framework, which allows for indexing, search, retrieval, and analysis of live and archived video.
AI-based video analytics can detect, notify, and bookmark video evidence of behaviour on the workplace violence spectrum – from misconduct through to verbal and physical assault.
Manufacturing and Warehouse Facilities
In manufacturing facilities, like food and pharmaceuticals, video cameras are used more for manufacturing and quality control purposes than security. AI-enabled video and other sensor analytics can provide 24/7 observation that’s more economical and accurate than human monitoring.
They can also provide notification and visual evidence of adherence to safety practices, safety violations and accident near-misses, adherence to product handling practices, unusual activity by personnel, anomalies in high-speed manufacturing processes and high-speed product quality verification.
Retail Stores and Customer Services
Retail businesses use machine learning-based video analytics to analyse the behaviour and activities of in-store and service center customers and staff.
The data that can be provided includes customer journey mapping and engagement activity, time spent by shoppers at individual product displays, demographic categorisation, reactions to product displays, customer traffic patterns relating to store signage and area merchandising layouts, queue management, and more.
API and Integrations
Eagle Eye Network’s open video API has been widely adopted for integration in alarm monitoring, third-party analytics, security dashboards, and point of sale system integrations. The operating system, web server and application software are kept updated with the latest and safest solutions. API security is implemented both for Eagle Eye applications and for third-party API integrations.
If you think your organisation could benefit from a cloud-based video management solution like Eagle Eye Networks, OLS can help you install and maintain the software, alongside providing our continued support should you need it. Contact us here.