Security Technology Executive

MAY-JUN 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/994589

Contents of this Issue

Navigation

Page 7 of 79

8 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. SecurityInfoWatch.com CONVERGENCE Q&A By Ray Bernard PSP, CHS-III • Email: ConvergenceQA@go-rbc s.com. How can we manage the firmware updates and user account passwords for our 357 network cameras? Right now, it's a 100 percent manual task, and we are not able to keep up with it. Most organizations with large numbers of cameras can't keep up without incurring a huge labor cost that's out of proportion to the cost of the camera system. It's typically been a lost cause. Now, however, if you have AXIS cameras with firmware 4.40 or later, you can use the newly- released free AXIS Device Manager software. This is the biggest news for video surveillance systems that the security industry has seen since the network (IP) camera was introduced by AXIS in 1996. The AXIS Device Manager (https://www. axis.com/us/en/products/axis-device-manager) is an on-premise tool that positively impacts several aspects of camera management: • Cybersecurity: A network of thousands of cameras can be automatically hardened per the Axis hardening guide and kept up to date with automatic firmware updates. Device Manager enables centralized IP address management, account, password and digital certificate man- agement for HTTPS and 802.1x certificates. • Documentation: Device Manager automati- cally scans the network and locates all online AXIS devices, including audio and access con- trol devices, creating a database of devices and their configurations. I c o n s t a n t l y r e c e i v e t h i s s a m e q u e s t i o n a t s e c ur it y c o n f e r e n c e s , a n d I h e a r t h e m in di s c u s s i o n s w h e n e v e r t h e s ub j e c t o f c a m e r a m a n a g e m e n t i s r a i s e d b y p e o p l e w h o a r e r e s p o n s ib l e f o r h un dr e d s , t h o u s a n d s , o r t e n s o f t h o u s a n d s o f c a m e r a s . How to Manage High-Camera-Count Deployments • Backup and Restore: Camera configura- tion settings can be backed up for later quick restoration. • Deployment: Settings from one configures camera can be partially or completely copied to multiple other cameras. • Auditability: Device Manager maintains an activity log with sort and search functions showing performed actions and changed device status. • Total Cost of Ownership: The manual labor involved in deploying and maintaining cam- eras is significantly reduced. I have seen the embarrassment caused to secu- rity managers and directors, when they have had to explain to IT personnel or higher-ups that the camera system in which their organization has invested hundreds of thousands to millions of dol- lars doesn't meet IT department requirements, can't be secured like the organization's other computer and network systems are, and has huge labor costs involved in keeping the camera firmware up to date. Now, this can come to an end. Moving Beyond the Status Quo At one-time system, security was mostly thought of as "bolted-on" protection rather than something built into products. That is outdated thinking. For over a decade after network cameras were intro- duced, if you questioned a camera vendor about camera cybersecurity weaknesses, the standard vendor reply was, " We expect you to install the cameras on a secure network." From a historical perspective, this is understandable, due to the decades-old mindset established by CCTV (closed circuit television) cameras. Cameras were connect- ed directly to display monitors and/or recorders. Video was viewed from a single monitoring room. Initially, network cameras were looked upon as a replacement for CCTV cameras and were installed on closed local area networks. Enterprise networks of the kind and capacity that we have today didn't exist at that time. Putting video onto a corporate network wasn't feasible. Q: A: Ray Bernard PSP, CHS-III Ray Bernard Consulting Ser v ices (RBCS; w w w. go-rbcs; 9 4 9-83 1-6788), a firm that prov ides securit y consulting ser v ices for public and private facilities. Member of the Content E xpert Facult y of the Securit y E xecutive Council (w w w.Securit y- E xecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018