Jump to navigation

Home
  • PRODUCTS
    • Surveillance Systems
      • Geovision
        • IP Camera
        • Recording Systems
        • PoE Switch
        • Video Management
        • Video Capture Card
        • Video Server
        • LPR/ANPR
        • Hardware Accessory
    • Access Control
      • Geovision
        • Controllers
        • Accessories
        • Readers
        • Software
  • PROJECTS
    • Airports
    • Banking
    • Education
    • Entertainment
    • Government
    • Hotel
    • Industry
    • Retail
  • SOLUTIONS
    • Access Control
    • Airport Surveillance
    • Banking Surveillance
    • City Surveillance
    • Hotel Surveillance
    • Retail Surveillance
  • DOWNLOAD
    • Softwares
      • GV-Access for Android
      • GV-Access for iOS
      • GV-VMS
      • GV-Recording Server
      • CMS Lite
      • CMS Server
      • GV-ASManager
      • GV-AView for Android
      • GV-Backup Center
      • GV-CMS
      • GV-Center V2
      • GV-Center V2 Pro
      • GV-Cloud Center
      • GV-Control Center
      • GV-DVR
      • GV-Data Capture V3.1
      • GV-Dispatch Server
      • GV-Eye for Android
      • GV-Eye for iOS
      • GV-Failover Server
      • GV-GIS
      • GV-Hybrid DVR
      • GV-LPR
      • GV-Mobile Server
      • GV-NVR
      • GV-POS S/W Capture
      • GV-POS Text Sender
      • GV-Redundant Server
      • GV-Selector for Android
      • GV-Selector for iOS
      • GV-Video Gateway
      • GV-Video Wall
      • GV-Vital Sign Monitor
      • GV-Web Report
      • GVcloud NotifyApp for Android
      • GVcloud NotifyApp for iOS
      • GV‐Edge Recording-Mac
      • GV‐Edge Recording-Windows
    • Presentations
      • Geovision
        • Geovision VMS Pro
        • Geovision New Target Series
        • GV-PoE-extender
        • Geovision LPR Solution
        • GV-NVR Catalogue
        • Presentation 2016
        • GV-NVR Partner Catalogue
        • Catalogue 2014
    • Advertisements
      • Geovision
        • GV-VR360
    • Videos
    • Forms
      • Register Project
      • Partnership
      • Guarantee
  • REPORTS
    • Articles
    • News
  • ABOUT US
    • Introduction
    • Our Brands
    • Certificates
    • Distribution
    • Exhibitions
    • Publish
    • Media
  • SUPPORT
    • FAQ
      • Compact DVR & Video Server
      • DVR Capture card,Accessories
      • DVR/NVR Playback
      • DVR/NVR Software
      • IP Camera
        • Question Number 1
        • Question Number 2
        • Question Number 3
        • Question Number 4
        • Question Number 5
        • Question Number 6
      • Remote/Mobile Viewing
      • Retail Solution,POS integration
    • Guarantee
    • PARTNERS
    • RMA
    • Sales
    • Servises
    • Shipping
    • Training
  • TECHNOLOGIES
    • geovision
      • AI-LPR Geovision Solution
      • Emergency Lockdown/Unlock
      • GV-CS1320 Camera Reader
      • GV-LPR1200 LPR Camera
      • GV-NAS2008
      • GV-PPTZ7300 IP Camera
      • GV-SD2301 PoE
      • GeoVision Smart Factory
      • Geovision 12Mp Series
      • Geovision BuildingAutomation
      • Geovision Cloud Cameras
      • Geovision Decoder Box
      • Geovision End to End Solution
      • Geovision GV-AI FR
      • Geovision GV-AS1520
      • Geovision GV-CS1320
      • Geovision GV-Live Streaming
      • Geovision H.265 SNVR
      • Geovision H.265 Series
      • Geovision H.265 Solution
      • Geovision LPR Solution
      • Geovision PN400
      • Geovision PPTZ7300
      • Geovision PTZ+FISHEYE
      • Geovision Parking Solution
      • Geovision Pinhole IP Camera
      • Geovision-IPAS 2017
      • Introducing GV-VMS V.18.1.
      • Introducting GV-AI Server
      • Panoramic PTZ Series
      • Star Light Target
      • ntroducting GV-AI Server

Search

Shopping cart

Your shopping cart is empty.

User menu

  • Register
  • Login

Iot and its Values

Iot and its Values

Submitted by mohamadaliakbari on Wed, 12/09/2015 - 15:27

As security migrates towards IP, devices and solutions bring additional value to users. Not only have they served their foremost function – protecting lives and assets – well, as connected devices under the IoT framework they also provide useful information that helps boost management efficiency and drive business intelligence.

The Internet of Things delivers a previously unforeseen wealth of data about our physical spaces. It is tied to security because it makes our physical world safer, more comfortable, and more user-friendly. Security devices and sensors, such as IP video cameras and access control readers, are important components in collecting information about our physical spaces beyond security-related events. When investing in a security system, other company stakeholders – that is, marketing, sales, and operations departments – can share in the cost and benefit from the system’s deployment. Therefore, there is an opportunity for security departments to evolve from a cost center to a value center for their organizations.

Examples are numerous. Retailers can benefit from consumer behavior information security devices bring. Access control and building automation integration helps with energy savings and effective management. Smart cities can better control traffic, the environment, and power usage through connected sensors and devices.

To be successful, a deployment using the IoT needs to do more than just collect a data. It needs to have a concrete way to convert that data into information, and provide insights that have business value.

By having smarter devices at the edge and using software or a platform that presents the collected data intelligently, we can ultimately provide users with valuable insights.

Yet the dark side of everything connected together is the system’s vulnerability to hacking, as underscored by various reports on intrusion into network devices.

We must recognize that as they grow in power, sensors increasingly become targets for hackers. They can act as the final target or, even worse, as a ‘Trojan horse’ to infect the broader network.Since these devices are in contact with enormous amounts of data, and may even share a physical network with the ‘normal’ network, we need to pay close attention to information security concerns.

Organizations must take a defense-in-depth approach. That way if an attacker hits a barrier at every layer, they will be less likely to go further. Such approach includes several steps, which are listed below:

 

  • The first line of defense for data security is to use strong passwords, even for devices that are believed to be on an “isolated” network. Internal staff may inadvertently introduce malicious software to the network, or even allow access to someone posing as a service provider.
  • The second line of defense is up-to-date software, and for the physical devices on the IoT, that means up-to-date firmware. Most manufacturers will quickly provide updated firmware when a specific vulnerability is disclosed to them.
  • Another important defense is to protect the firmware on devices from tampering. If a hacker can gain access to a device and then load their own firmware, then they can create their own vulnerability.

 

Source: a&s Magazine

برچسب‌ها: 
Access Control, IP camera, IOT
  • Log in or register to post comments
  • CONSULT PLAN
  • REGISTER PROJECT
  • SELECT PRODUCT

FOLOW US

NEWSLETTER