Cybersecurity
IDIS takes a thorough and transparent approach to managing and responding to vulnerabilities in our products and services, minimizing potential risks for our customers.
Network security through a powerful mutual authentication system
Firewalls on NVRs utilizing IP and port authentication
Multi-factor authentication using accounts and registered mobile apps
Secure data transmission combining IDIS' proprietary technology with TLS
Access and data transmission security over public networks
Data protection using IDIS' proprietary database structure
Preventing data forgery andmaintaining data integrity
If you have discovered a new vulnerability in any of our products or services, we encourage you to submit your discovery to security@idisglobal.com.
The IDIS Cybersecurity Team will respond to your vulnerability submission within 7 days and aim to assess your report within the same timeframe.
After thoroughly reviewing the information you provided, if any vulnerabilities are identified, we will contact you individually with details, and you can also track the progress of your report
here.