Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information.
The IDIS three-part cybersecurity protection system protects your data securely.
Network security through a powerful mutual authentication system
DirectIP® is a proprietary mutual authentication system, supported by all IDIS IP products.
When IDIS IP cameras are connected to an IDIS NVR, both devices mutual authenticate each other automatically through DirectIP. The authentication data is stored and protected on both the IP cameras and the NVR.
Firewalls On NVRs
Firewalls on NVRs utilizing IP and port authentication system
IDIS NVR products have their own firewalls installed that uses IP, MAC address, port and ICMP authentication.
The firewalls on IDIS NVR products are designed and configured to prevent unauthorized access.
Multi-factor authentication system utilizing user accounts and registered mobile apps
Two-factor authentication (2FA) is a type of multi-factor authentication system. The user must be certified by the IDIS “Mobile App” in addition to going through the usual login process by typing in a user ID and password.
All IDIS NVRs safely protect user accounts utilizing 2FA.
( Transport Layer Security )
Data transmission security system combining IDIS’s proprietary technology with TLS
TLS (Transport Layer Security) is a cryptographic protocol designed to provide communications security and data integrity over networks. Integration of TLS into IDIS's proprietary data security solution minimizes performance impact on video surveillance data transmission.
TLS helps prevent many potential malicious activities, including data snooping, alteration, or destruction of data during transmission over networks.
( For Every Network Security )
Access and data transmission security system over a public network
FEN is access and data transmission security system independently developed by IDIS using P2P technology.
FEN is an automatic network access system. Expert knowledge of routers or NAT devices isn't needed to set up the system
(FEN utilizes Edge TLS for UDP hole punching and port relaying.)
Protect data using IDIS’s proprietary database system
iBank is a database system, independently developed by IDIS, specifically for video recording. This system maximizes storage efficiency and enables fast data processing.
In addition, storage devices that implement the iBank solution cannot be read by external devices such as PCs, keeping the data safe from forgery and alterations.
iBank is used in all of IDIS’s recording systems.
Preventing data forgery and maintaining data integrity
Chained Fingerprint extracts distinctive features of recorded video data to use as “Digital Fingerprint” and “Embeds” each fingerprint into the data of the next frame, connecting each frame by frame like a blockchain. Video data created technology can be submitted to courts as evidence.
Chained Fingerprint is a highly efficient technology that verifies the integrity of data, proving it to be authentic.
Edge Encryption Recording
Efficient and powerful technology for encrypted video data recording
Edge Encryption Recording technology encrypts the video data at the IP camera before storing and sending it over the network. Therefore, additional encryption and decryption processes on storage systems are not necessary.
The encrypted data is recorded directly to the SD cards and HDDs, so reading and altering stored data is impossible even if the SD cards or HDDs are stolen.