RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Siber: IP cameras with cyber defense

Product
Developers: Siber
Date of the premiere of the system: August, 2020
Technology: Video surveillance systems

2020: The first IP video camera with cyber defense is provided to the Russian Federation

At the end of August, 2020 it became known of creation of the Russia's first IP video camera equipped with the built-in mechanisms of cyber defense. This product developed the scientific and engineering center of technical means of protection (Research Center TSO) holdinga «siber (enters into Rostec).

According to developers, the created line of cameras excludes unauthorized access to the information systems of video surveillance functioning according to the register of critical information infrastructure. The payment with the special software thanks to which all entering and outbound traffic is transferred ciphered is built in the equipment.

The new solution provides the maximum degree of protection of information transferred from surveillance cameras. It conforms to requirements of federal law No. 187-FZ "About security of critical infrastructure of the Russian Federation", claim in Siber.

Russia provided the country's first IP video camera with cyber defense

According to the CEO of Research Center TSO Alexander Samoylovich, the solution which was created initially for use by the organizations of Rostec will be demanded at the enterprises of defense industry complex and also on any objects of information infrastructure of the Russian Federation which functioning is crucial for economy of the state: in health care, power and the transport sphere, the space-rocket and civil industry, on objects of fuel and energy complex, in bank and scientific infrastructure.

As note in Rostec, by the end of August, 2020 the majority of objects of KII are equipped with video surveillance systems using the equipment which can be cracked in several minutes. So malefactors can get access not only to data which arrive from the camera, but also to internal information resources of the organization, including to the confidential materials and documents containing personal data for the purpose of their substitution, sending for third-party resources or gaining access to a trade secret.[1]

Notes