Page 50 - Security Today, April 2019
P. 50

whitelisting to restrict traffic to known networks, locking down ex- posed network connections, and enforcing password complexity to stop default and common password usage.
Monitor all assets. Once detected, automation can passively moni- tor all assets 24/7. Yet monitoring to the server or switch is insuf- ficient. Visibility is needed down to the IoT device to provide notifi- cations when devices have vulnerabilities or performance problems.
Automated cyber protections can monitor network flows, detect abnormalities, and respond immediately to suspected attacks. These tools can be configured to look for events such as cable changes, device disconnections, changes in data flow and direction, abnormal band- width and power consumption, and camera image quality changes.
When abnormal behavior is detected, automation technologies can generate alerts and take proactive interventions such as disabling a device’s data or power port. For example, is that camera that just went offline for a second a momentary glitch, or a hacker plugging in a laptop?
Cyber monitoring is most effective if it is integrated with the exist- ing dashboards used to monitor physical security systems. For many systems, the video management software or central station alarm software is the primary health dashboard. Other physical security systems are integrated with IT-oriented tools such as network moni- toring systems.
Automation Today
Physical security pros can take the same approach as CSOs who are investing in automation technologies to evolve their security programs. CSOs recognize that innovations in AI, machine learning, and auto-
mation can bridge their gaps in expertise and the sheer manual labor required to properly secure their IT assets. According to Accenture’s 2018 “State of Cyber Resilience” report, 40 percent of CSOs are invest- ing in automation and more than half are investing in IoT security.
The physical security industry does not have enough of these auto- mated tools, but some early models have emerged. For example, Axis’ Device Manager has evolved to facilitate device discovery and device hardening functions for Axis branded cameras, access control, and audio devices. Razberi’s CameraDefense cybersecurity solution auto- matically discovers, hardens, and monitors cameras and IoT devices.
Integrating these types of tools with existing security manage- ment tools can help provide comprehensive coverage of the physical security ecosystem. A single management and operational dashboard creates a more efficient workflow to address cyber threats within the surveillance system infrastructure. For instance, alerts from Razberi CameraDefense are supported by video management systems such as Milestone XProtect or IT network tools such as SolarWinds.
It is time for the physical security industry to take control of its own destiny. See no evil, hear no evil, speak no evil is not a security strat- egy. Working more closely with IT to secure the burgeoning number of IoT devices is imperative. Applying automation
to physical security can ensure that best practices are done correctly and at scale, saving staff hours, preventing cyber attacks, and avoiding adverse im- pacts to bottom lines and reputations.
Tom Galvin is the Chief Product Officer for Razberi Technologies.
CYBERSECURITY
Online Security Technology Training
Take charge of your security technology training with our online training courses.
Train as an individual or implement a companywide program with a Corporate Account.
42
Our courses are suitable for everyone in the security
industry. They are available 24/7, making it the most
convenient and cost effective solution for anyone
who wants to improve security knowledge or skills.
Approved for Continuing Education (CE) by various + security associations and government bodies, the
courses include:
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology
Register today atsecuritytodayacademy.com Go to sp.hotims.com and enter 34 for product information.


































































































   48   49   50   51   52