![]() When I look at the breaches this year alone, VMware, Orion, verkada, ms-exchange, Facebook, BGP leak earlier this week, coupled with the cyber threat landscape im more comfortable silo’ing off my security systems and managing them internally, any wan connectivity from the outside world requirements will leverage vpn with strong encryption to get the outsider into the local area network where even when leveraged will be segmented, this is the only way I can reasonably protect my customers, protecting physical security assets using vendor systems is just as important as protecting the logical networks they reside on. The Avigilon Control Center Gateway software works with the Avigilon Control Center Mobile (ACC Mobile) app and the Avigilon Control Center Gateway Web Client to give users remote access to your Avigilon Control Center system. This is a maintenance release of ACC 7.12 that includes a number of performance and stability fixes - ACC Mobile 3 app, alarms, Avigilon Cloud Services (ACS), Active Directory, Site Families, LPR, or server-based analytics such as Appearance Search, Face Recognition, and No. Where this becomes viable (my opinion) is at under 20 camera in a non critical environment which doesn’t have a requirement for 100% uptime, and no failovers and redundancies on the wan link. Here are ACC 7 features: ACC 7.12.2.46 - released March 8, 2021. Leveraging technologies like SD-Wan, software defined networking, dark fiber, mpls, redundant links, ect could make it viable but the cost benefit diminishes over time in comparison to onprem, specifically when it comes to 300+ cameras.Ĭloud based has a use case however if I have a site running 50+, 3MP 15fps, h265/hevc would require 64mbps constant, with failover and load balancing, along with a buffer not including the customers wan requirements. And while Onprem is breachable there would be physical barriers to get through rather than logical.Ĭloud is someone else’s computer that is in some unknown location, furthermore the link between the customer to these cloud services require internet with maximum uptime/utilization rates which seen unrealistic to large enterprises. ![]() Verkada, was compromised due to a weak exposed password on its camera systems that require cloud connectivity therefore “internet” to work.īoth these breaches were the result of some negligence on the part of the vendor but wouldn’t have occurred on a conventional cctv “closed circuit network surveillance system” of which many integrators including myself swear by. There are some docs that explain a bad commit which pushed out compromised code as well, but not corruption this was deliberate. Solarwinds was compromised due to a weak password on the Orion backend, which the ceo tried to blame on a intern.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |