Double-Edged Sword
Many industries spend a substantial amount on security cameras to monitor premises. Most IP-based cameras are designed to support open standards, meaning their architectures are av...


Many industries spend a substantial amount on security cameras to monitor premises. Most IP-based cameras are designed to support open standards, meaning their architectures are available on the internet for anyone to read. Compatibility can be a double-edged sword and the downside means that not every surveillance camera on the market is secure.
In times of trouble, a large investment in an IP-based surveillance system is often justified by the device's ability to provide crucial video evidence. "But not every surveillance camera on the market is secure", explains Dr. Wallace Ma, CMO of TeleEye Group.
The Reality
Hacking into live feeds of IP cameras or seizing control of the system to zoom into objects on the premises without the security staff noticing may seem like scenes from a movie. In reality many open-system IP cameras installed in banks, retail stores or government buildings are often susceptible to hacker attacks.
How?
Most IP-based cameras are designed to support open standards. Free access to these architectures on the Internet mean that they are intentionally there for anyone to read. For those without any knowledge of hacking, the web abounds with help. Instructive videos on how to hack into a live IP camera and how to view confidential security camera streams are easily accessible on the Internet. This vulnerability is the
equivalent to leaving the back door wide open for criminals.
The Solution
TeleEye have designed a unique 5-level protection into their IP cameras to prevent intrusive activities
- A set of special video streaming protocols provide extra security during internet transmission.
- AES 256-bit encryption, which is also adopted by the US government to protect their critical data.
- Giving individual identities to all hardware and software applications to restrict unauthorised access.
- Allow only designated IP addresses to access the cameras.
- Protect visual data in a proprietary HD SMAC-M format.
To learn more about TeleEye Hacker Resistant technology, please visit TeleEye at Security Essen, Booth Number: 502G, Hall 3. On 23rd- 26th September 2014 or www.TeleEye.com
Business Partner
TeleEye
Taiwan
most read

Panomera S4 Perimeter: For Sterile Zones and CRITIS Applications
Dallmeier has introduced the Panomera S4 Perimeter. The ‘Perimeter Panomera’ combines four sensors in one optical unit, which provides a resolution of 200 effective megapixels – MPe – per camera.

GIT SECURITY AWARD 2025 - The Winners
The industry is alive - and more innovative than ever. Read here who wins a GIT SECURITY AWARD 2025 and why.

The NEXOSPACE Suite from Bosch Gets the Best out of Fire Systems
GIT SECURITY International found out about the Bosch NEXOSPACE suite that provides the human interface from Theresa Kramer and Stefanie Steudel from the company’s Building Technologies division.

The Right Bits – Interview with Kelly Gill, CTO at Assa Abloy
Kelly Gill, CTO at Assa Abloy Opening Solutions EMEIA, discusses with GIT SECURITY the enduring importance of mechanical locking and how it enables the latest innovations in digital access technology.

Safety Solutions for the Westminster Palace
The Bosch subsidiary Protec has equipped the entire grounds of Westminster Palace with fire and voice alarm technology.