Quardzlahnn.Com

SECURITY

Image - Cyber Security

Security concerns with traditional surveillance systems

Image

Physical Vulnerability: Traditional surveillance systems rely on physical components such as cameras, recording devices, and cables. These components are vulnerable to physical tampering, vandalism, or theft. Intruders may target cameras to disable them, cut cables, or steal recording equipment, compromising the overall security of the system.

Unencrypted Video Streams: Analog surveillance systems often transmit video signals in an unencrypted format. This lack of encryption makes it possible for unauthorized individuals to intercept and view the video streams. Digital systems, on the other hand, typically use encryption to secure video transmission, protecting against eavesdropping and unauthorized access.

Limited Authentication and Authorization: Traditional surveillance systems may have limited or outdated authentication and authorization mechanisms. Weak passwords or lack of user access controls can result in unauthorized access to the system. This can lead to tampering with settings, viewing sensitive footage, or even deleting recorded videos.

Insecure Storage Media: Analog surveillance systems commonly use physical storage media such as tapes or hard drives. These storage devices may lack built-in encryption and can be easily removed or stolen. Insecure storage media poses a risk of unauthorized access to recorded videos, especially if the physical storage device is compromised.

Obsolete Firmware and Software: Many traditional surveillance systems may run on outdated firmware or software that lacks essential security updates. The absence of regular updates can expose the system to known vulnerabilities that could be exploited by attackers to gain unauthorized access or compromise the integrity of stored videos.

Lack of Redundancy: Traditional systems may lack redundancy in terms of storage and backup options. If a storage device fails or is damaged, there may be a risk of losing critical video footage. Redundancy measures, such as off-site backups or redundant storage systems, are essential for ensuring the availability and integrity of recorded videos.

Limited Audit Trail and Forensic Capabilities: Traditional surveillance systems may have limited capabilities for creating audit trails and forensic analysis. In the event of a security incident, it may be challenging to trace unauthorized access or tampering back to specific individuals or events, hindering the investigation process.

Insufficient Physical Security Measures: The physical security of the storage and recording equipment is crucial. Inadequate protection measures, such as the absence of secure enclosures or locked cabinets, can expose the hardware to unauthorized access or tampering.

To address these concerns, organizations should consider upgrading to modern surveillance systems.

Quardzlahnn offers the most advanced surveillance technology available today – Cloud Based Video Surveillance that incorporates advanced security features, such as encryption, strong authentication, regular software updates, and cloud-based secured storage.

Video is often lost

Image

Video evidence is regularly compromised because the recorder is stolen or breaks, or video is overwritten as there isn’t enough storage.

Vulnerable to infiltration

Image

Enabling remote access to a CCTV system traditionally requires port-forwarding, making it vulnerable to infiltration.

Why is Quardzlahnn more secure?

Image

Extra layer of security

The Quardzlahnn Cloud Adapter adds an extra layer of security, providing a software interface between local recording devices and the Internet.

Image

No outbound internet connection

The cameras or recorders communicate with the Cloud Adapter over the local network and don’t need an outbound internet connection.

Image

No port-forwarding required

With Quardzlahnn, no port-forwarding or router configuration is required. We use HTTPS with TLS so all video travels to and from the Quardzlahnn cloud securely.

Image

Independent software platform

All Quardzlahnn software runs on the Cloud Adapter rather than on the cameras or recorders, meaning the camera manufacturers have no access to the Quardzlahnn cloud platform.

Image

Hosted in Amazon Web Services (AWS)

Image

Along with thousands of other major brands, the Quardzlahnn cloud is hosted in Amazon Web Services (AWS). Quardzlahnn currently uses two AWS data centers, one in Northern Virginia and one in Ireland. Video is stored in the nearest data center to the customer location. 

AWS maintain stringent security standards including ISO 27001, SOC 2 and SAS 70.

Additional Quardzlahnn security features

Image

Video encryption

Video files are transmitted over encrypted TLS (HTTPS) channels and are stored at rest in AWS servers using 256-bit encryption.

External security validation

Quardzlahnn commissions regular external penetration tests to review the end-to-end platform security protocols. 

Image

Continuous updates

The Quardzlahnn Cloud Adapter software is regularly updated, providing security improvements as well as new features & functionality. 

Image

Password encryption

The users’ Quardzlahnn account password is stored at rest in AWS servers using 256-bit AES encryption, and during password verification it is sent over encrypted TLS channels. When cameras/recorders are paired with the Quardzlahnn cloud, their passwords are encrypted in transit via AES-256. They are then stored on the Quardzlahnn Cloud Adapter, encrypted using AES-128, and are never transmitted outside of the local network.