Include: vendors that understand the threats and
ways to counter those threats; vendors that have control over their own off erings, have experience and apply best practice routines properly when needed; vendors that are open, transparent and provide long- term support of patching fi rmware for the products you have selected; and vendors that are able to off er tools that enable you to apply the security controls you need to mitigate threats you face – e.g., through device hardening and device management.
KEEP A COMPLETE DEVICE INVENTORY A fundamental aspect of ensuring the security of an enterprise network is maintaining a complete inventory of the devices on it. When creating or reviewing an overall security policy, it is important to have knowledge and clear documentation about each device, and not just critical assets. That is because any single overlooked device can be a means of entry for attackers. You cannot protect devices which you have overlooked or are not fully aware of. Device management
software gives network
administrators an automated means to gain access to a real-time inventory of network devices. It lets them automatically identify, list and sort the devices on a network. Just as importantly, it also lets them use tags so that they can group and sort devices based on criteria that suit a business’s unique requirements. This makes it easy to gain an overview of, and document, all devices on your network.
CONSTANT AWARENESS OF VULNERABILITIES YOU FACE New vulnerabilities are continuously being discovered. While most are non-critical, occasionally a critical vulnerability is discovered. A camera, like any other software-based device, needs to be patched to prevent adversaries exploiting known vulnerabilities.
It is important that network administrators stay on top of these threats by staying up-to-date with new developments and following industry best practice. It is essential to always update quickly once this
fi rmware becomes available, as attackers may try to exploit vulnerabilities that have been discovered. Moreover, rapid deployment of new fi rmware boosts operational capabilities and removes bottlenecks related to the manual roll-out of new release upgrades. Patching fi rmware in a system that is operational could introduce unexpected behavioral issues. It is recommended to use LTS (Long-Term- Support) fi rmware for security patching. Once again, the larger the network the more eff ort it will take to update all your devices. Axis fi eld tests reveal that on a network of 200 cameras, upgrading the fi rmware using a manual web interface would take 1,000 minutes compared to just 10 minutes using device management software. In addition to the time saved, automatic notifi cations of new patch releases help ensure that the software is updated promptly – minimizing your network’s exposure to attack.
EFFICIENT, EFFECTIVE DEVICE MANAGEMENT Eff ective device management software not only helps to ensure cybersecurity, but delivers effi ciencies that grow exponentially as you add more devices to your network. By saving your network administrator time managing the network, you can free them up to fulfi l other aspects of their job role, and to use their expertise to deliver additional benefi ts to your business. They will also have more time to stay on top of industry best practice and emerging threats – which is, of course, now an essential part of maintaining a secure network. Edwin Beerentemfel is Manager Business Development Middle Europe at Axis Communications.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74