ServerSwitch Intelligent Appliance Technology

Slides:



Advertisements
Similar presentations
A new Network Concept for transporting and storing digital video…………
Advertisements

Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Kyland-USA Product Introduction, Overview & Comparison KY-3000EM (Multi-Lingual) KY-2000EM Managed Industrial Ethernet Switch Din-Rail Copyright © KUSA,
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
LittleOrange Internet Security an Endpoint Security Appliance.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
HD Network Video Recorder (NVR) by ReadyNAS. IP Surveillance  Home  Office  Retail  Building  Car Park  Restaurant  Shopping Mall  School  Railway.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
IS3220 Information Technology Infrastructure Security
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Artificial Intelligence. Real Threat Prevention.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 Milestone Systems, Inc. Confidential Milestone Systems Open Platform Video Management Software Reinier Tuinzing Strategic Alliance Manager, Americas.
Security fundamentals
MILESTONE HUSKY™ M550A 10GbE NVR Hardware Platform with Scalable VMS Software.
2017 Security Predictions from FortiGuard Labs
Advanced Endpoint Security Data Connectors-Charlotte January 2016
CLOUD MANAGED VIDEO SURVEILLANCE
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Troubleshooting Networked Video
Barracuda Firewall The Next-Generation Firewall for Everyone
Chapter 6: Securing the Cloud
Web Content Security Unlock the Power of the Web
Configure Instruction
“Introduction to Azure Security Center”
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Journey to Microsoft Secure Cloud
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Active Cyber Security, OnDemand
Threat Management Gateway
Security in Networking
Cloud Testing Shilpi Chugh.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
The Next Generation Cyber Security in the 4th Industrial Revolution
How to Mitigate the Consequences What are the Countermeasures?
Defending high value targets in the cloud using IP Reputation
Implementing Client Security on Windows 2000 and Windows XP Level 150
Nenad Stefanovic and Danijela Milosevic
WHY VIDEO SURVELLIANCE
(With Hybrid Network Support)
WHY VIDEO SURVELLIANCE
Designed for powerful live monitoring of larger installations
Intel Active Management Technology
Protect critical systems with secure remote connectivity.
Per Söderqvist Per Söderqvist Sales Engineer
Presentation transcript:

ServerSwitch Intelligent Appliance Technology Razberi Technologies ServerSwitch Intelligent Appliance Technology August 2017

Founded in 2011 by security industry veteran Tom Galvin Headquarters in Dallas Texas Privately held corporation Holds US Patents on ServerSwitch Integration, Camera Port Security, and Cloud Based Health Monitoring Team comprised of security industry veterans

Intelligent Surveillance Appliance NVR w/RAID Storage Managed PoE Switch Cloud based Health Monitor Network Cybersecurity Intelligent Surveillance Appliance Purpose built open platform for Video Surveillance and Physical Security Distributed Enterprise Architecture 4th Generation Design Award Winning (Industry and Peer Recognition) Assembled in the USA / ISO 9000 Certified Benchmark Certifications with World Class Video Management Solution Manufacturers

Megapixel resolution cameras put strain on unprepared networks The Network Camera Challenge Megapixel resolution cameras put strain on unprepared networks Unprotected cameras are exposed to cyber attacks Monitoring the camera health can be difficult and expensive.

Reduce network utilization Protect from cyber attacks Solution: Intelligent Surveillance Appliances Reduce network utilization Protect from cyber attacks Notify on failures and cyber threats

Problem: Video is Bandwidth Intensive Video Management Client Workstation All video is streaming over the Corporate Distribution Key Concerns Major bandwidth implications and cost Compromise and reduction of video quality so as not to have too much impact on the corporate network More points of failure Centralized distribution, storage, and compute nodes can be costly and create support and management challenges Proliferation of IP addresses and port costs. Centralized Video Management Server Distributed Network

Solution: Razberi SSIQ Distributed Enterprise Video Management Client Workstation Up to 95% reduction in Bandwidth SSIQ Intelligent Surveillance Appliance Distributed Enterprise keeps video stored closer to the edge, keeps unnecessary high bandwidth video from traversing the corporate network. Streaming video to video management clients only occurs across the network on demand. Up to 95% of bandwidth reduction on corporate network. Reduces the number of IP address Create an architecture to support high resolution and high quality IP video streaming and recording. Distributed Network Centralized Video Management Server

ServerSwitchIQ™ Enterprise SSIQ : ServerSwitchIQ Product Line CameraDefense and Cylance 24 PoE Ports (up to 700 watts) 2 Fiber SFP ports Managed Switch Intel i7 with Quick Sync Support 5 year warranty Up To 80TB (Enterprise HDDs) RAID 0/1/5/6/10/JBOD Front Swappable HDDs 525 Mb/s recording data rate Redundant Power Supplies

ServerSwitchIQ™ Pro SSIQ : ServerSwitchIQ Product Line 8/16/24 PoE Ports (up to 480 watts) 2 Fiber SFP ports Managed Switch Intel i7 / i5 with Quick Sync Support 3 year warranty Up To 24TB (Surveillance HDDs) RAID 0/1/10/JBOD Front Swappable HDDs 425 Mb/s recording data rate CameraDefense and Cylance Surveillance-class recording optimized for video

ServerSwitchIQ™ Standard SSIQ : ServerSwitchIQ Product Line Up To 24TB (Surveillance HDDs) RAID 0/1/10/JBOD Front Swappable HDDs 260 Mb/s recording data rate 8/16/PoE Ports (up to 277 watts) 2 Fiber SFP ports Managed Switch Intel i3 3 year warranty Edge Surveillance-class recording

ServerSwitchIQ™ Rugged SSIQ : ServerSwitchIQ Product Line CameraDefense and Cylance 8 Ports PoE (up to 200 watts) Managed Switch 2 Fiber SFP ports Intel i5 3 year warranty Up To 4TB (SSD & HDD Options) -40C to 60C (-40F to 140F) RAID 0/1/JBOD Internal Heater 300 Mb/s recording data rate

Port Extension SSIQ : ServerSwitchIQ Product Line 1U Appliance Form Factor 8 and 16 port models 1 x 1000Mbps Combo SFP 1 X 1000Mbps RJ-45 Camera Defense Compatible Centralized Management 3 Year Warranty Available Q3 2017

Support and Warranty

Razberi Technologies VyneWatch Health Monitoring April 2017

VyneWatch System Monitoring and Notification Remote Cloud-based monitoring Included with all Razberi SSIQ Appliances Automated Alerts and Notification Secure Login Hardware Level Reporting Reduce the risk of downtime

VyneWatch System Monitoring and Notification

Razberi Technologies Camera Defense April 2017

Video Surveillance systems present cyber exposures “Security” of the security system Video Surveillance systems present cyber exposures Best practice measures are not widely followed Cameras and NVRs are targets and being hacked

Cyber exploits in the news

Razberi CameraDefense Keeping Surveillance Protected from Cyber Threats Automated Camera and Device Hardening Secure Appliance Architecture Cyber Threat Monitoring

Block unauthorized IoT devices Secure access to cameras Automated Camera and Device Hardening Block unauthorized IoT devices Secure access to cameras Protect from cyber attack Block unauthorized IoT devices Secure access to cameras Protect from cyber attack Binds cameras and other IoT (Internet of Things) security devices to the network, prevents unauthorized devices from using Ethernet ports Restricts camera access to whitelisted IP address, blocks camera traffic to the public Internet, flags weak passwords Denies un-needed and potentially dangerous camera and ports services with a next generation firewall

Isolated camera network Encryption-ready hardware Secure Appliance Architecture Isolated camera network Encryption-ready hardware Integrated virus & malware protection Isolated camera network Encryption-ready hardware Integrated virus & malware protection Separates the camera network from the business network with independent network interfaces and a configurable VLAN Supports video encryption and trusted system boots with an embedded Trusted Platform Module (TPM) Protects the video management system and operating system by predicting known and unknown attacks to proactively prevent malware execution.

Real-Time security alerts Flexible alert management Cyber Threat Monitoring Real-Time security alerts Flexible alert management Dynamic threat detection Real-Time security alerts Flexible alert management Dynamic threat detection Generates real-time security alerts for incident response Manages security alerts with Razberi VyneWatch, Milestone Xprotect and other certified VMS products. Cylance Virus and Malware Platform - Evolves with new threats through machine learning.

Razberi Technologies – Camera Defense Dashboard Password Protection – Monitors your cameras to ensure they are not using default or common passwords. Internet Protection – Protects cameras from common routable IP traffic and accessing external sites. Device Group – A set of similar devices by port assigned to the same security policies. Device Binding - Secures traffic to known MAC addresses. Prevents unauthorized devices from using your Razberi SSIQ Appliance. Firewall - Blocks traffic for services commonly used to attack network cameras and IoT devices. This protects your cameras and devices from sabotage and tampering.

More effective than signature-based AV Security Appliance Architecture Advanced Endpoint protection – Powered by Cylance More effective than signature-based AV More effective than signature-based AV Does not require daily updates No Internet connection required Does not disrupt Video Management Applications Does not require daily updates No Internet connection required Cylance Virus and Malware Platform - Evolves with new threats through machine learning. Signature based Anti-Virus is only effective against known threats Machine Learning does not rely on databases of known malware Not all customer systems have access to the internet. Uses low memory (300MB or less committed memory), and 1% or Less CPU utilization. Razberi Labs certify Cylance with all VMS partners application platforms. Does not disrupt Video Management Applications

Security Appliance Architecture Advanced Endpoint protection – Powered by Cylance Low Memory and CPU utilization Uses low memory utilization (300MB or less committed memory), and 1% or Less CPU utilization. Razberi Labs certify Cylance with all VMS partners application platforms.

Purpose built edge recording platform Reduce network utilization Platform Summary and Value Proposition Purpose built edge recording platform Reduce network utilization Increased protection from cyber threats Physical and logical cloud based health management

DEMO Making cybersecurity easier for you, hard for hackers Razberi Technologies – Camera Defense Dashboard Next Slide is the interactive CameraDefense Demo. Instructions are documented in the notes section on next slide. Making cybersecurity easier for you, hard for hackers DEMO

CameraDefense Hardening Wizard

Sample VMS Application Events Management Click on Configure Buttons Device Binding Device Groups Firewall Whitelist To Return to Dashboard click on blue CameraDefense Button on top menu bar To review alerts – click on Exclamations “!” or light blue View Alerts link above the Configure Buttons For Sample Milestone VMS integration, click on link “Sample VMS Application Events Management” Sample VMS Application Events Management

Device MAC Binding

CameraDefense Device Groups

CameraDefense Firewall

CameraDefense Internet Protection / Whitelist

Sample Alerts

Sample Alerts

END