Providing appropriate security of the data in CCTV projects is one of the important task for customer, designer and manufacturer, given the unstoppable interest in hacks and data theft. This is a quite difficult and time-consuming task, yet everyone wins at the end, except for the hacker.

What are the problems with which you can confront:

  • Video Archive and Database: malicious removal, substitution or viewing;
  • Deliberate violation of the quality of data transmission among devices of the video surveillance system;
  • Unauthorized access to devices of the system.

There are two ways of protecting the data:
1) Сompetent configuration of network devices by a data protection specialist.
2) Protection provided by the manufacturer of the CCTV devices.

What can an IT specialist, like system administrator, do to prevent the data from hacking:

  • First of all, physical limitations: installing the network devices and servers into key-locked cases, laying cables in hard-to-reach places, etc;
  • Complex passwords, different users for different employees;
  • Access restrictions by ip-address and MAC address filters;
  • Firewall, Antiviruses setup;
  • Audit;
  • "Closing" the CCTV from World-wide Internet;
  • Database and archive reserving;
  • VLAN, VPN, Routing.

What TRASSIR can provide for the IT security and redundancy:

  • Key-locked cases on some NVR models;
  • TRASSIR NVRs and operator machines have linux-based OS (Trassir OS), which does not allow to install anything on them - only TRASSIR software for video surveillance is available; 
  • Brute force attack protection from the side of TRASSIR server software;
  • Brute force attack protection from the side of the web page of TRASSIR cameras;
  • Client-Server traffic encryption;
  • Passwords encryption;
  • Server settings encryption (also for the backup in TRASSIR Cloud);
  • Possibility to protect the video archive with additional password;
  • SDK requests protection: Protection against a large number of connections from a single IP-address, Protection against frequent authorization;
  • Watermarks on video streams - protection against making the photos or videos of the operator monitor screen;
  • Audit of user actions.
  • Database connection is restricted (connection is allowed only for the localhost) by default;
  • Ability to duplicate the archive or/and database on another server; Failover with options: N+1, 1+N, N+M.

SSH and VNC of Trassir Server

Trassir NVRs software grants the ability to access it using SSH, SFTP and VNC for troubleshooting or deeper settings . They are turned off by default, so we don't recommend to keep them open after the technical tasks involving these protocols are done.

Vasily Selivantsev




  • Нет меток