Intelligent CISO Issue 51 | Page 60

Check Point Software and Provision- ISR to provide on-device IoT security for video surveillance solutions

camera ’ s controls , to turn it off , point it in a different direction and manipulate images and associated information or just to watch the activity covered by the camera . In addition , as a network device , once hacked , it can be used to gain access to sensitive resources on the corporate network via lateral movement , where cybercriminals can then exploit vulnerabilities and deploy botnets or cryptominers .
intelligent PHYSICAL SECURITY
heck Point Software – a leading

C provider of cybersecurity solutions globally – has announced it is partnering with Provision-ISR ( Israel ) – an international CCTV market leader . The partnership will involve Check Point Quantum IoT Protect Nano Agent being embedded in Provision-ISR ’ s CCTV cameras for on-device runtime protection against zero-day attacks . The solution brings an entirely new level of cybersecurity to the video surveillance market .

CCTV plays an integral role in keeping people and organisations safe , everywhere from transport hubs to retail , banks and critical infrastructure . According to cctv . co . uk , there are about 691,000 CCTV cameras in London . As surveillance video is increasingly IoTconnected , unfortunately , these devices are prime targets for cybercriminals .
Nano Agent is an embedded runtime protection solution that provides built-in security against attacks such as access control , memory corruption , shell injection , import table hijacking , control flow hijacking and more .
Modern CCTV cameras are essentially functioning as small computers that run operating systems and applications and that have various networks and radio frequency ( RF ) interfaces . As such , they are also susceptible to hacking attacks . One of the biggest issues is that end-users will often keep the default usernames and passwords , essentially leaving the door open for hackers . Even with a strong password , traditional CCTV cameras are not supplied with adequate onboard security .
But why even hack a CCTV camera ? Criminals may wish to gain access to the
“ On a global scale , even the companies with the most considerable market share have been proven to have crucial vulnerabilities ,” said Ami Finer , VP Sales at Provision-ISR . “ This is because IP cameras have limited processing power , leaving little room for traditional security software . At Provision-ISR , we want to lead from the front with 100 % secure CCTV devices that will give customers peace of mind . To do that , we needed an optimised threat solution with an extremely small footprint that would also be completely reliable . This is where Check Point comes in . From uncovering firmware security risks , hardening the devices with runtime protection and managing devices with granular policies , we now have a robust end-to-end security solution .”
“ The expanding threat landscape is making it an absolute must to protect IoT devices from cyberattacks ,” added Oded Gonda , VP Technology & Innovation at Check Point Software . “ And the technology is available to do it . From IP cameras , such as Provision-ISR ’ s , to routers , medical devices and industrial controllers , Quantum IoT Protect provides on-device runtime protection against even the most sophisticated fifth-generation cyberattacks – serving as a powerful line of defence for all IoT devices .” u
60 www . intelligentciso . com