SecurityWorldMarket

25/02/2011

Next generation IPTV from Dedicated Micros

Warrington, Cheshire (UK)

The award-winning, zero configuration, Closed IPTV has been brought to market by Dedicated Micros to deliver all the simplicity and security of a traditional CCTV installation in the IP environment.
From a security perspective Dedicated Micros is confident that because each connected IP security camera is locked down within a private area, and trusted IP end points created, the door can be closed to those looking to use this as a route to hack into the wider corporate network. Also, from a practical perspective, there is no longer the frustration of having to manually assign individual IP addresses where mistakes can unwittingly introduce vulnerabilities.

The closed IPTV solution being offered by Dedicated Micros is far more than just a simple discovery scheme as often proposed by other vendors which offer little more than a custom DHCP (Dynamic Host Configuration) server that updates system parameters, when the IP address is dynamically re-allocated, and no other system protection. In particular, Dedicated Micros believes that Closed IPTV directly addresses the pressing need for the controlled segregation of the IP CCTV system while, crucially, still allowing access as required direct to the security cameras, for example, Multicasting.

Said Salim Idris, General Manager (Middle East), Dedicated Micros: "Looking at how our patent-pending Closed IPTV is configured in practice, it uses a completely deterministic set-up which automatically maps each, standard or HD resolution, IP security camera to a specific port on Dedicated Micros' Layer 3 Enhanced CCTV Switch - which provides greater security for less configuration effort than a conventional managed switch - and, in turn, to the corresponding camera input number on a hybrid DVR/NVR (Digital Video Recorder/Network Video Recorder). This approach,combined with DM's unique implementation of secure modes, means that, when it comes to IP video, we are confident that complete security of the IP endpoints can be achieved by end users with a single click - so preventing potentially damaging hacking attacks."


Product Suppliers
Back to top