Copyright © Networking & Information Services, Inc 2001
Dedicated solution for small businesses
AXIS Companion Line is a full video surveillance solution designed for the needs of your small business. It’s complete with surveillance cameras, video recording solutions and free video management software - which includes a mobile app.
AXIS Companion is available through professional installers in specific markets* who you can trust for a quick and simple installation process.
Keep your business safe with an easy-to-use surveillance solution. With AXIS Companion, you can monitor your whole premises onsite, and even on-the-go. Flexible options provide a reliable solution that’s ready to scale for any business need.
Whether you own a shop, hotel, office or any other small business, AXIS Companion will give you a complete security solution that’s designed to keep your business safe. And give you extra peace of mind.
AXIS Camera Companion
NIS Video Surveillance Network
Download AXIS Camera Companion to your PC
Register an Axis account
Create a site with cameras connected to a network-attached storage (NAS) device
How to protect a video surveillance system
When a video surveillance system is set up, it increasingly involves the use of IP network cameras which from a computing point of view should be regarded as sensors connected to the network in the same way as a PC. To obtain the most secure system possible, you need to take a detailed look at all the components that make up the surveillance solution, namely the server (with discs for recording images and data), the client and the number (variable) of IP cameras.
To ensure the highest level of protection, therefore, it is necessary for the video system, which forms part of the network, to meet certain requirements that will enable it to match the levels of protection for the existing infrastructure and the protection policy defined by the person in charge of the network. The system must also have adequate protection based on the level of risk previously calculated for all its components (servers, clients and devices connected to the network), based on a preliminary risk analysis which is of fundamental importance.
At Axis, we are aware of the importance of Cyber Security in the field of video surveillance. As a leading company in network video systems, we are committed to providing all the tools required to protect our customers from attacks on the web, and to creating increasingly secure solutions from this point of view. We offer our customers a technical guide to follow the correct procedures when installing a video surveillance system. A commitment represented by the "Axis Hardening Guide", a document that makes this process easier and helps to protect against cyber attacks.
When you choose to install a video surveillance system you should, first and foremost, look at the different levels of security involving the entire network. This is standard protection for which more specific mechanisms can be adopted, such as
· a firewall - a security tool which can protect a computer or a network from unauthorized attempts to access the system
· network access control and segmentation of the network - a request for access authorization to various network services and maintenance and to provide constant monitoring of the "status" of the network on the security front.
From a client protection point of view, Cyber Security experts at Axis recommend protecting all network "nodes" in accordance with IT policies, by using accurate and timely password management and implementing Firewall, Antivirus software and Encryption processes. And finally, providing an accurate management of client maintenance with continually updated operating systems and applications.
To this end, it is essential that IT systems administrators also protect the servers, through management of accounts and privileges, service configuration, general maintenance, and correctly implemented Firewall, Antivirus software and Encryption processes. Server security is of paramount importance when Video management Systems (VMS) are used to protect stored camera images, to ensure data protection compliance from possible hacker intrusion.We also need to consider that it is easier to perform cyber hardening on IoT devices than it is on clients and servers, because they have a smaller number of internal services and interfaces. Most of the devices are protected by infrastructures which can only be accessed through cloud services/servers and their users do not install unsafe applications, do not open dangerous email attachments or access suspicious sites.