Introducing the MOBOTIX Cactus Concept Cyber Protection Guide

Introducing the MOBOTIX Cactus Concept Cyber Protection Guide

MOBOTIX provide digital, high-resolution and network-based video security systems and have recently introduced the Cyber Protection Guide, a guideline now available for download that outlines how to configure MOBOTIX systems for maximum cybersecurity. MOBOTIX have released the Cyber Protection Guide to support their customers in light of the constantly increasing number of cyberattacks carried out against hardware and software through the Internet.

In order to access highly sensitive data, hackers primarily focus on the weakest links in a digital line of defence. Since video surveillance via an IP network has become a key component of modern building and perimeter protection, hackers have begun to focus on these types of video security systems and are carrying out more and more attacks on them. MOBOTIX have always considered the unassailability of their purely IP-based systems to be of the utmost importance, so we have consistently taken this aspect into account during product development. This is why IT administrators now use the integrated and configuration tools as a standard into all MOBOTIX systems in order to ensure the greatest level of cybersecurity. Using these tools – alongside taking general security measures such as installing firewalls and carrying out network segmentation – minimises the opportunities for hackers to attack the devices and user interfaces connected with MOBOTIX systems.

Cactus Concept for increased security

The Cyber Protection Guide is part of the MOBOTIX Cactus Concept, which enables the configuration of an end-to-end video system that is reliably protected against hacker attacks to the greatest possible extent. The Cactus Concept represents a holistic approach to protecting MOBOTIX products against the threat of hacker attacks and incorporates tools and information. The measures outlined in the guide provide customers and partners with targeted support in protecting their environments through video surveillance and access control over the long term.

Click below to share this article

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive