3VR SmartRecorder. IT Requirements. 3VR Video Intelligence Platform. 3VR Software Version 7.0



Similar documents
3VR SmartRecorder TM. IT Requirements. 3VR Video Intelligence Platform. June 2011

Release Notes for Websense Security v7.2

Symantec Mobile Security

Enterprise Manager. Version 6.2. Installation Guide

Guidance Regarding Skype and Other P2P VoIP Solutions

Security Controls for the Autodesk 360 Managed Services

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Building A Secure Microsoft Exchange Continuity Appliance

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

PowerChute TM Network Shutdown Security Features & Deployment

Hardening Guide. Installation Guide

Tk20 Network Infrastructure

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Chapter 4 Application, Data and Host Security

System Management. What are my options for deploying System Management on remote computers?

AND SERVER SECURITY

AND SERVER SECURITY

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Windows Remote Access

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Medical Device Security Health Group Digital Output

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Protecting Your Organisation from Targeted Cyber Intrusion

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

safend a w a v e s y s t e m s c o m p a n y

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

INSTANT MESSAGING SECURITY

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

GFI Product Manual. Version 6.0. Getting Started Guide

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

GoToMyPC Corporate Advanced Firewall Support Features

Web Plus Security Features and Recommendations

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

Host-based Protection for ATM's

Kaseya IT Automation Framework

Enterprise Manager. Version 6.2. Administrator s Guide

Introduction of Intrusion Detection Systems

GFI Product Manual. Deployment Guide

Best Practices for DanPac Express Cyber Security

AN OVERVIEW OF VULNERABILITY SCANNERS

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Network Instruments white paper

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

FileCloud Security FAQ

Comodo Endpoint Security Manager SME Software Version 2.1

Core Protection for Virtual Machines 1

Nessus Agents. October 2015

DiamondStream Data Security Policy Summary

How To Secure Your System From Cyber Attacks

Locking down a Hitachi ID Suite server

End-user Security Analytics Strengthens Protection with ArcSight

AVG 8.5 Anti-Virus Network Edition

Virtual Private Networks (VPN) Connectivity and Management Policy

Managing and Monitoring Windows 7 Performance Lesson 8

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

IBX Business Network Platform Information Security Controls Document Classification [Public]

Did you know your security solution can help with PCI compliance too?

How To Secure An Rsa Authentication Agent

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Networking Best Practices Guide. Version 6.5

Retention & Destruction

Managed Security Services for Data

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

GTS Software Pty Ltd. Remote Desktop Services

Backup Manager Configuration and Deployment Guide. Version 9.1

DriveLock and Windows 7

WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate.

1. Server Microsoft FEP Instalation

Network- vs. Host-based Intrusion Detection

Server Software Installation Guide

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

Cisco Advanced Services for Network Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Best Practice

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Server Installation ZENworks Mobile Management 2.7.x August 2013

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Introduction. PCI DSS Overview

Kaseya Server Instal ation User Guide June 6, 2008

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

inforouter V8.0 Server & Client Requirements

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

Securing Your Business s Bank Account

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Firewall and UTM Solutions Guide

StruxureWare Power Monitoring 7.0.1

A&H Software House Inc. Web: Luxriot

Transcription:

3VR SmartRecorder TM IT Requirements 3VR Video Intelligence Platform IT REQUIREMENTS WHITE PAPER 3VR Software Version 7.0 3VRVIP-ITREQ7.0-R2 3VR, Inc 475 Brannan Street, Suite 430 San Francisco, CA 94107 www.3vr.com Tele: 415.495.5790 Sales: 415.513.4611 Fax: 415.495.5797 Email: info@3vr.com 2011 3VR, Inc. 3VR and the 3VR logo are either trademarks or federally registered trademarks of 3VR, Inc. Specifications herein subject to change without notice.

Contents 1. Summary 3 2. IT Security with 3Vr 4 2.1 Operating System 4 2.2 Applications 4 2.3 Network Services 4 2.4 Ports 5 2.5 SMTP 5 2.6 Physical Access 5 2.7 Encryption 6 2.8 Antivirus 6 2.9 Upgrades and Plug-in Packages 6 2.10 Client Applications 6 2.11 Vulnerability Testing 6 3. Systems Management with 3Vr 7 3.1 Systems and User Management 7 3.2 Extraordinary Maintenance Account 7 3.3 Systems Health Monitoring 8 3.4 Updates/Upgrades Management Plan 8 4. Client Application Management 8 4.1 About 3VR Client Applications 8 4.2 Where to Find Client Applications 8 4.3 Client Application System Requirements 9 5. Data Redundancy with 3Vr 9 5.1 RAID 9 5.2 Settings Backup 9 6. Bandwidth Utilization with 3Vr 10 6.1 Bandwidth Consumption 10 6.2 Bandwidth Throttling 10 About 3Vr 11 2

1. Summary The purpose of this paper is to detail the capabilities and hardened security measures built into 3VR systems to address the IT requirements of today s security buyers. 3VR has invested heavily to ensure that all of their 3VR VIP appliances are as secure as possible against virus threats and external attacks. Of particular importance are the following 3VR features: 3VR systems conform to industry-leading information security baselines and pose equal or lesser risk than alternative appliances, workstations or operating systems on the market. The 3VR system is built upon a modular version of Microsoft Windows (either Windows Embedded Standard or Windows Embedded Standard 7) and is implemented in a way to strictly avoid components that present security risks such as Internet Explorer, Internet Information Server, File Transfer Protocol or Telnet clients which have historically represented vulnerabilities. All 3VR software applications communicate using proprietary protocols that minimize the risk of intruder access. 3VR appliances require only four open ports for network communication with client applications and the 3VR Enterprise Appliance. In five years of widespread commercial deployment, 3VR has not generated any security compromises. 3

2. IT Security with 3VR 2.1 Operating System 3VR systems use a modular version of Microsoft Windows Embedded Standard or Microsoft Windows Embedded Standard 7 (WES). 3VR version 7.0 is our latest software release and is current with all of the latest operating system patches and security hotfixes. 3VR s specific configuration of WES significantly reduces security risks as described in the appropriate sections below. 2.2 Applications 3VR VIP Appliance applications: MySQL 3VR Recording Systems: Shell (3VR proprietary) ContentServer (3VR proprietary) PipelineManager (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) System Manager (3VR proprietary) 3VR Enterprise Appliance applications: MySQL 3VR Recording Systems Shell (3VR proprietary) EnterpriseServer (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) System Manager (3VR proprietary) Interconnects between 3VR applications are by proprietary protocol. This eliminates the attack vectors that viruses use to attack systems. To attack the 3VR system, adversaries would have to build complex protocols. The 3VR appliance is also protected against denial of service attacks. 2.3 Network Services 3VR has created an appliance that is highly resistant to network-based attacks. The applications most commonly exploited by attackers are not present on 3VR systems. These include Internet Explorer, Internet 4

Information Server, File Transfer Protocol (FTP), and Telnet servers and clients. 3VR does not use any form of file sharing for storage on the appliance. To further protect the system, 3VR has built-in a software firewall which restricts traffic to only the allowed ports. With this set of security measures in place, the 3VR appliance uses only one type of service: a 3VR proprietary protocol that supports authentication with one-way hash-based encryption. 2.4 Ports Models Protocol Port Program Purpose VIP Appliance TCP 2500 ContentServer.exe Live video All TCP 3020 Shell.exe Remote upgrade, restarts, and network settings changes VIP Appliance TCP 3043 ContentServer.exe Data access VIP Appliance TCP 3044 ContentServer.exe Bandwidth measurement (optional) Enterprise Appliance TCP 3045 EnterpriseServer.exe Enterprise management All UDP 123 ws32time.dll Network Time Protocol All UDP 3333 SystemManager.exe Find Local Servers feature While all the ports in the above list are important, users of OpCenter and System Manager can access the appliance for normal use using only port 3043 and port 2500 (standalone VIP Appliances) or ports 3043, 2500, and 3045 (appliances connected to an Enterprise). All other ports listed above can be blocked in non-diagnostic, non-upgrade situations. 2.5 SMTP 3VR provides limited SMTP support that is constrained to eliminate risk. 3VR provides outbound-only SMTP and only when a customer specifically configures it. No SMTP forwarding is allowed. Email content is always automatically determined by the software. Furthermore, the SMTP client is coded directly into the application and there is no receiving code in any of 3VR s applications. 2.6 Physical Access 3VR appliances can be physically accessed in one of two ways: Logging in at the local console with a monitor, keyboard, and mouse. Logging in to the 3VR Client Applications on a laptop that is directly connected to the system with a USB network adapter. Note: This connection method is subject to the same security restrictions as a remote client. Because of 3VR s account management architecture, a malicious user does not have access to the underlying system. Moreover, even if the user somehow accessed the system, because networking services such as web client, telnet and FTP are not installed, an attack would be extremely difficult. 2.7 Encryption 5

By default, all communication between the 3VR systems and between the systems and client applications is encrypted. A symmetric AES 128 bit encryption key is negotiated using the Diffie-Hellman key exchange algorithm, and is renegotiated every hour. Encryption can be disabled using SystemManager, but even when disabled encryption is always used during user authentication (when user names and passwords are sent). 2.8 Antivirus 3VR s antivirus strategy focuses on lockdown. 3VR does not currently perform antivirus scanning. In five years of widespread commercial deployment, not a single 3VR system has been infected with a virus. 2.9 Upgrades and Plug-in Packages 3VR requires all installation packages to be signed using the industry standard X.509 digital certificate and SHA-1 signature mechanism. Each installation package is required to contain: A signed X.509 certificate issued by 3VR. This ensures that the package is trusted by 3VR. A signed SHA-1 hash of the entire package. This ensures the integrity of the package and confirms that it has not been tampered with in any way since it was originally created. 2.10 Client Applications 3VR supports a remote viewing client called OpCenter. OpCenter connects to 3VR appliances via port 3043 as explained in the Ports section. OpCenter uses the same account management plan as described in the Systems Management section. 3VR Client Applications (discussed in more detail in the section Client Application Management ) access the VIP Appliance using port 3043 for data access and port 2500 for video access. The applications access the Enterprise Appliance on port 3045 for both data and any video stored there. All of the protocols used over these ports are 3VR proprietary protocols with one-way hash based authentication. The Client Applications do not support extensions or scripting. Therefore, attacks by these mechanisms are not possible. 2.11 Vulnerability Testing 3VR runs Tenable s Nessus vulnerability test suite on every release that we ship. These tests consistently show that our system is clean with respect to known vulnerabilities. Detailed test results are available from 3VR on request. Network security personnel at various 3VR customers have run different suites with similar results. 3. Systems Management with 3VR 6

3.1 Systems and User Management 3VR designed its systems management solution to maximize the security of the underlying operating system and the overall network. 3VR separates login to the 3VR application from login to Windows. Passwords for user accounts are stored in a SQL database using a one-way hash. No 3VR user account has access to the operating system. Windows logins are completely disabled on 3VR appliances. 3VR also provides single sign-on capabilities, so that an administrator can centrally access and modify system and camera configurations on any specific 3VR system across an enterprise. The administrator can also centrally manage users privileges and passwords. Users access rights can be restricted as follows: By machine(s). A user can be granted access to certain specific machines or to a group of machines in a region. For example, a user may be given access only to machines in the Northeast Region. By capability. For example a user may be restricted to viewing video only. By default, 3VR does not force password changes. However, the administrator of a 3VR Enterprise may enable password constraints to enforce one or more of the following password restrictions: Require minimum password length Require the password contain lower case, upper case, or non-alphanumeric characters Prevent simple dictionary words Prevent word variations Prevent resetting password to a previous password The administrator may also restrict user behavior in respect to user accounts changes: Block account after a given number of failed sign in attempts Require password change after a given number of days Block account after a number of days of inactivity An adversary who acquired the password for a 3VR user despite the protections above could only change data maintained by 3VR software. Since there is no system access available, there is no risk to the system or network. 3.2 Extraordinary Maintenance Account 3VR does have a special system access account used for extraordinary maintenance. This account is accessed through a double password, one supplied by the customer and one that changes daily that s built into the system. The extraordinary maintenance functions cannot be accessed unless both passwords are correctly entered. 3.3 Systems Health Monitoring 7

3VR provides remote health monitoring with real-time health alerts of cameras, hard drives, systems, software, and networks. Administrators can log on from a central location to monitor health of components, reducing potential downtime. 3.4 Updates/Upgrades Management Plan 3VR manages software updates and upgrades through the 3VR system software, which no one can access without the 3VR client tool and proprietary protocol.* Customers can administer updates or upgrades by using 3VR s System Manager application. Administrators can log in from a central location and easily manage the distribution of software updates and upgrades throughout a large enterprise in minutes without the need to visit each system. *See section 2.9 for a discussion of package signing for software updates and plug-ins 4. Client Application Management 4.1 About 3VR Client Applications Standard applications: 3VR OpCenter (opcenter.exe) is a powerful video monitoring and searching application, which also includes the ability to create and track cases, develop watchlists, and configure alerts. 3VR System Manager (systemmanager.exe) is an appliance configuration and health monitoring application; used for camera setup, user management, and system updates and maintenance. Optional applications used for specific purposes: 3VR Spot Monitor (spotmonitor.exe) is a simple application used to view multiplexed or sequential live video feeds on a TV or other monitor. 3VR Alert Viewer (alertviewer.exe) is an application that notifies the user when an alert has been triggered on the 3VR system. 3VR Report Viewer (reportviewer.exe) is an application that generates tabular reports based on data captured by the 3VR system. 4.2 Where to Find Client Applications 3VR Partners may download the 3VR Client Applications from the 3VR Partner Portal (partners.3vr.com). The Client Applications can also be installed from the Installation & Resource CD that ships with every 3VR unit. 3VR Technical Support can also provide software and documentation upon request (email: support@3vr.com or telephone: 415-513-4572 Mon-Fri from 9 AM - 9 PM Eastern). 4.3 Client Application System Requirements 8

3VR Client Applications run on Windows XP Service Pack 2 or later, Windows Vista, or Windows 7 using the Microsoft.NET framework and Intel Performance Primitives, which are installed if necessary as part of the installation process. The installation process also installs DirectShow video filters that may be used by other applications, but otherwise the files loaded are specific to 3VR and won t interact with other applications. The most up-to-date system and network requirements are posted in more detail on our web FAQ: www.3vr.com > Services and Support > FAQ > What are the system requirements for 3VR Client Applications?. If the 3VR system is located behind a firewall, another web FAQ details what ports need to be open in order to connect. See www.3vr.com > Services and Support > FAQ > What ports must be open to connect to a 3VR SmartRecorder that s behind a firewall? 5. Data Redundancy with 3VR 5.1 RAID All 3VR P-Series Appliances and Enterprise Appliances come standard with RAID, providing fault-tolerance and protection against loss of video or data in the event of disk error or disk failure. The VIP S-Series may be purchased with RAID (S-Series 40 model) or without RAID (S-Series 30 and S-Series 35). 5.2 Settings Backup All S-Series, P-Series, and Enterprise Appliances have on-board flash storage of system software and configuration settings. If the single drive on an S-Series 30/35 unit (no RAID) or more than one drive fails on an S-Series 40, P-Series, or Enterprise (RAID), the drive(s) can be replaced and the system will come back online with all of its configuration intact. Alternatively, a completely new system can be installed and the system and configuration files copied from the failed system to the new system. This ensures quick return to full functionality without extended downtime for re-installing software and re-configuring the system. 9

6. Bandwidth Utilization with 3VR 6.1 Bandwidth Consumption 3VR has designed its network architecture to ensure that the system minimizes resource utilization and rapidly respects bandwidth constraints even on network connections as low as a DSL. 3VR uses TCP links for video and data. We rely on TCP to provide retransmissions in case of data loss. TCP has sophisticated algorithms for congestion avoidance that allow it to efficiently use slow networks without swamping them with retransmits. Finally, 3VR naturally degrades bandwidth for live video streaming by employing adaptive frame dropping. Most importantly, all of these design elements ensure that the 3VR appliance will not engender or contribute to hysteresis. Bandwidth consumption in the application is highly dependent on load (for example, the number of faces recognized per minute). Live video, 10 fps CIF: 64 Kb/s Searching, 32 events with 3 images per event, 150 KB total per page of search results (search results are downloaded one page at a time as the user asks for them). Depending on event load, there is some amount of new event notification traffic flowing from server to client. 6.2 Bandwidth Throttling 3VR systems have a configurable bandwidth throttle that constrains the bandwidth rate from an individual 3VR appliance to remote clients. Bandwidth throttling provides quality of service (QoS) by ensuring that bandwidth is available for other applications even on slower networks. 10

About 3VR 3VR, Inc., the video intelligence company, enables organizations to search, mine and leverage video to bolster security, identify and mitigate fraud and better serve customers. 3VR s Video Intelligence Platform allows video surveillance systems to reach their true potential and deliver a measurable and sustainable return on investment. 3VR is the video surveillance standard for hundreds of global customers, including leading banks, retailers, governments and law enforcement agencies and owns CrimeDex, an online community of fraud, loss prevention and law enforcement professionals dedicated to stopping crime. Based in San Francisco, CA, the company is privately held with funding from DAG Ventures, Focus Ventures, In-Q-Tel, Kleiner Perkins Caulfield & Byers, Menlo Ventures and VantagePoint Ventures. 3VR s SmartRecorder is the three-time winner of the SIA Best New Video Product Award and was named Security Product of the Year from Frost & Sullivan in 2006 and 2007, among other awards. For more information, please visit www.3vr.com. Tel: 415.495.5790 Fax: 415.495.5797 Sales: 415.513.4611 Email: info@3vr.com Website: www.3vr.com 3VR, Inc. 475 Brannan Street, Suite 430, San Francisco, CA 941071 11