Risk
2/17/2011
04:14 PM
50%
50%

Swann Links Security Monitoring System To Smartphones

Customers can watch live video from up to four security cameras or receive email notifications when movement is detected.

Swann Security's DVR4-2600
(click image for larger view)
Swann Security's DVR4-2600
Swann Security has provided smartphone and iPad access to its video surveillance system, offering people more flexibility in accessing recordings of monitored areas in a small business or home.

The DVR4-2600 kit, introduced Thursday, includes a digital video recorder with 500 GB of storage and four color cameras. The system can store up to 30 days of continuous video. More days are possible, if the customer uses the gear's motion-detecting technology that records only when movement is detected in the monitored area.

To set up Swann's DVR for remote access, the user first downloads the SwannView mobile application for the smartphone. The iPhone and iPad apps are available through Apple's App store, while applications for Android, Windows Mobile 6 or Symbian smartphones, and Research In Motion's BlackBerry are available through the company's Web site.

Once the applications are installed, the user types the DVR's IP address to make the connection over the smartphone's 3G network. In less than a minute, the user can see live video from all four cameras, according to the company.

Swann says its latest DVR is a "flagship product" for the company, which first showed off the system at the Consumer Electronics Show in Las Vegas, Nev., in January. "It brings together surveillance and phone connectivity and convenience as never before," Jeremy Stewart, VP of global marketing for Swann, said in a statement.

Technology for accessing surveillance equipment by mobile devices is being offered by others. Genetec introduced Tuesday the Security Center Mobile app that works in conjunction with the company's mobile server. Once connected to the surveillance equipment, the server transcodes incoming video and streams it to either a BlackBerry, iPhone or iPad. The software is aimed at companies that have security guards in buildings.

Companies offering home security systems that included cameras and sensors have also introduced smartphone access to watch video or control the system remotely. Such vendors include FrontPoint Security and Verizon, which introduced its security system for the home at CES.

Swann is among the first to add mobile capabilities in a DVR-based security system geared toward small businesses or people who want to keep watch of their homes. Besides remote viewing, the DVR4-2600 provides email notification when motion is detected, a USB port for back up and transfer of footage to a PC, and VGA output for connecting to a TV or LCD monitor.

The new kit is scheduled to be available in March for a manufacturer suggested retail price of $449.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report