QNAP Security participates at Intersec Dubai 2010
QNAP will showcase its entire lineup of high performance VioStor Network Video Recorders at Intersec Dubai 2010
QNAP Security, a world class manufacturer of PC-less Network Video Recorder solutions for the corporate security/surveillance market is pleased to announce its participation at Intersec Dubai 2010. QNAP will showcase its entire lineup of high performance VioStor Network Video Recorders including the award-winning, high performance 40-channel/ 36-channel/ 24-channel VS-8040/ VS-8032/ VS-8024 desktop tower and VS-8040U-RP/ VS-8036U-RP/ VS-8024U-RP rack mounted unit (with redundant power supply), the 5-drive 20-channel/ 12-channel VS-5020 and VS-5012, the 4-drive 16-channel VS-4016U rack mount (with redundant power supply), the 2-drive 12-channel/ 8-channel VS-2012 and VS-2008 tower network video recorders and the power-saving NVR-104 network video recorder.

QNAP's VioStor NVR is the high performance, Linux-embedded, standalone network surveillance solution for reliable IP-based real-time monitoring and video recording. The VioStor NVR offers powerful surveillance features including up to 120-channel monitoring from multiple QNAP NVR servers, Intelligent Video Analytics, generic IP camera integration by CGI command, digital watermarking, strengthened event management, SMS alert, etc. The monitoring can be performed anywhere with Internet access and even on Windows PDA phones by QNAP's mobile surveillance application VSMobile. The Linux-embedded NVR delivers high reliability and high performance, yet features environment friendliness and affordable price.

QNAP is going to unveil the future Intel® Atom™ Processor-based Turbo NAS: TS-259 Pro, TS-459 Pro, TS-659 Pro and TS-859 Pro

The VioStor NVRs supports high quality H.264, MxPEG, MPEG-4 and M-JPEG video recording onto the VioStor internal hard disk RAID array, with up to 8 hot-swappable drives, which also offer high compatibility for over 500 camera models from 31 popular IP camera manufacturers supporting, including AXIS, ACTi, AVTECH, A-MTK, Arecont Vision, Canon, Cisco, CNB, D-Link, EDIMAX, ELMO, Etrovision, GANZ, Hikvision, iPUX, IQeye, LevelOne, Linksys, MESSOA,MOBOTIX, NAKAYO, Panasonic BB/ BL/ i-Pro, SANYO, SONY, TOA, TOSHIBA, TRENDnet, VIOSECURE, VIVOTEK, and Y-CAM.

Meanwhile, QNAP will also showcase its latest lineup of the future Intel® Atom™ Processor-based TS-259 Pro, TS-459 Pro, TS-659 Pro and TS-859 Pro Turbo NAS series which delivers exceptional performance and low power consumption with the latest management software V3.2. The entire Turbo NAS series is the perfect storage expansion solution for a VioStor Network Video Recorder.

We cordially invite you to stop by Hall2 625C at Intersec Dubai 2010 to see a demonstration of these powerful video surveillance solutions.

Where: Booth 625C, Hall 2, Dubai International Convention and Exhibition Centre
When: January 17 ~ 19, 2010

Network Video Surveillance System (NVR) Series:

 

8-bay, 16TB, 2U Chassis VS-8040U-RP
Recorders include the award-winning, high performance 40-channel/ 36-channel/ 24-channel VS-8040/ VS-8032/ VS-8024 desktop tower
8-bay, 16TB, 2U Chassis VS-8040U-RP/VS-8032U-RP/VS-8024U-RP NVR (40-channel/32-channel/24-channel):

  • Intel® Core™2 Duo 2.8GHz CPU, 2GB DDRII memory
  • Redundant power supply available
  • Up to 30 fps at D1 or VGA for each channel
  • Max network throughput: 300 Mbps

8-bay, 16TB VS-8040/VS-8032/VS-8024 NVR (40-channel/32-channel/24-channel):

  • Intel® Core™2 Duo 2.8GHz CPU, 2GB DDRII memory
  • Up to 30 fps at D1 or VGA for each channel
  • Max network throughput: 300 Mbps

5-bay, 10TB VS-5020/VS-5012 NVR ( 20-channel/12-channel)

  • Intel® Celeron® 1.6GHz CPU & 1GB DDRII memory
  • Up to 30 fps at D1 or VGA for each channel
  • Max network throughput: 138 Mbps

4-bay, 8TB, 1U Chassis, VS-4016U NVR (16-channel):

  • Intel® Atom™ CPU & 1GB DDRII memory
  • Redundant power supply available
  • Up to 30 fps at D1 or VGA for each channel
  • Max network throughput: 62.6 Mbps

2-bay, 4TB VS-2012/VS-2008 NVR (12-channel/8-channel)

 Intel® Atom™ Processor-based Turbo NAS
QNAP is going to unveil the future Intel® Atom™ Processor-based Turbo NAS: TS-259 Pro, TS-459 Pro, TS-659 Pro and TS-859 Pro

  • Intel® Atom™ CPU & 1GB DDRII memory
  • Up to 36 fps at D1 or VGA for each channel
  • Power-saving design, consumes only 37 - 44W
  • Max network throughput: 62.6 Mbps

1-bay, 1TB NVR-104 (4-channel)

  • Up to 30 fps at CIF for each channel
  • Power-saving design, consumes only 18W

QNAP Turbo NAS Series

Future Intel® Atom™ Processor-based Turbo NAS
QNAP is going to unveil the future Intel® Atom™ Processor-based Turbo NAS: TS-259 Pro, TS-459 Pro, TS-659 Pro and TS-859 Pro. These models are featured with 1GB DDRII memory and stylish industrial design to deliver exceptional performance and low power consumption. The Turbo NAS comes along with the powerful software V3.2 which supports advanced iSCSI services, storage deployment in the virtualized and clustered environments, Apple © Time Machine backup, DST support, new Web File Manger 2. Other powerful features include dual Giga LAN, RAID 0/ 1/ 5/ 6/ 5 + hot spare/ 6 + hot spare configurations, Online RAID Capacity Expansion and Online RAID Level Migration, iSCSI target service with Thin Provisioning, Virtual Disk Drive support, AES 256-bit volume-based encryption, etc. This series adopts vertical hard drive mounting which allows vertical air convection for excellent heat dissipation. The NAS supports both 2.5-inch and 3.5-inch hard drives.

 

QNAP's VioStor NVR is the high performance, Linux-embedded, standalone network surveillance solution

8-bay, 16TB TS-809 Pro and TS-809U-RP Turbo NAS
The TS-809 Pro and TS-809U-RP are powered by Intel Core 2 Duo 2.8 GHz CPU and 2GB DDRII memory. They offer RAID 0/ 1/ 5/ 6/ 5 + hot spare, Online RAID Capacity Expansion, Online RAID Level Migration, iSCSI with Thin Provisioning, Virtual Disk Drive support, AES 256-bit volume-based encryption, exclusive QNAP RAID recovery, automatic policy-based IP blocking, instant SMS and email alert, etc. The TS-809U-RP is the 2U chassis NAS with two power supply units, each of which is capable of supplying the power for the NAS independently to allow highly stable system operation 24x7. The TS-809 Pro and TS-809U-RP have passed VMware Ready certifications that guarantee its compatibility for VMware solution.

SS-439 Pro and SS-839 Pro Turbo NAS (2.5-inch SATA HDD supported)
The 4-bay SS-439 Pro and 8-bay SS-839 Pro are the Turbo NAS models which support 2.5-inch SATA hard drives. They are the energy-saving and quiet storage solutions designed to operate 24x7 at home or in the office environment. The NAS is compatible with Linux, UNIX, Mac, and Windows OS and offers numerous applications, e.g. file server, FTP server, printer server, web server (with phpMyAdmin, MySQL, SQLite, Joomla!).

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

What Are The Positive And Negative Effects Of COVID-19 To Security?
What Are The Positive And Negative Effects Of COVID-19 To Security?

The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact will it have on 2021?

Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More

Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.