Home » Blog

Secure Video Monitoring With CHeKT

Key Takeaways

  • Port-Forwarding and DDNS Pose Major Security Risks: Port-forwarding allows external access to internal video devices, which transfers network security responsibility to the video device itself, making it prone to compromise. DDNS does not enhance security and may increase vulnerability due to easier access.
  • CHeKT Eliminates Insecure Legacy Methods: CHeKT completely removes the need for port-forwarding and DDNS. Instead, its solution secures remote video monitoring by establishing secure communication channels without requiring port-forward rules or static IP addresses.
  • Cloud Relay is CHeKT’s Preferred Connection Method: While both P2P and Cloud Relay offer a balance of convenience and security, CHeKT uses Cloud Relay. This method is favored because it manages security centrally in the cloud, allows for stronger passwords, supports encrypted video streams, and provides centralized control over access.
  • Secure Communication without a Traditional VPN: CHeKT avoids the complexity and restrictive nature of a traditional VPN. Instead, it employs an encrypted TLS protocol through its Video Control Panels to establish secure communication channels and ensure encrypted access to video devices.

Secure Video Monitoring With CHeKT

CHeKT delivers real-time video access to command and alarm monitoring centers. Our focus is on providing a swift, intuitive experience for agents, with robust security and data privacy our engineering team ensures.

Remote video monitoring is crucial for many clients. Instant live video alerts from alarm systems, combined with video analytics and AI, enhance property protection by offering agents clear situational awareness, even in low light.

However, concerns about cybersecurity are valid with remote video monitoring. We must use secure methods for remote camera access. Our Proactive Visual Security platform prioritizes cybersecurity; we encrypt all communications between the protected site and monitoring center to safeguard against risks.


Port-Forwarding & DDNS

For many security companies, the battle between protecting a client’s network and providing interactive video services is an internal struggle of convenience vs security.  Unfortunately, in many situations, the choice comes down to convenience, both for the dealer and the customer.

Unfortunately, port-forwarding video systems can jeopardize network security, but many installers see it as the only option for remote access. With CHeKT, however, you can eliminate the risks of port-forwarding while still providing secure remote video monitoring.

What is Port Forwarding?

Port-forwarding allows external access to internal video devices, which poses significant security risks. This method shifts network security from the firewall to the video device, which is not equipped to handle cyber threats, and therefore it is prone to compromise.

Is DDNS a Better Option?

Dynamic Domain Name Services (DDNS) simplifies access to port-forwarded devices by providing an easy-to-remember name instead of an IP address. However, it doesn’t enhance security and may even increase vulnerability due to the ease of access.

Does CHeKT Use Port Forwarding or DDNS?

No, CHeKT eliminates the need for port-forwarding and DDNS. Our solution secures remote video monitoring by removing all port-forward rules and DDNS names, offering a safer alternative that doesn’t require static IP addresses.


P2P & Cloud Relay Services

Some camera brands will use an onboard Peer-to-Peer (P2P) or cloud relay service to enable remote access to their video devices. Utilizing a manufacturer’s P2P service has the potential of being more secure than port forwarding devices. When using a manufacturer’s P2P or Relay services, it’s important to know if their development and software services have a reputation of integrity and trustworthiness.

P2P and Relay connections are managed by a remote cloud of the manufacturer and are not typically regulated. With P2P solutions, the security of the customer’s network is impacted by the quality and integration of the P2P or Relay service.

Things to consider when evaluating a company’s P2P or Relay technology.

  • Does the company have a history of cyber incidents?
  • Do third-party cyber security experts trust the manufacturer?
  • Does the manufacturer routinely test and patch newly discovered software vulnerabilities?
  • Do the cloud services comply with government regulations, like GDPR?
  • In what country are the cloud servers located?

How Does Peer-to-Peer (P2P) Work?

P2P establishes a direct connection between two devices, such as a camera and a remote viewer. The camera initiates the connection, creating a secure device-to-device link that’s less prone to compromise. Managed by the manufacturer’s cloud servers, a “pin-hole” method communicates the connection details, where the camera reveals its port and address to the cloud. Once it establishes the connection, the devices communicate directly without further cloud involvement.

What is a Cloud Relay Connection?

Cloud Relay works similarly to P2P but maintains the connection through the manufacturer’s cloud infrastructure. The cloud handles and relays all communications between the remote user and the video device.

Is P2P or Cloud Relay More Secure?

Both P2P and Cloud Relay offer a balance of convenience and security but have associated risks. Poorly developed systems or untrustworthy companies can compromise security.

  • Cloud Relay: The cloud manages security centrally, which allows for stronger passwords and enhanced measures. This method supports encrypted video streams and centralized control over access and security.
  • P2P: Security relies on the device’s integrity and cloud infrastructure. Issues include discoverable connection details, potential for weak passwords, and unencrypted video streams.

Does CHeKT Use P2P or Relay Services?

For these reasons, CHeKT uses Cloud Relaywhich creates a secure, encrypted TLS connection between CHeKT Video Bridges and the CHeKT Cloud for communication. This method ensures encrypted video and secure authentication.

Central management in the CHeKT cloud allows for easy modification of access and password security. CHeKT also encrypts all video streams and offers a patented privacy mode feature, which limits monitoring agent access while providing services. CHeKT’s solution operates through Amazon AWS and is GDPR compliantwhich further enhances overall security.


VPN Services

Using a VPN for Video Transmission

A VPN (Virtual Private Network) provides high security for transmitting video between locations but can be complex and restrictive to deploy. It requires dedicated hardware or internal machines on both ends, often demanding significant technical expertise and additional equipment for multiple users.

Some manufacturers offer specialized boxes or servers for easier VPN setup, though they usually come with extra costs.Nonetheless, these solutions provide top-notch security for the customer’s network.

Does CHeKT Use a VPN?

CHeKT does not use a traditional VPN. Instead, CHeKT employs an encrypted TLS protocol to establish secure communication channels through its Video Control Panels. This method ensures encrypted access to video devices without the need for VPN infrastructure.

Conclusion

  • Avoid Insecure Legacy Methods: Port-forwarding and DDNS shift network security from the firewall to an unequipped video device, creating significant vulnerability; CHeKT eliminates the need for both.
  • Cloud Relay Provides Centralized Security: CHeKT utilizes Cloud Relay over P2P, which allows security to be centrally managed, offering benefits like stronger passwords, enhanced measures, and secure, encrypted video streams.
  • Secure and Encrypted Protocol: CHeKT secures all remote video monitoring through an encrypted TLS protocol between the Video Bridges and the CHeKT Cloud, ensuring data integrity and safe authentication without the complexity of a traditional VPN.
  • Prioritizing Privacy and Compliance: CHeKT’s solution includes a patented privacy mode, encrypts all video streams, operates on Amazon AWS, and is GDPR compliant, ensuring a robust framework for cybersecurity and data privacy.

FAQ

Q: What is the main security risk associated with using Port-Forwarding for remote video access?

A: The main risk is that Port-forwarding shifts network security from the firewall to the video device itself. Because the video device is not equipped to handle sophisticated cyber threats, this method poses significant security risks and makes the network prone to compromise.

Q: Which remote access technology does CHeKT use, and what is its primary security advantage?

A: CHeKT uses Cloud Relay. The primary advantage is that security is managed centrally in the cloud, which allows for stronger passwords, enhanced measures, and centralized control over access and security for encrypted video streams.

Q: How does CHeKT secure video transmission without relying on a traditional VPN?

A: CHeKT employs an encrypted TLS protocol (Transport Layer Security) to establish secure communication channels through its Video Control Panels. This ensures encrypted access to video devices without the complexity or infrastructure requirements of a traditional VPN.

Vice President of Operations and Innovation – Problem solver, operator, and technology leader with deep experience building and scaling B2B platforms in the security and video monitoring industry. As VP of Operations and one of the inventors behind the CHeKT Proactive Visual Security Platform, has helped lead the company from early stage growth to multi million dollar revenue, national adoption, and acquisition.