Severna Park, MD – Tactuity LLC has developed a small, compact, affordable and easy to use security device to protect networks from malicious software, increasingly found in many popular surveillance cameras. The advent of ‘plug and play’ security and surveillance cameras both commercially and for the consumer, has opened windows into every network to which these cameras are attached. Tactuity research on these cameras has found that the software built into the cameras first map the network to which it is connected and then searches or “reaches back” for a path ‘home’ to the manufacturer or other unknown unauthorized persons. Tactuity found that these ‘reach back’ operations are performed as frequently as every three seconds until a route is established. Once established, this can allow the injection of spyware, malware or ransomware packages into that network. Alarmingly, these packages can lie dormant until directed to attack. ‘Castle & Moat’ security postures, once the first line of defense are no longer viable as more and more processing moves to the edge close to the camera. CKUR is designed to support a decentralized security stance and supports least privilege/zero trust principles. CKUR is specifically designed to mask network address assignments and block any attempt to traverse networks. The CKUR application uses AI to learn and block threat profiles The software also logs all activity, whether authorized or not, to give network owners and operators a complete view of the activity on the edge.
To learn how these innovative security packages can benefit your organization, please contact Tactuity by email, email@example.com or contact Len Corasaniti on 410-22-4253.