[fusion_builder_container hundred_percent=”yes” overflow=”visible” margin_top=”20″ margin_bottom=”” background_color=”rgba(255,255,255,0)”][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_separator /]
Convergence of Physical & Cyber Security
[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”yes” overflow=”visible” margin_top=”20px” margin_bottom=”40px” background_color=”rgba(255,255,255,0)”][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_separator style_type=”single solid” sep_color=”#dd9933″ icon=”fa-circle-thin” width=”” class=”” id=””/]
[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”yes” overflow=”visible”][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_content_boxes layout=”icon-with-title” columns=”3″ class=”small-margin-bottom” id=”” hover_accent_color=”#5b1b16″]
[fusion_content_box title=”Protection in Depth” backgroundcolor=”” icon=”fa-lock” iconcolor=”” circlecolor=”” circlebordercolor=”” iconflip=”” iconrotate=”” iconspin=”no” image=”” image_width=”35″ image_height=”35″ link=”” linktarget=”_self” linktext=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″]Virtually every security application needs a layered approach that will include perimeter, boundary and volumetric protection overlaid with cyber security encryption and hardening. We are militarily trained and certified, giving you the greatest background and information available.
Whether the application is government, commercial, energy or other critical infrastructure, layered security is vital to the integrity of your surveillance and intelligence platforms. Our experience includes the toughest of environments:
- Power Grid Transmission and Substation
- Classified server rooms
- United States Army & Air Force facilities
- Arms, Ammunitions and Explosive Devices (AA&E) facilities
- Joint Command Operations Headquarters
- Universities and School Districts
- Commercial & Retail
We have cultivated trusted relationships with industry leading manufacturers to ensure quality and performance at every level. Furthermore, we will never publish your identity or security solutions on the internet to promote our brand.
[/fusion_content_box]
[fusion_content_box title=”End to End Encryption” backgroundcolor=”” icon=”fa-gears” iconcolor=”” circlecolor=”” circlebordercolor=”” iconflip=”” iconrotate=”” iconspin=”no” image=”” image_width=”35″ image_height=”35″ link=”” linktarget=”_self” linktext=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″]
Encrypted communication and other device hardening features are necessary for cyber security, but it’s vitally important to think beyond hardening. An unsecured device can be the target of a cyber attack that might affect the entire network. The recent Axis camera vulnerability gave proof to this. We provide:
- Archive and Failover features to ensure continual operation and fast recovery
- LDAP Support to manage credentials.
- FIPS 140-2, Level 2, end-to-end validated encryption
- Cyber Protection Program – Layers 1-5
Using cryptographic modules on IP security cameras and devices has never been more important. When government agencies purchase cheap technology, they immediately put themselves at risk for cyber attacks that can turn cameras into miniature botnets to attack other network computers, or exfiltrate critical data.
It is no longer acceptable to expose private or corporate network LANs to vulnerable security solutions. Local, City, State and Tribal governments must become more aware of combatant schemes against them in order to take necessary action.
[/fusion_content_box]
[fusion_content_box title=”Compliant Solutions” backgroundcolor=”” icon=”fa-check-circle” iconcolor=”” circlecolor=”” circlebordercolor=”” iconflip=”” iconrotate=”” iconspin=”no” image=”” image_width=”35″ image_height=”35″ link=”” linktarget=”_self” linktext=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″]
Only a handful of manufacturers and system integrators can offer the following compliance guarantees. These compliance standards insure your security solution is as safe as the assets you are protecting.
- North American Electric Reliability Corporation – Critical Infrastructure Protection (NERC CIP v5) Compliant
- Third Party NERC-CIP V5 (014-2) Verifier
- Member IEEE Standards for Electronic Systems
- Federal Information Security Management Act (FISMA) Compliant
- Defense Information Systems Agency (DISA) Compliant
- Federal Information Processing Standards for end to end encryption validation
- FIPS 201
- FIPS 197
- FIPS 140-2
Successfully deploying these solutions for local government, military and Fortune 500 companies equips us to execute appropriate technologies for maximum security, encryption and integrated performance.
[/fusion_content_box]
[/fusion_content_boxes]
[/fusion_builder_column][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_social_links icons_boxed=”” icons_boxed_radius=”4px” icon_colors=”” box_colors=”” tooltip_placement=”” rss=”” facebook=”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fsurvone.com%2F” twitter=”https://twitter.com/intent/tweet?text=Check%20out%20%40SurveillanceOne” instagram=”” dribbble=”” google=”” linkedin=”https://www.linkedin.com/cws/share?url=http%3A%2F%2Fsurvone.com” blogger=”” tumblr=”” reddit=”” yahoo=”” deviantart=”” vimeo=”” youtube=”” digg=”” flickr=”” forrst=”” myspace=”” skype=”” paypal=”” dropbox=”” soundcloud=”” vk=”” email=”” show_custom=”no” class=”home-sharing-box” id=””/]
Share Us
[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]
Recent Comments