St. Charles Hospital Video & Sensors
Cloud Video Surveillance Management Platform
- Easy to set up
- WiFi Cameras
- Portable – easy to relocate
- Continuous recording in the cloud
- 24/7 Web access to live & recorded video
- Manage all your cameras on a single dashboard
- Remote access from computer, smartphone or tablet
- Alert notifications on phone, not using text messaging
- Cloud-stored video is safe from being stolen or destroyed
- Share video with multiple users with no video degradation
- Web-based, no proprietary software to install
- Play downloaded video on any video player, no software required
- Display live video from your smartphone on the same dashboard
As the leading online surveillance provider, the security of your surveillance video is always a priority at eliVita. We are committed to implementing stringent measures to ensure your data stays secure.
- Your account information remains private
- You are protected from any unauthorized activity
- Multiple layers of redundancy ensures that your video data is adequately backed up
MILLS POND VIDEO CAMERA LOCATIONS
273 Moriches Road
St. James NY, 11780
How We Protect You
TeliVita’s networks are protected 24 hours a day by industry leading network firewalls that block unauthorized entry.
Multiple Layers of Redundancy
Every critical network component within our network from hardware to utility lines has an equally redundant component to ensure service stability and up-time.
TeliVita’s IT team maintains and monitors our internal network and access to all critical systems to make sure your accounts are safe and secure.
To keep up with evolving online threats, TeliVita has adopted proven industry standards for technology that protects your video data.
Providing secure transmission of data is similar to using a courier to bring a valuable and sensitive document from one person to another. When the courier arrives at the sender’s place, he would normally be asked to verify his identity. Once doing so, the sender would decide if the courier is the one he claims to be, and if he can be trusted. If everything seems to be correct, the locked and sealed briefcase would be handed over to the courier, and he would deliver it to the recipient. At the receiver’s end, the same identity procedure would take place, and the seal would be verified as “unbroken.” Once the courier is gone, the recipient would unlock the briefcase and take out the document, which can now be read. A secure communication is created in the same way, and is divided into three different steps.
This initial step is for the user or device to identify itself to the network and the remote end. This is done by providing some kind of identity to the network/system, like a username and password.
The next step is to have this authentication authorized and accepted, i.e., to verify that the device is what it claims to be. This is done by verifying the provided identity with a database or list of correct and approved identities. Once the authorization is completed, the device is fully connected and operational in the system.
Network video manufacturers commonly define 3-tier password-protection levels within their products. Most network cameras, support ‘anonymous user access’ (by default), which means that in the absence of a password, the camera images are available to everyone with access to the network. At the viewer access level, you can set that only certain viewers with predefined passwords may be allowed to view live images or alter camera configuration. The third level of access is the operator. Defined operators would have access to not only the live images, but also control pan/tilt/zoom functions if the product has such a feature, and access to the product’s Web interface to check on port statuses and configure events. The highest level of access is the administrator. Defined administrators would have full access to the system and be able to define users, set alarm ports and make changes to the system’s settings.
Another security feature is IP address filtering, which allows only defined IP addresses to access the product.
The final step is to apply the level of privacy required. This is done by encrypting the communication, which prevents others from using/reading the data. The use of encryption could substantially decrease performance, depending on the implementation and encryption used.
Privacy can also be achieved by VPN:
VPN (VIRTUAL PRIVATE NETWORK)
A VPN creates a secure tunnel between the points within the VPN. Only devices with the correct “key” will be able to work within the VPN. Network devices between the client and the server will not be able to access or view the data. The tunnel will allow for multiple programs to communicate securely. The VPN network can reside within a normal company LAN (Local Area Network), and/or over public networks such as the Internet. With a VPN, different sites can be connected together over the Internet in a safe and secure way. VPN connection is commonly used by business travelers to access their corporate network, wherever they are; for instance, from a hotel room. A VPN tunnel can be more or less secure depending on how complex the “key” and the configuration are.
PROTECTING SINGLE DEVICES
Security also means protecting single devices against intrusions, such as an unauthorized user trying to gain access to the unit, or viruses and similar unwanted items.
Access to PCs or other servers can be secured by using user names and passwords, which should be of at least 6 characters long (the longer the better), combining numbers and figures (mixing lower and upper cases). In the case of a PC, tools such as finger scanners and smart cards can also be used to increase security and speed up the login process.
To secure a device against viruses, worms and other unwanted items, it is strongly recommended to have a virus scanner of good quality with up-to-date filters installed on all computers. And operating systems should be regularly updated with service packs and fixes from the manufacturer. When connecting a LAN to the Internet, it is important to use a firewall. This will act as a gate keeper, and will block or restrict traffic to and from the Internet. It can also be used to filter information passing through the firewall or restrict access to certain remote sites