hamburger-nav-icon
region-flag-icon
Search by Category
Audio
Cameras
Cases & Bags
Computers
Conferencing
Content Management
Control
Displays
Furniture
Lighting & Studio
Mounts & Rigging
Networking & Cabling
Power
Presentation
Production
Residential
Security & Safety
Signal Management
Search by Manufacturer
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
#
Search by Category
EnglishFrenchGermanItalianPortugueseSpanish
2n
Request
More Information
Project List
Protect the Network With The Right Configuration of 2N Products
Posted on Tuesday, September 22, 2020
Protect the Network With The Right Configuration of 2N Products

Sept. 22, 2020 - Do you know how to configure 2N products so that they don’t represent a weak link in network security? If you don’t, it doesn’t matter. We have a new set of instructions to help you with that – our Hardening Guide.

An intercom calls the answering unit, and the reader in the garage opens the door. Everything works as it should. But there is one more thing which you have to do to ensure our products do not provide a way into the network for hackers. What specifically are we talking about? You can read about that in the new manual.

This manual can help you configure basic security parameters and special settings to minimise the success rate of cyberattacks. We have divided settings into three levels and indicated them with one, two or three stars.

Level * - you should always adjust settings indicated like this in all your installations. For example, upgrade products to the latest version of the firmware.

Level ** - in SMEs, you should also adjust settings with two stars and ensure higher-level network protection. How do you do that? For example, by setting up a list of permitted IP addresses for streaming.

Level *** - these types of settings are necessary for large enterprises/networks which carry a risk of targeted cyberattacks. The success of an attack like this would mean major property damage or loss of sensitive personal data. In this case, for example, we recommend setting up a web server certificate.

Don’t underestimate cybersecurity. Protect your customers. Don’t put your reputation on the line by neglecting to configure our products.