Cybersecurity

Vulnerability Management

IDIS takes a thorough and transparent approach to managing and responding to vulnerabilities in our products and services, minimizing potential risks for our customers.

Prevent Successful Cyberattacks
and Simplfy Operations

img-4

DirectIP

Network security through a powerful mutual authentication system

img-5

Firewalls On NVRs

Firewalls on NVRs utilizing IP and port authentication

img-6

Two-Factor Authentication

Multi-factor authentication using accounts and registered mobile apps

img-7

TLS

Secure data transmission combining IDIS’ proprietary technology with TLS

img-8

FEN Security

Access and data transmission security over public networks

img-9

iBank

Data protection using IDIS’ proprietary database structure

img-10

Chained Fingerprint

Preventing data forgery andmaintaining data integrity

Report a Vulnerability

If you have discovered a new vulnerability in any of our products or services, we encourage you to submit your discovery to security@idisglobal.com. The IDIS Cybersecurity Team will respond to your vulnerability submission within 7 days and aim to assess your report within the same timeframe.
After thoroughly reviewing the information you provided, if any vulnerabilities are identified, we will contact you individually with details, and you can also track the progress of your report: https://www.idisglobal.com/ticket.