Cybersecurity
Vulnerability Management
IDIS takes a thorough and transparent approach to managing and responding to vulnerabilities in our products and services, minimizing potential risks for our customers.
Prevent Successful Cyberattacks
and Simplfy Operations
and Simplfy Operations
DirectIP
Network security through a powerful mutual authentication system
Firewalls On NVRs
Firewalls on NVRs utilizing IP and port authentication
Two-Factor Authentication
Multi-factor authentication using accounts and registered mobile apps
TLS
Secure data transmission combining IDIS’ proprietary technology with TLS
FEN Security
Access and data transmission security over public networks
iBank
Data protection using IDIS’ proprietary database structure
Chained Fingerprint
Preventing data forgery andmaintaining data integrity
Report a Vulnerability
If you have discovered a new vulnerability in any of our products or services, we encourage you to submit your discovery to security@idisglobal.com. The IDIS Cybersecurity Team will respond to your vulnerability submission within 7 days and aim to assess your report within the same timeframe.
After thoroughly reviewing the information you provided, if any vulnerabilities are identified, we will contact you individually with details, and you can also track the progress of your report: https://www.idisglobal.com/ticket.