White Papers


Protections & Authentication

Cyber security comprises technologies, processes and controls that are designed to protect systems, networks and data from cyber attacks.  Effective cyber security reduces the risk of cyber attacks, and protects organisations and individuals from the unauthorised exploitation of  systems, networks and technologies.

Access Full White Paper Here



Protecting Sensitive Data and Software Security Vulnerabilities

High-profile data breaches have made application security a boardroom issue and our prospects and customers are being extra cautious about
the applications that they bring into their IT environments. This caution is being translated into the procurement process, where customers are asking us to demonstrate the security status of our software and what practical measures we have in place to ensure Traka Web and Touch are secure, as part of their buying decision.

Access Full White Paper Here



ISO 27001 is the de facto international standard for Information Security Management

Traka’s implementation of ISO 27001/2013 Information Security Management System (ISMS) shows its commitment to ensuring our operational and commercial processes follow strict defined criteria for controlling information flow. Information assets in all forms are some of the most important organisational assets and Traka has recognised that these assets hold clear value and should be appropriately protected, under explicit management control. With the ISO 27001 Standard being a formal specification it means that requirements are mandated, monitored, reviewed and formally audited to ensure continual improvement and compliance.

Access Full White Paper Here


Hanwha techwin cyber security white paper

Securing Video Surveillance Devices to Close Network Vulnerabilities

While IP-based video surveillance and other solutions have grown in popularity to become the accepted standard for new deployments and upgrades, security systems are no exception. A hacker does not discriminate among networked devices whether it performs a critical function like security or not. As such, video surveillance cameras and other devices are among the lengthy list of potential network entry points that are continually being probed for vulnerabilities that can be exploited. Therefore, it is essential that organizations take the necessary measures to ensure the highest level of security for their networks and IP cameras, encoders, NVRs and DVRs. There are a number of best practices that should be undertaken to strengthen device security to prevent unauthorized access and protect end users video surveillance systems and their overall network. 

Access Full White Paper Here


hanwha techwin network hardening guide

An Understanding of the the Importance of Network Hardening

In the video surveillance market, a paradox is emerging that network surveillance devices developed to protect customers, property and personal information in recent years are used as a means of seizing personal information. Network surveillance device processes and manages video data that can be used as sensitive personal information. Since it is based on the network, remote access is possible from anywhere in the world where the network is connected. Because of this nature, network surveillance device is subject to ongoing cyber attacks. Hanwha Techwin has been continuously making efforts to strengthen cyber security with a careful consideration of customers' property and personal information. We hope that this guide will help you understand and safely use the security features implemented in Hanwha Techwin product. 

Access Full White Paper Here