All great enterprise software includes reporting that provides actionable information to help answer important questions about the product and, hopefully, about your business. By understanding the value of in-depth reporting, we have developed an easy and intuitive way for customers to know the status of their cameras and exactly how they are functioning.
Today, we’re excited to announce several new reports to better assist you in managing your Rhombus cameras!
The Device Inventory report will give you detailed information about the entire population of your cameras. You can run this report for all or just a subset of locations. From here, you are then able to view relevant information, such as device name, firmware, and more.
The Camera Uptime report will provide a detailed look for when cameras were online and when they were not. The report digs deeper to tell you exactly when the camera has stored footage and when there is no footage available (powered off). This report is incredibly helpful in diagnosing issues like when the internet was down versus when there was a power outage.
The Bandwidth Report allows you to visualize bandwidth consumption across as many cameras as you want. You have the option to select between upload or download to understand which cameras might be taking more bandwidth or how much bandwidth all cameras at a certain location are consuming.
These new reports provide a deeper level of understanding on how your video security system is operating and is available in the “Logs & Reports” section in the Rhombus Console. All data is downloadable so that you can crunch the numbers based on your particular needs. Give the new reports a try and let us know if you have any suggestions for improvements, or if there’s any specific feature that you would like to see!
On December 9th 2021, the Apache Log4j project disclosed a zero day vulnerability that affects Log4j. This vulnerability is also known as Log4Shell. Upon learning of this exploit, Rhombus took immediate action to see if any of its services used Log4j. Our analysis over the last few days found the following.
Cybersecurity is becoming an increasing priority for enterprise organizations. Because cybersecurity deals with data, privacy, and security, organizations today are finding that cybersecurity and physical security—especially video surveillance—are unavoidably linked. But what exactly do you need to worry about when it comes to cybersecurity and video surveillance? How can you protect your video security system against breaches and cyberattacks? How do you know that the data privacy of your employees, customers, and more is secure? This guide will help you understand what good cybersecurity standards and practices look like in a video security context. You’ll learn what best practices you personally can follow, and what best practices you should look for in a vendor.
Many CJIS-compliant organizations wonder how video surveillance fits into their security policies. Security cameras help criminal justice organizations secure their facilities and protect employees. However, it’s crucial to maintain CJIS compliance to protect Criminal Justice Information (CJI) while using a video security solution. In this article, you’ll learn how to use security cameras in a CJIS-compliant way, and how you can use video surveillance to strengthen overall CJIS compliance throughout your entire organization.