Eagle Eye Networks implements two-factor authentication for VMS

by Brianna Crandall — January 25, 2017 — Austin, Texas-based Eagle Eye Networks, provider of on-demand cloud-based security and operations video management systems (VMS), just announced implementation of two-factor authentication across the Eagle Eye Security Camera VMS, including its iOS and Android mobile applications.

Two-factor authentication provides enhanced security for all Eagle Eye users by establishing trusted devices and only allowing camera and video access from those trusted devices, explains the company. Two-factor authentication is utilized by most banks to protect online access to bank accounts and money transfers.

Eagle Eye Network’s two-factor authentication has been deployed globally across its seven data centers. All users of the Eagle Eye Security Camera VMS can employ this added layer of security, indicating the company’s “paramount concern” for its customers’ cyber security in addition to physical security.

Two-factor authentication is an extra layer of security for each Eagle Eye Account designed to ensure that only authorized users can access each Eagle Eye account and cameras, even if someone obtains a password, explains the company.

How it works

With two-factor authentication, an Eagle Eye account can only be accessed on devices that are trusted, like a mobile phone or a computer.  When a user wants to utilize a new device for the first time, that user will need to provide two pieces of information — a password and a six-digit security code that must be obtained via a trusted phone number or a trusted e-mail address.

Because a password alone is no longer enough to access an Eagle Eye account, two-factor authentication is said to dramatically improve the security of each Eagle Eye account and access to corresponding cameras and video.

Once logged in, an Eagle Eye user will not be asked for a security code on that device again unless the user logs out completely, erases the device, or needs to change a password for security reasons.  When an Eagle Eye user logs in on the Web, that user can choose to trust a browser so the user will not be asked for a security code the next time that user logs in from that same computer.

Trusted devices:  A trusted device is a mobile device or a browser on a particular computer that has previously successfully logged in using two-factor authentication. It is a device that is known to be associated with that Eagle Eye user.

Trusted phone numbers and e-mails:  A trusted phone number is a number that can be used to receive a security code by text. A trusted e-mail address is the e-mail address for the Eagle Eye user on the Eagle Eye account.

Security code:  A security code is a temporary code sent to a trusted device or phone number when the user logs in to a new device or browser.

Eagle Eye Networks delivers on-demand cloud-based security and operations VMS providing both cloud and on-premise recording. Eagle Eye also provides a cloud video API for integrations and application development. The Eagle Eye platform offers secure, encrypted recording, camera management, mobile viewing and alerts, and first responder real-time video access — all 100% cloud managed.

The Eagle Eye Cloud Security Camera VMS supports a broad array of Internet protocol (IP) and analog cameras while using Intelligent Bandwidth Management, making it easy to deploy at single and multiple sites. The API platform uses the Eagle Eye Big Data Video Framework, with time-based data structures used for indexing, search, retrieval and analysis of the live and archived video.