engsrb
B2B Login
About us


The industry leader in Israeli for CCTV, PROVISION-ISR, offers significant value to security professionals through a network of international partners. Since its founding, Israel has become a leader in the field of homeland security. Many Israeli security manufacturers have backgrounds in a variety of fields, including emergency management, cyber-security, intelligence, the protection of critical infrastructure, smart cities, and, in the case of Provision-ISR, cutting-edge CCTV solutions. Currently, Provision-ISR has branches and official exclusive distributors serving more than 40 nations globally.


CCTV is a crucial component of maintaining public safety in many types of establishments, including retail stores, banks, and essential infrastructure. Unfortunately, because surveillance footage is becoming more IoT linked, these systems are top targets for fraudsters. Nano Agent is an embedded runtime protection system that offers built-in security against threats including import table hijacking, control flow hijacking, import table corruption, and access control. It ensures complete firmware coverage, including third-party components, without affecting the functionality of the hardware.


Nowadays’ CCTV cameras effectively act as minicomputers with operating systems, programs, networks, and radio frequency (RF) interfaces. They are hence open to hacking attempts. One of the main problems is that end users frequently continue using the default usernames and passwords, thereby opening the door for hackers. Traditional CCTV cameras do not have sufficient on-board security, not even with a strong password. Why would someone want to hack a CCTV camera, though? Criminals may want to obtain access to the camera’s controls in order to view the activity that the camera captures, turn the camera off, aim it in a new direction, modify the photos and related data, or simply switch it on and off. Additionally, because it is a network device, once compromised, it may be used to lateral shift to access private information on a company network, allowing hackers to utilize weaknesses to set up botnets or cryptocurrency miners.


ā€œOn a worldwide scale, even the organizations with the most significant market share have proved to have critical vulnerabilities,ā€ said Ami Finer, VP Sales at Provision-ISR. This is true because IP cameras have little room for conventional security software due to their low processing power. We at Provision-ISR strive to set the bar high by providing consumers with CCTV equipment that is completely safe. We need an optimized threat solution with a very tiny footprint that would also be 100 percent trustworthy in order to do that. Check Point steps in at this point. We now have a strong end-to-end security solution that involves identifying firmware security concerns, hardening the devices with runtime protection, and controlling devices with granular rules.


The need to secure IoT devices from cyberattacks is a must, according to Oded Gonda, VP Technology & Innovation at Check Point Software. Additionally, the necessary technology is at hand. Quantum IoT Protect offers on-device runtime protection against even the most sophisticated fifth generation assaults for all IoT devices, including 


IP cameras like Provision- ISR’s, routers, medical devices, and industrial controllers.