Leading a Revolution in CCTV Cyber Security

Check Point & Provision-ISR join forces in creating a new CCTV platform
embedded with real-time Cyber Security at the firmware level.

About Check Point​

Check Point Software is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks.

Check Point offers a multi-layered security architecture that protects cloud services, e-mail, network, and endpoint devices. It is a comprehensive and intuitive security management and monitoring system that allows the network security manager to receive an up-to-date and complete Situational report at any given moment.

Check Point protects over 100,000 organizations of all Sizes.

The Market Scenario

IoT products, in general, and modern CCTV cameras essentially function as small computers that run operating systems and applications. As such, they are also susceptible to hacking attacks

The distinctive characteristics of CCTV cameras make them a desirable target for attack. Hackers use more sophisticated and unique methods to access networks, data, and assets. They aim to gain a foothold in sensitive networks, exploit vulnerabilities quickly, and profit from them.

Provision-ISR recognized the risks and understood the importance of using cyber protection experts for its products. This led to the ground-breaking collaboration with Check Point Software Technologies Ltd., which, with its innovation, developed a unique protection tool for IoT products.

Provision ISR is proud to be the pioneer in implementing an advanced cyber security solution in its products and giving its customers peace of mind and privacy in an ever-evolving and dangerous cyber-physical world.

Check Point IoT Protect Nano Agent

The revolutionary Check Point IoT Protect Nano Agent provides runtime Protection for IP-connected CCTV systems, enabling Provision-ISR devices with built-in firmware security.

Implementing the ‘Quantum IoT Protect Nano Agent’ protection component in CCTV devices prevents hackers from taking control, adding malicious code, running remote code (RCE), or disrupting the device’s normal operation.

The Nano Agent is based on real-time anomaly detection and is not a signature-based solution. The component activates advanced protection mechanisms at the operating system and application levels and uses several innovative means, among others worthy of mention:

  • Anti-Shell Injection – monitoring shell commands executed by protected processes and their analysis to detect malicious code or command insertion attempts.
  • File Monitor – monitors the file system and prevents the possibility of adding or writing over existing files.
  • Import-Table Protection – monitoring API calls made through the import table to prevent exploitation of the function pointers from inserting an error code.
  • Control-Flow Integrity (CFI) – as the software runs, it “paces” on the command run path. This protection agent pre-maps all the branching paths of the software run and functions. During the run, the mechanism verifies that there is no deviation from the legal flow. Attempting to run malicious code will inevitably lead to deviation, which will be detected and stopped immediately.
  • Dynamic-Memory Protection – monitoring memory allocations and usage so that each dynamic memory allocation is checked and malicious code cannot use the volatile memory.

Raising the bar on CCTV Cyber Security

The First CCTV Platform embedded with real-time Cyber Security!


Embedded Runtime Protection for CCTV Devices

Solution Benefits​

Embedded Runtime Protection for CCTV Devices

Security that doesn’t impact CCTV operations​

On-device runtime protection prevents zero-day attacks with no impact on device performance.

Fend off the most sophisticated CCTV device attacks​

including shell injections, memory corruption, control flow hijacking, and more.

Prevent organization-network intrusions​

including ransomware, bot infections (Mirai), crypto mining, and lateral movement in enterprise networks as part of a large, sophisticated nation-state attack.

Secured IP Surveillance Solution

Cyber Security Awareness in the field of CCTV

NDAA Compliance​

The John S. McCain National Defense Authorization Act (NDAA) for the Fiscal Year 2019 was passed on August 13, 2018. 

The law, specifically Section 889, prohibits federal agencies, their contractors, and grant or loan recipients from procuring or using “telecommunications and video surveillance equipment or services” from specific Chinese companies as a “substantial or essential component of any system, or as critical technology as part of any system.” 

The NDAA ban includes telecommunications equipment produced by Huawei Technologies Company or ZTE Corporation and video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company.

Provision-ISR supports NDAA compliance across its product line and is committed to complying with all government and international trade regulations. Provision-ISR is committed to providing NDAA Section 889-compliant products and does not have OEM, ODM, and JDM relationships with the named vendors in the NDAA. 

Provision-ISR cameras and network video recorders (NVRs), which do not use or deploy critical components, including SoCs produced by NDAA-banned component vendors, comply with the NDAA.


Solution Brief


Want to know more?


Discover realms of knowledge.
Our webinars cover everything from product insights to the company's roadmap.
Click to connect with a wealth of knowledge.

Let's Talk

Contact Us

Have a Question or Want to Collaborate?
Click here to Send Us a Message. We Value Your Input and Look Forward to Hearing from You!

Go to page

Where to Buy

You can find the nearest trusted partners and distributors in your area for our products and services worldwide, ensuring convenient access to our top-tier products.

Go to page