Security Monitor Pro turns your PC and IP cameras into a full video security and surveillance system. It is easy to use and extremely reliable for day-to-day operation. Configuration takes only a few minutes, even for a novice. Currently more than 2200 different IP camera models and virtually all Webcams are supported. Security Monitor Pro is the most feature rich IP video surveillance software.
When motion is detected, you can configure the program to create a video recording of the event, take photos, sound an alarm, or send you an email notification.
Each camera has its own settings for motion detection, recording, and actions. You can schedule cameras to monitor for motion between certain times, or on particular days of the week. Security Monitor Pro can automatically upload recorded video and photos to an FTP server for backup or remote viewing on a web site.
An optional hidden mode keeps Security Monitor Pro running in the background, with no icons in the Windows taskbar. No one will know video surveillance software is running on your PC.
Events are recorded from the very beginning, a few seconds before motion is detected. This allows you to see the triggering event that happens in the first few seconds. Security Monitor Pro preserves evidence of all activities in an event log by date and displayed by camera name.
Download the FREE trial version!
It is 100% safe! So what are you waiting for? Download Now!
Add automatic backups on Central Server and Security Server. By default, automatic backups are run once a day and they are automatically removed after 30 days. Retention period and backup execution interval and schedule are configurable by administrators. It is also possible to exclude the database from backups and include configuration files only. If needed, the automatic backup policies can be adjusted by editing /etc/cron.d/xroad-center (Central Server) or /etc/cron.d/xroad-proxy (Security Server) file.
Change Security Server service client's default connection type from HTTP to HTTPS. After the change mutual TLS authentication is used by default in the connections between a Security Server and a client information system.
The change affects only clients that are added using a Security Server version >= 6.22.0. Existing clients are not affected. New clients must either upload a certificate or change the connection type before they can be used for consuming services.
Add REST/JSON support to "listClients" metaservice. It is possible to define the response content-type of "listClients" metaservice using the HTTP Accept header. When Accept header's value is set to "application/json" the response is returned in JSON. Otherwise the response is returned in XML.
Add REST/JSON metaservice "listMethods". The metaservice returns in JSON a list of all REST APIs offered by a service provider. SOAP services offered by the same service provider are excluded from the response. Likewise, the SOAP version of the "listMethods" metaservice returns only SOAP services offered by a service provider. Before version 6.22.0 the SOAP version of the "listMethods" metaservice returned also REST APIs offered by the same service provider.
Add REST/JSON metaservice "allowedMethods". The metaservice returns in JSON a list of all REST services offered by a service provider that the caller has permission to invoke. SOAP services that the caller has permission to invoke offered by the same service provider are excluded from the response. Likewise, the SOAP version of the "listMethods" metaservice returns only SOAP services that the caller has permission to invoke offered by a service provider. Before version 6.22.0 the SOAP version of the "listMethods" metaservice returned also REST APIs that the caller has permission to invoke offered by the same service provider.
Add REST metaservice "getOpenAPI". The metaservice returns the OpenAPI 3 service description of a REST API. The returned service description is returned using the original content-type in which it has been published - JSON or YAML. The Accept header value set by the client is ignored as the Security Server does not support conversions between different content-types. Publishing an OpenAPI description for REST APIs is not mandatory. An error message is returned in case a service description is not available.
The algorithm implements a fixed retry delay for the time-stamper when fetching time-stamps fails - after failing to fetch time-stamps the time-stamper waits for the defined time period before trying again. This is repeated until fetching time-stamps succeeds. After successfully fetching a time-stamp, the time-stamper returns to normal time-stamping schedule.
Before the version 6.22.0 the Security Server continued to follow the regular time-stamping schedule during TSA service breaks. In case the regular time-stamping interval was long, the recovery took a long time too and requests to be time-stamped accumulated. The recovery algorithm prevents this from happening.
Implement a new management service that enables changing a Security Server's owner after the initial configuration. By default, Security Server owner change requests must be manually approved by the X-Road operator. Automatic approval can be enabled adding the below configuration in "/etc/xroad/conf.d/local.ini" on Central Server:
N.B.! To enable this feature after upgrading to version 6.22.0 from an older X-Road version, "managementservices.wsdl" must be refreshed on Central Server's Security Server, and "Security Server owners" global group must be granted access to the new "ownerChange" service.
Add support for changing Security Server owner to the Security Server. It is possible to change the Security Server owner after the initial configuration without reinstalling and configuring the whole Security Server. Changing Security Server owner requires that first another member is registered on the Security Server, and then the ownership is transferred from the current owner member to the newly registered member. Changing the owner does not cause a service break to the Security Server.
In case the authentication certificate of the Security Server contains owner specific information, it is advised to renew the certificate once the owner has been changed. Technically, the old certificates continues to work with the new owner even if it was issued to the previous owner. Administratively, the authentication certificate should be always issued to the present owner of the Security Server.
N.B.! Old backups taken before the owner change cannot be restored once the owner is changed. An attempt to restore an old backup results an error message. It is recommended to take a manual backup once the owner change has been successfully completed.
Add operational monitoring package as required for the installation of Finnish Security Server meta package ("xroad-securityserver-fi"). Starting from version 6.22.0 installing the Finnish meta package automatically installs the operational monitoring package.
N.B.! Existing Security Server installations must upgrade version and reinstall "xroad-securityserver-fi" meta package to enforce the installation of the operational monitoring package.
Update the Security Server UI to support the management of more fine-grained authorization of REST APIs. Starting from version 6.22.0 the authorization of REST APIs can be done on two different levels:
If authorization is defined on REST API level, it applies to all the endpoints under the API. It is not possible to grant access on API level and then deny access to specific endpoint(s). In case an API consists of multiple endpoints and access needs to be granted to only some of them, endpoint level authorization should be used.
If OpenAPI description is provided, Security Server imports all the endpoints defined in the service description automatically. In addition, endpoints can be added manually. Manually added endpoints can be edited and removed, but endpoints imported from an OpenAPI definition are read-only. Changing them must be done updating the OpenAPI definition and then refreshing it in the Security Server UI.
Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.
Modernize your service desk with intelligent and automated ticketing, asset, configuration, and service-level agreement (SLA) management; a knowledge base; and a self-service portal with secure remote assistance. SolarWinds offers an easy-to-use IT service management (ITSM) platform designed to meet your service management needs to maximize productivity while adhering to ITIL best practices.
Ensure user experience with unified performance monitoring, tracing, and metrics across applications, clouds, and SaaS. Robust solutions offering rich visualization, synthetic and real user monitoring (RUM), and extensive log management, alerting, and analytics to expedite troubleshooting and reporting.
Reduce attack surface, manage access, and improve compliance with IT security solutions designed for accelerated time-to-value ranging from security event management, access rights management, identity monitoring, server configuration monitoring and patching, and secure gateway and file transfer.
SolarWinds was founded by IT professionals solving complex problems in the simplest way, and we have carried that spirit forward since 1999. We take pride in relentlessly listening to our customers to develop a deeper understanding of the challenges they face. Our digital agility solutions are built to help companies of any size accelerate business transformation today and into the future.
Professional video surveillance software with support for multiple cameras. Security Monitor Pro is the perfect solution for complex security problems. It can monitor and record from up to 32 IP cameras and up to 4 USB cameras simultaneously, create continuous video recordings, and preview multiple cameras in a single window. Each camera has its own individual monitoring and recording settings. When motion is detected, it can send e-mail, record audio and video, and/or sound an audible alarm. In addition, the software maintains a detailed event log.
e59dfda104