Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

Bosch and Genetec: End-to-end security, day after day

Bosch and Genetec: End-to-end security, day after day
The integration of all Bosch network video surveillance cameras with Genetec Archiver and Security Center will offer users an end-to-end data security solution, giving them an upper hand over hackers.

Some of the world’s biggest crimes go unnoticed

The Internet of Things makes our lives more connected, but it also leaves us vulnerable to cybercrime. Online hacking has become so widespread that, by 2021, it’s estimated that the cost of cybercrime damages will be US$6 trillion annually*. Video surveillance data can be particularly susceptible to security breaches when it’s connected across local and global networks. Digital intruders are drawn to this method of data transfer, particularly if there are weak links in the network. To cancel out this risk, employ a data security system that’s effective from end to end.

Partners in crime prevention

The reputation of Genetec in the field of mission-critical video security projects is constantly growing. Having access to the VMS expertise of Genetec and Bosch innovative surveillance cameras gives you the upper hand over the hackers, because Bosch cameras are fully integrated with Genetec systems, resulting in an end-to-end data security solution incorporating all Bosch network video surveillance cameras, plus Genetec Archiver and Security Center. Furthermore, an authentication key is assigned from the outset, enabling us to verify the legitimacy of network components and viewing clients, so you can build a trusted infrastructure even before network-wide communications start.

The best form of protection is encryption

Cybercrime is the greatest threat to every company in the world*, so you need an effective and reliable method of safeguarding your system. This is why encryption of data streams and stored data is vital. All Bosch IP cameras have a built-in Trusted Platform Module (TPM) to safely store cryptographic keys and enable encryption of all video data, which is then sent from the camera to the Genetec Archiver using SRTP (Secure Real-Time Transport Protocol). Additional security is established via a "permissioning" scheme based on privileges accumulated by specific users.

Synchronized. Centralized. Better protected

Because Security Center integrates with Active Directory, user management can be monitored and centralized at Windows level. As well as individual users, user groups from Active Directory can be synchronized with Security Center, while new users will automatically inherit existing Security Center privileges defined for that group.

Securing your cameras, management software, and clients

Passwords are still an essential layer of security, but the Genetec Archiver also uses a client certificate (which can be signed by a trusted third party and is factory-installed) to authenticate themselves to the Bosch camera. In addition, only Bosch-approved firmware updates will be accepted, and any cryptographic operations are only executed inside the unique built-in Trusted Platform Module (TPM).

Certificates are less at risk from hacking, which is why Genetec uses certificate authentication for its Security Center management software and clients. The video management systems interact directly with the Bosch cameras using certificates for authentication, and because stored data stays encrypted and data is transmitted via SRTP, confidentiality and data protection are guaranteed.

Together, Bosch and Genetec provide one of the world’s best data security solutions.

For more information about Bosch, please click here.

*Official 2017 Annual Cybercrime Report.

 
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: