Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

Dahua Technology works with Synopsys to raise the bar of network surveillance security

Dahua Technology works with Synopsys to raise the bar of network surveillance security
Dahua Technology, a leading video surveillance product vendor and related solution service provider, who pays high attention to network security issue of product and continuously carries out strengthening on network security of product, has announced that it has adopted Defensics protocol security testing tool and implemented a verification program from Synopsys.

Dahua Technology, a leading video surveillance product vendor and related solution service provider, who pays high attention to network security issue of product and continuously carries out strengthening on network security of product, has announced that it has adopted Defensics protocol security testing tool and implemented a verification program from Synopsys. This collaboration not only means that Dahua Technology will become the first enterprise who uses the leading proactive security solution from Synopsys in global security and protection industry, but also accelerates the progress of network security in the whole security and protection industry.

At present Dahua Technology uses Synopsys’ Defensics protocol security testing tool to analyze the security, robustness and reliability,and to detect unknown vulnerabilities of Dahua Technology’s security and protection products. Meanwhile, Dahua Technology will use the Synopsys verification program to help ensure Dahua’sproducts pass verification from its professional network security team before their rollouts. Additionally, Dahua Technology will collaborate with Synopsys to promote the discussions and developments of protocol security testing methods, testing tools and security standards for security and protection products.

“Product security is an everlasting topic.To improve the security level of Dahua Technology, our professional technical team will continue to strengthen the collaboration with the leaders of security technology as always, along with building our own technology accumulations.” said Liquan Fu, president and CEO of Dahua Technology.


“The products and services of Synopsys like Defensics represent global leading proactive security technologies. Dahua Technology has adopted these technologies in all of our IP products including IP Camera, Network Video Recorder (NVR) and IP storage. They cover the stages from R&D to testing stage. We are using Defensics protocol security testing tool and its verification program to support mainstream protocols in the market.”

Synopsys entered the software quality and security market with its acquisition of Coverity, a leading SAST vendor, in the spring of 2014. Its acquisitions of Codenomicon, a pioneer in protocol fuzz testing and software composition analysis (SCA), and the Seeker product followed in 2015. As an established leader providing the global semiconductor industry with the tools and semiconductor IP needed to design the advanced chips found in today's electronics, Today, Synopsys is focusing on improving the security and quality of software deliverables by integrating sophisticated, accurate analysis technologies into the software development process. Synopsys offers products under the Coverity, Codenomicon and Seeker brands, which provide early insight into highly relevant defects, vulnerabilities and threats with actionable remediation guidance and real-time visibility that enable organizations to better manage risk and efficiency.



Product Adopted:
Surveillance Cameras
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to:
Most Viewed Articles