Latin America. Bosch Building Solutions and Genetec offer a complete data security solution for video surveillance. Having access to Genetec's specialized video management system (VMS) and Bosch's innovative surveillance cameras gives customers an edge over hackers, because Bosch cameras are integrated with Genetec systems, producing an end-to-end data security solution that incorporates all bosch network video surveillance cameras plus Archiver and Genetec's Security Center platform.
Having access to Genetec's specialized video management system (VMS) and Bosch's innovative surveillance cameras gives customers an edge over hackers.
All network-wide communications between Bosch and Archiver cameras and the Genetec Security Center platform are assigned an authentication key. This electronic signature allows the system to verify the legitimacy of network components such as cameras or storage units and see customers, thus ensuring that a trust structure is created before communications are initiated across the network.
Because Genetec's Security Center platform integrates with Active Directory, user management can be monitored and centralized from Windows. Like individual users, Active Directory user groups can be synchronized with Security Center, while new users will automatically inherit existing Security Center privileges that have been defined for that group.
Security cameras, management software and clients
Passwords are still an essential layer of security, but Genetec Archiver also uses a client certificate (which can be signed by a trusted third party and is installed at the factory) to authenticate to the Bosch IP camera. In addition, only Bosch-approved firmware updates will be accepted and all cryptographic operations are executed solely within the unique integrated Trusted Platform Module (TPM).
Certificates are less at risk of hacking, which is why Genetec uses certificate authentication for Security Center management software and clients. Video management systems interact directly with Bosch cameras using certificates for authentication and, because the stored data remains encrypted and the data is transmitted via the SRTP (Real-Time Transport Protocol) protocol, confidentiality and data protection are guaranteed.
Using the SRTP protocol throughout the video security infrastructure allows customers to set up a protected multicast network and gain security and good network scalability at the same time.
Leave your comment