Encrypting video security systems

Issue 8 2021 Surveillance, Information Security

German video technology manufacturer Dallmeier has launched the Dallmeier Device Manager, a tool for conveniently configuring and administering Dallmeier video IP systems. With this successor to the popular PService software, installers and system managers can quickly and easily encrypt a wide range of Dallmeier video systems with TLS certificates and apply other security measures.


Dallmeier Device Manager.

Installers and system administrators are familiar with the challenge: providing encryption for the connections within a video security system is a complex, time-consuming task. Expert technical skills are required, particularly when large network and system landscapes are involved. The new Dallmeier Device Manager tool makes configuring security much more convenient.

Encryption in six easy steps

In addition to all device management tasks, the Dallmeier Device Manager (DDM) makes it possible to encrypt a Dallmeier video system with TLS (Transport Layer Security) certificates. Accordingly, system administrators can provide the Dallmeier devices with the necessary certificates from a single central user interface. It is even possible to encrypt access via mobile end devices. In this way, DDM users further increase the protection for their Dallmeier video systems and can meet their individual security requirements.

TLS encryption.

On its homepage, the manufacturer offers a configuration document which explains how to implement TLS encryption in six easy steps. (Download the document via the short link www.securitysa.com/*DDM).

Dashboard: critical data always in view

The DDM further features a dashboard which displays the most important data regarding hardware and security status, licencing arrangements and the software version. To make this device data available, the software automatically scans the entire video network TCP/UDP for Dallmeier single sensor cameras, multi-focal sensor cameras and recording systems. A scan for ONVIF-compatible devices is also possible. The DDM can also be used to change many settings and the IP addresses of the connected Dallmeier devices, open configuration dialogues directly and to create wide-ranging reports for optimisation and maintenance.

To improve system security further, when they run the software for the first time, system operators are instructed to assign strong passwords for access to the individual devices. Additionally, the system informs the user about current software updates and software maintenance licences that are due to expire. Devices with the same software version can be updated together in a single step via the DDM.

Full system continuity to the VMS

As soon as the connected devices have been stored in the DDM, they can easily be transferred to the Dallmeier Video Management Software SeMSy Compact together with the corresponding configuration files using the multiple selection and drag-and-drop functions. The cameras are ready for use immediately after this operation, there is no need to log onto the VMS again.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.