Dahua achieves international cybersecurity standards

November 2024 Information Security, Surveillance

At its sixth Partner Day in Italy, Dahua Technology received the Common Criteria (ISO/IEC 15048) EAL 3+ certificate, along with ISO/IEC 27001 for Information Security Management Systems, ISO/IEC 27701 for Privacy Information Management Systems, and CSA STAR certifications. These achievements further strengthen Dahua’s security measures and adherence to global standards, demonstrating the company’s ability to meet the highest international standards for information security and privacy protection in today’s digital environment.

Dahua's IPC series products have received the CC EAL3+ certificate, reflecting Dahua's security measures throughout its product development lifecycle. Brightsight, a licenced cybersecurity laboratory, performed the evaluation, and the certificate was issued by the Netherlands Scheme for Certification of IT Security (NSCIB).

Common Criteria (CC) is a globally recognised standard for evaluating the security features of IT products and systems. The CC EAL3+ certificate reinforces Dahua’s commitment to robust protection against potential security threats and highlights its proactive approach in safeguarding the entire operations process—from research and development to manufacturing and delivery.

The ISO/IEC 27001 certification, issued by British Standards Institution (BSI), confirms that Dahua has established a comprehensive information security management system to protect sensitive information from potential risks. The ISO/IEC 27701 certification extends this framework to privacy information management, attesting that Dahua’s systems can effectively manage personal data in compliance with international privacy regulations.

Additionally, the CSA STAR (Cloud Security Alliance Security, Trust & Assurance Registry) certification recognises Dahua’s capabilities in securing cloud services. It reflects the company's adherence to best practices in cloud security, ensuring that its cloud-based solutions (e.g., DoLynk Care, DMSS, WiLynk, etc.) meet stringent standards for protecting sensitive information.

“These certifications highlight the advanced security measures we have implemented across all stages of our operations,” said Kevin Chen, President of Dahua WEU. “As the digital landscape evolves, we are fully committed to maintaining the highest standards of cybersecurity, continually strengthening our systems, and delivering secure, reliable solutions to our customers and partners globally.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.