Dahua achieves international cybersecurity standards

November 2024 Information Security, Surveillance

At its sixth Partner Day in Italy, Dahua Technology received the Common Criteria (ISO/IEC 15048) EAL 3+ certificate, along with ISO/IEC 27001 for Information Security Management Systems, ISO/IEC 27701 for Privacy Information Management Systems, and CSA STAR certifications. These achievements further strengthen Dahua’s security measures and adherence to global standards, demonstrating the company’s ability to meet the highest international standards for information security and privacy protection in today’s digital environment.

Dahua's IPC series products have received the CC EAL3+ certificate, reflecting Dahua's security measures throughout its product development lifecycle. Brightsight, a licenced cybersecurity laboratory, performed the evaluation, and the certificate was issued by the Netherlands Scheme for Certification of IT Security (NSCIB).

Common Criteria (CC) is a globally recognised standard for evaluating the security features of IT products and systems. The CC EAL3+ certificate reinforces Dahua’s commitment to robust protection against potential security threats and highlights its proactive approach in safeguarding the entire operations process—from research and development to manufacturing and delivery.

The ISO/IEC 27001 certification, issued by British Standards Institution (BSI), confirms that Dahua has established a comprehensive information security management system to protect sensitive information from potential risks. The ISO/IEC 27701 certification extends this framework to privacy information management, attesting that Dahua’s systems can effectively manage personal data in compliance with international privacy regulations.

Additionally, the CSA STAR (Cloud Security Alliance Security, Trust & Assurance Registry) certification recognises Dahua’s capabilities in securing cloud services. It reflects the company's adherence to best practices in cloud security, ensuring that its cloud-based solutions (e.g., DoLynk Care, DMSS, WiLynk, etc.) meet stringent standards for protecting sensitive information.

“These certifications highlight the advanced security measures we have implemented across all stages of our operations,” said Kevin Chen, President of Dahua WEU. “As the digital landscape evolves, we are fully committed to maintaining the highest standards of cybersecurity, continually strengthening our systems, and delivering secure, reliable solutions to our customers and partners globally.”


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...