Dahua secures its IoT

July 2017 Editor's Choice, Surveillance, News & Events

Dahua Technology announced its selection of Synopsys to enhance the security of its Internet of Things (IoT) devices and solutions. By implementing Synopsys’ portfolio of solutions and services, Dahua is strengthening its offerings, building security and quality into its software development lifecycle (SDLC) and supply chain.

“We are committed to delivering to our global customer base – from residential to enterprise – the highest quality and most secure Internet-connected devices,” said Fu Liquan, chairman of Dahua Technology. “Synopsys’ comprehensive solutions and services allow us to minimise software-related business risks by building security into the development process, which reduces the vulnerabilities that can jeopardise our products.”

Dahua has implemented Synopsys tools to address software security and quality issues throughout the SDLC using multiple technologies, including static analysis, fuzz testing and software composition analysis. Dahua Technology has also joined the Building Security in Maturity Model (BSIMM) community and will undergo a BSIMM assessment, a comprehensive benchmarking process that provides an objective, data-driven view into its current software security initiative.

Using the BSIMM results, the company will establish a baseline measurement of its software security program, which will be used to guide its efforts to continuously improve the security and quality of its products over time.

For more information, contact Dahua Technology South Africa, [email protected], www.dahuasecurity.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
SAIDSA achieves ISO 9001 certification
SAIDSA(SA Intruder Detection Services Association) Associations News & Events Training & Education
The South African Intruder Detection Services Association (SAIDSA) has announced that it has achieved ISO 9001:2015 certification. This milestone reflects its commitment to quality management and excellence in the security services industry.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
A standards-based, app approach to risk assessments
Security Services & Risk Management News & Events
[Sponsored] Risk-IO is web-based and designed to consolidate and guide risk managers through the whole risk process. In this article, SMART Security Solutions asks Zulu Consulting to tell us more about Risk-IO and how it came to be.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
Storage Selection Guide 2024
Storage Selection Guide Surveillance
The Storage Selection Guide 2024 includes a range of video storage and management options for small, medium and large surveillance operations.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...