classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


End-to-end security, day after day
April 2018, Cyber Security

Cybercrime, one of the world’s biggest crimes, goes nearly unnoticed. The Internet of Things makes mobility, businesses and industries more connected, but it also leaves them more vulnerable to cybercrime.

Online hacking has become so widespread that, by 2021, it is estimated that the cost of cybercrime damages will be $6 trillion annually. All it takes for a hacker is finding a single weak link, from the outside or more commonly inside, in a surveillance network to gain access to, and jeopardise an entire data system. To cancel out this risk, employ a data security system that’s been configured by experts with vast cybersecurity knowledge to make it completely effective from end-to-end.

Partners in crime prevention

The reputation of Genetec and Bosch in the field of mission-critical video security projects is constantly growing. Having access to the video management system (VMS) expertise of Genetec and Bosch’s innovative surveillance cameras gives customers the upper hand over the hackers, because Bosch cameras are fully integrated with Genetec systems, resulting in an end-to-end data security solution incorporating all Bosch network video surveillance cameras, plus Genetec Archiver and Security Center.

All network-wide communications between Bosch cameras and Genetec Archiver and Security Center are assigned an authentication key. This electronic signature enables the system to verify the legitimacy of network components like cameras or storage units, and viewing clients, ensuring that an infrastructure of trust is built before network-wide communications start.

The best form of protection is encryption

Cybercrime is one of the greatest threats to every company in the world, so an effective and reliable method of safeguarding the video security infrastructure is needed. This is why encryption of data streams and stored data is vital. All Bosch IP-cameras have a built-in Trusted Platform Module (TPM) to safely store cryptographic keys used for authentication ensuring trustworthy communications between all network components and encryption of all video data.

All cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM). Encrypted video data is then sent from the camera to the Genetec Archiver using SRTP (Secure Real-Time Transport Protocol). Additional security is established via a ‘permissioning’ scheme based on privileges accumulated by specific users.

Synchronised. Centralised. Better protected

Because Genetec Security Center integrates with Active Directory, user management can be monitored and centralised at Windows level. As well as individual users, user groups from Active Directory can be synchronised with Security Center, whilst new users will automatically inherit existing Security Center privileges defined for that group.

Securing cameras, management software, and clients

Passwords are still an essential layer of security, but the Genetec Archiver also uses a client certificate (which can be signed by a trusted third party and is factory-installed) to authenticate themselves to the Bosch IP camera. In addition, only Bosch-approved firmware updates will be accepted, and any cryptographic operations are only executed inside the unique built-in Trusted Platform Module (TPM).

Certificates are less at risk from hacking, which is why Genetec uses certificate authentication for its Security Center management software and clients. The video management systems interact directly with the Bosch cameras using certificates for authentication, and because stored data stays encrypted and data is transmitted via SRTP (Secure Real-time Transport Protocol) confidentiality and data protection are guaranteed. Using SRTP throughout the whole video security infrastructure enables customers to set up a secured multi-cast network, and get security and good network scalability at the same time.

For more information contact Bosch Security and Safety Systems, +27 (0)11 651 9600, security.systems@za.bosch.com, http://africa.boschsecurity.com.


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • Security, convenience and comfort
    November 2018, Bosch Building Technologies, Access Control & Identity Management, Integrated Solutions
    High security combined with convenience and comfort. Bosch implements a networked solution for the Prime Tower in Zurich.
  • Hospital adopts integrated solution
    November 2018, Bosch Building Technologies, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Fire & Safety, Integrated Solutions, Healthcare (Industry)
    Adana sets the standard for patient safety in a system marked by low overall cost of ownership, maintenance costs, and failure rate.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
  • Our dependence on cyber-connectivity
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
    The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.
  • How close has video analytics grown to AI?
    November 2018, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    Hi-Tech Security Solutions asks how far artificial intelligence has changed the video analytics market and how it will make an impact in future.
  • Digital forensics is crucial to the security chain
    November 2018, Cyber Security
    Forensics involves the application of forensic tools to recover, scrutinise and analyse masses of data and logs to uncover what has happened.
  • The risks of social media
    November 2018, AVeS Cyber Security, Cyber Security
    Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.
  • The need for resilience in national infrastructure
    November 2018, Government and Parastatal (Industry), Cyber Security, Security Services & Risk Management
    The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation.
  • Protecting constantly connected users
    November 2018, Products, Cyber Security
    The latest versions of ESET security products offer multi-layered protection, enhanced IoT protection, product referral and a new security report feature.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.