Encrypting video security systems

Issue 8 2021 Surveillance, Information Security

German video technology manufacturer Dallmeier has launched the Dallmeier Device Manager, a tool for conveniently configuring and administering Dallmeier video IP systems. With this successor to the popular PService software, installers and system managers can quickly and easily encrypt a wide range of Dallmeier video systems with TLS certificates and apply other security measures.


Dallmeier Device Manager.

Installers and system administrators are familiar with the challenge: providing encryption for the connections within a video security system is a complex, time-consuming task. Expert technical skills are required, particularly when large network and system landscapes are involved. The new Dallmeier Device Manager tool makes configuring security much more convenient.

Encryption in six easy steps

In addition to all device management tasks, the Dallmeier Device Manager (DDM) makes it possible to encrypt a Dallmeier video system with TLS (Transport Layer Security) certificates. Accordingly, system administrators can provide the Dallmeier devices with the necessary certificates from a single central user interface. It is even possible to encrypt access via mobile end devices. In this way, DDM users further increase the protection for their Dallmeier video systems and can meet their individual security requirements.

TLS encryption.

On its homepage, the manufacturer offers a configuration document which explains how to implement TLS encryption in six easy steps. (Download the document via the short link www.securitysa.com/*DDM).

Dashboard: critical data always in view

The DDM further features a dashboard which displays the most important data regarding hardware and security status, licencing arrangements and the software version. To make this device data available, the software automatically scans the entire video network TCP/UDP for Dallmeier single sensor cameras, multi-focal sensor cameras and recording systems. A scan for ONVIF-compatible devices is also possible. The DDM can also be used to change many settings and the IP addresses of the connected Dallmeier devices, open configuration dialogues directly and to create wide-ranging reports for optimisation and maintenance.

To improve system security further, when they run the software for the first time, system operators are instructed to assign strong passwords for access to the individual devices. Additionally, the system informs the user about current software updates and software maintenance licences that are due to expire. Devices with the same software version can be updated together in a single step via the DDM.

Full system continuity to the VMS

As soon as the connected devices have been stored in the DDM, they can easily be transferred to the Dallmeier Video Management Software SeMSy Compact together with the corresponding configuration files using the multiple selection and drag-and-drop functions. The cameras are ready for use immediately after this operation, there is no need to log onto the VMS again.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.