EN- Technical Partners Brochures

Ebook Genete & Axis Network encryption

Issue link: https://resources.genetec.com/i/1257803

Contents of this Issue

Navigation

Page 7 of 13

7 Options for encrypting network video streams Compliance to industry standards is one of the main drivers for network security and managing transmission of network video. However, a common recommendation today is for all security data in transit over a network to be encrypted — and all resources should be authenticated. Securing network streaming requires implementing security for both the camera component, video management system and the network infrastructure that those communication streams traverse. There are different levels of security when it comes to securing video being sent over IP networks. Hardening the network involves establishing and maintaining authenticated communication streams, digitally signing configuration files and encrypting data and video streams and signaling between all the various components. All of these security features are not required for every network, but they provide options for increasing levels of security. Of course, each form of protection has a cost associated with it and typically requires various workflow routines. Often, more advanced routines are associated with more advanced forms of protection, leading to escalating costs. 7 Chapter 3

Articles in this issue

view archives of EN- Technical Partners Brochures - Ebook Genete & Axis Network encryption