EN-Product Brochures

Security of Security Brochure

Issue link: https://resources.genetec.com/i/880637

Contents of this Issue

Navigation

Page 4 of 5

Rely on audited and compliant solutions We work hand-in-hand with international associations to ensure that our solutions meet industry standards and adhere to the latest cybersecurity best practices. Penetration tests and audits are routinely conducted on our products to provide a complete assessment of the integrity of our solutions. Make the information available to the right people When it comes to protecting data, threats aren't just coming from the outside. With more integration and collaboration between each part of our security systems, the paths to access sensitive data have multiplied. That's why you need to control who can see your data, and what they can do with it. The first step is to use strong authentication methods to prevent undesired access to your system. This keeps your video and data from getting into the wrong hands. Once authenticated, the next step is to use authorization to manage who can access what part of your security system. This allows you to restrict the scope of activity within the system by giving access rights to groups or individuals for resources, data, or applications, and by defining what users can do with these resources. Keep out prying eyes We help protect your data from malicious attacks in multiple ways. When we talk about the Security-of-Security, we're talking about securing all aspects of your physical security system–including communications, servers, and data. Video and data viewed and stored within our system, as well as communications with Genetec hardware, are fully encrypted. We also secure communications between our software and edge devices, and to the cloud. This way, even if an unauthorized person gained access, they wouldn't be able to make sense of the data without the encryption key. Protect everyone's privacy Looking after individuals and equipment often requires collecting personal data and monitoring public spaces. To meet regulations and public expectations, access to personally-identifiable data and footage needs to be controlled. By following a privacy-by-design approach, we make sure that you don't have to choose between protecting the privacy of individuals and their physical security. Our products let you manage the access to sensitive data and allows you to protect the identity of anyone captured on video. We ensure you have complete control over your data so that you can adjust your protection methods and processes to meet regulations such as the European General Data Protection Regulation (GDPR), and more importantly, build trust with your customers.

Articles in this issue

view archives of EN-Product Brochures - Security of Security Brochure