Key features & specifications
End-to-end security and privacy protection
Compliance
& best practices
• ISO 27001
• Audits
• Secure product
coding
• Penetration tests
• FBI CJIS and DHS
compliance
• European Privacy
Seal
• Microsoft Gold
certification
Authentication
• Claims-based
and 3rd party
authentication
(MS Active
Directory)
• Authenticated
client/server
communications
• Edge devices
authentication
• Secured and
authenticated RTSP
video requests
Authorization
• User and user
group management
• Restricted scope
of activities for
operators
• Partitions to
determine what
users can see
• Privileges to
determine what
users can do
Encryption
• End-to-end video
encryption
• Authenticated
encryption
• Encrypted video
in-transit and at-rest
• Encrypted
communications
and databases
Privacy protection
• Real-time video
blurring and
masking
• Face redaction
to protect video
evidence
• Privacy policy
SOS_FN1EN
Building trust
As a provider of security, operations, and business intelligence solutions, we help you protect your organization. Being a trusted leader
in the industry, we continue to work with our customers and partners to deliver solutions that provide the best protection now, and in
the future.
To learn more about our comprehensive approach, visit the Genetec Trust Center at Genetec.com/trust
Genetec Inc.
genetec.com/locations
info@genetec.com
@genetec
Feature note · Security-of-security
© Genetec Inc., 2018. Genetec and the Genetec Logo are trademarks of Genetec Inc., and may be registered or
pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the
manufacturers or vendors of the respective products.
Ensure data and video is only accessible
by the right people with advanced
authentication and authorization
Protect video, data and communications
with encryption within and between our
software and hardware
Protect the identity of anyone
captured in video to limit the surface
of risk and protect privacy