EN-Feature Notes


Issue link: https://resources.genetec.com/i/959928

Contents of this Issue


Page 1 of 1

Key features & specifications End-to-end security and privacy protection Compliance & best practices • ISO 27001 • Audits • Secure product coding • Penetration tests • FBI CJIS and DHS compliance • European Privacy Seal • Microsoft Gold certification Authentication • Claims-based and 3rd party authentication (MS Active Directory) • Authenticated client/server communications • Edge devices authentication • Secured and authenticated RTSP video requests Authorization • User and user group management • Restricted scope of activities for operators • Partitions to determine what users can see • Privileges to determine what users can do Encryption • End-to-end video encryption • Authenticated encryption • Encrypted video in-transit and at-rest • Encrypted communications and databases Privacy protection • Real-time video blurring and masking • Face redaction to protect video evidence • Privacy policy SOS_FN1EN Building trust As a provider of security, operations, and business intelligence solutions, we help you protect your organization. Being a trusted leader in the industry, we continue to work with our customers and partners to deliver solutions that provide the best protection now, and in the future. To learn more about our comprehensive approach, visit the Genetec Trust Center at Genetec.com/trust Genetec Inc. genetec.com/locations info@genetec.com @genetec Feature note · Security-of-security © Genetec Inc., 2018. Genetec and the Genetec Logo are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the manufacturers or vendors of the respective products. Ensure data and video is only accessible by the right people with advanced authentication and authorization Protect video, data and communications with encryption within and between our software and hardware Protect the identity of anyone captured in video to limit the surface of risk and protect privacy

Articles in this issue

Links on this page

view archives of EN-Feature Notes - Security-of-Security