Cybersecurity Response Center

Our customers' security and safety are a priority. We are committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk. As technology evolves, our strategy is to follow industry and IT best practices so that we can proactively prepare for, or quickly respond to, new security challenges when they arise.

At Genetec, we are committed to developing resources and providing support to help you strengthen your cybersecurity practices.  On this page you can access our hardening guides, report a security vulnerability 24/7, and read our most recent cybersecurity updates and articles.

Click here to access our latest updates and alerts.

Report a security vulnerability

The Genetec cybersecurity Response Center investigates all reports of security vulnerabilities affecting Genetec products and services. If you are a security researcher, partner or end user and believe you have found a Genetec security vulnerability, we would like to work with you to have it investigated and remediated.

Please collect as much of the below information as possible and submit it to This information will help us to better understand the nature and scope of the possible issue.

  • Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
  • Product and/or version, cloud service, or Genetec web url that contains the bug
  • Any special configuration required to reproduce the issue
  • Step-by-step instructions to reproduce the issue on a fresh install
  • Proof-of-concept or exploit code
  • Impact of the issue, including how an attacker could exploit the issue

You should receive a response within one business day. If for some reason you do not, please follow up with us to ensure we received your original message.

GTAC Crisis Response Center

24/7 CoverageThe GTAC Crisis Response Center is available 24 hours a day, and 7 days a week to offer you emergency support by email, phone, and even on site at your facility. We have engineers as well as partners specialized in rapid response to support you in situations such as catastrophic system failure or cyber-attack. To add the 24/7 support option to your system, please contact Inside Sales.

Emergency 24/7 support access

Our 24/7 coverage is automatically available to all systems enrolled in the Genetec Advantage program that have purchased this option. Call us at +1 514.856.7100 and have your Advantage contract number and Certification number ready or log into the Genetec Portal to submit a ticket.

If you are in an urgent situation and do not have Genetec Advantage we suggest reaching out to your integrator directly or filling out this form. We will respond to your request within the standard response SLA according to your system coverage.

Learn more about Genetec Lifecycle Management and our Genetec Advantage program.

Hardening Guides

Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal.  If you do not have access credentials, please contact

Download Hardening Guides
Omnicast 4.x - Download
Security Center 5.4 - Download
Security Center 5.5 - Download
Security Center 5.6 - Download
Security Center 5.7 - Download

Security bulletins & educational articles

How does Authentication Work

2016-07-05 | Blog

Hacking has been making headlines in recent years, and, so far, 2016 is no exception

Read more

What is Encryption and How Important is it?

2016-05-26 | Blog

In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of information it contains and what that information allows people to do. In this week’s post, we’re going to look at what you can do to keep your data out of the hands of unauthorized users.

Read more

ZDI-16-223: HID VertX/Edge Remote Code Execution Vulnerability

2016-04-05 | Advisory

A security vulnerability in HID devices allows executing arbitrary code including the unlocking of all doors controlled by the devices. A patch has been released by the manufacturer. Clients should update their devices as soon as possible.

Read more

A Closer Look at Physical Security System Vulnerabilities

2016-03-31 | Blog

In our last post, we got you thinking about the Security-of-Security. Specifically, we raised questions about the kind of information contained in your IP physical security system, how that data is protected, and what that information allows people to do.

Read more

A Guide to Hardening Your Security Center System

2016-03-17 | Blog

Security is what we do; and while we are technology innovators first, a big part of our job is ensuring our customers have the tools, resources, and knowledge to get the most out of our security solutions.

Read more

How Secure Is Your Physical Security System?

2016-03-02 | Blog

As we move forward in 2016 and embark on exciting new challenges, it’s important to take stock of where we are and be sure that we’re moving forward with the best possible foundation. One critical area that is often overlooked is the security of your physical security system.

Read more