Product and Cyber Security Initiative

At Genetec™, our customers' security and safety are a priority due to the evolving cybersecurity landscape. We are committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk, as well as consult our customers on potential threats. As technology evolves, our strategy is to follow industry and IT best practices so that we can proactively prepare for, or quickly respond to, new security vulnerabilities when they arise.

A key part of this vision for greater cybersecurity, is working proactively with our ecosystem, including our end users, channel and technology partners, consultants and industry associations, to better understand emerging threats in both the physical security and IT landscape. As an example, our Public SDL is periodically updated to remove devices we feel have inherent security vulnerabilities and/or are deemed to pose an unacceptable levels of risk for Genetec, our partners, and most importantly, our customers. Although we cannot guarantee that our products are 100% risk free, we actively encourage the reporting of security vulnerabilities to help us to eliminate potential threats.

To report a potential vulnerability in Genetec Security Center, or any other Genetec product line, please contact us by email at security@genetec.com. For general technical questions please email support@genetec.com.

Hardening Guide

Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal.  If you do not have access credentials, please contact insidesales@genetec.com.

Download Hardening Guides
Omnicast 4.x - Download
Security Center 5.4 - Download
Security Center 5.5 - Download

Articles

A Guide to Hardening Your Omnicast 4.x System

2017-02-20 | Blog

Security is what we do; and while we are technology innovators first, a big part of our job is ensuring our customers have the tools, resources, and knowledge to get the most out of our security solutions.

Read more

Security vulnerabilities for Sony IP cameras

2016-12-07 | Advisory

Security vulnerabilities have been discovered for Sony IPELA Engine IP cameras that allow attackers to execute code remotely using hardcoded credentials.

Read more

Critical security vulnerability for Siemens-branded IP-based CCTV cameras

2016-12-05 | Advisory

A critical security vulnerability has been discovered for Siemens-branded IP-based CCTV cameras that allow remote attackers to obtain administrative credentials from the integrated web server.

Read more

Are Your Cameras Secured?

2016-08-30 | Blog

People, businesses and communities rely on cameras to increase safety and deter threats, but many would be surprised to learn that these network-connected cameras could be leaving them exposed to vulnerabilities.

Read more

What We Know About the Security of Our Security

2016-08-23 | Blog

As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

Read more

A Closer Look at Authorization

2016-07-26 | Blog

When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a long time. Namely, they began thinking about the balance between security and privacy.

Read more

Critical security vulnerability for Axis products

2016-07-18 | Advisory

A critical security vulnerability has been discovered for Axis Communication Inc. products that allow attackers to gain root access without proper authentication.

Read more

How does Authentication Work

2016-07-05 | Blog

Hacking has been making headlines in recent years, and, so far, 2016 is no exception

Read more

What is Encryption and How Important is it?

2016-05-26 | Blog

In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of information it contains and what that information allows people to do. In this week’s post, we’re going to look at what you can do to keep your data out of the hands of unauthorized users.

Read more

ZDI-16-223: HID VertX/Edge Remote Code Execution Vulnerability

2016-04-05 | Advisory

A security vulnerability in HID devices allows executing arbitrary code including the unlocking of all doors controlled by the devices. A patch has been released by the manufacturer. Clients should update their devices as soon as possible.

Read more