Product and Cyber Security Initiative
At Genetec™, our customers' security and safety are a priority due to the evolving cybersecurity landscape. We are committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk, as well as consult our customers on potential threats. As technology evolves, our strategy is to follow industry and IT best practices so that we can proactively prepare for, or quickly respond to, new security vulnerabilities when they arise.
A key part of this vision for greater cybersecurity, is working proactively with our ecosystem, including our end users, channel and technology partners, consultants and industry associations, to better understand emerging threats in both the physical security and IT landscape. As an example, our Public SDL is periodically updated to remove devices we feel have inherent security vulnerabilities and/or are deemed to pose an unacceptable levels of risk for Genetec, our partners, and most importantly, our customers. Although we cannot guarantee that our products are 100% risk free, we actively encourage the reporting of security vulnerabilities to help us to eliminate potential threats.
To report a potential vulnerability in Genetec Security Center, or any other Genetec product line, please contact us by email at firstname.lastname@example.org. For general technical questions please email email@example.com.
Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal. If you do not have access credentials, please contact firstname.lastname@example.org.
2016-12-05 | Advisory
A critical security vulnerability has been discovered for Siemens-branded IP-based CCTV cameras that allow remote attackers to obtain administrative credentials from the integrated web server.
2016-07-26 | Blog
When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a long time. Namely, they began thinking about the balance between security and privacy.
2016-05-26 | Blog
In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of information it contains and what that information allows people to do. In this week’s post, we’re going to look at what you can do to keep your data out of the hands of unauthorized users.
2016-04-05 | Advisory
A security vulnerability in HID devices allows executing arbitrary code including the unlocking of all doors controlled by the devices. A patch has been released by the manufacturer. Clients should update their devices as soon as possible.