Cyber Security Response Center

Our customers' security and safety are a priority. We are committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk. As technology evolves, our strategy is to follow industry and IT best practices so that we can proactively prepare for, or quickly respond to, new security challenges when they arise.

Report a security vulnerability

The Genetec Cyber Security Response Center investigates all reports of security vulnerabilities affecting Genetec products and services. If you are a security researcher, partner or end user and believe you have found a Genetec security vulnerability, we would like to work with you to have it investigated and remediated.

Please collect as much of the below information as possible and submit it to [email protected]. This information will help us to better understand the nature and scope of the possible issue.

  • Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
  • Product and/or version, cloud service, or Genetec web url that contains the bug
  • Any special configuration required to reproduce the issue
  • Step-by-step instructions to reproduce the issue on a fresh install
  • Proof-of-concept or exploit code
  • Impact of the issue, including how an attacker could exploit the issue

You should receive a response within one business day. If for some reason you do not, please follow up with us to ensure we received your original message.

GTAC Crisis Response Center

24/7 CoverageThe GTAC Crisis Response Center is available 24 hours a day, and 7 days a week to offer you emergency support by email, phone, and even on site at your facility. We have engineers as well as partners specialized in rapid response to support you in situations such as catastrophic system failure or cyber-attack. To add the 24/7 support option to your system, please contact Inside Sales.

Emergency 24/7 support access

Our 24/7 coverage is automatically available to all systems enrolled in the Genetec Advantage program that have purchased this option. Call us at +1 514.856.7100 and have your Advantage contract number and Certification number ready or log into the Genetec Portal to submit a ticket.

If you are in an urgent situation and do not have Genetec Advantage we suggest reaching out to your integrator directly or filling out this form. We will respond to your request within the standard response SLA according to your system coverage.

Learn more about Genetec Lifecycle Management and our Genetec Advantage program.

Hardening Guides

Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal.  If you do not have access credentials, please contact [email protected].

Download Hardening Guides
Omnicast 4.x - Download
Security Center 5.4 - Download
Security Center 5.5 - Download
Security Center 5.6 - Download

Security bulletins & educational articles

A Guide to Hardening Your Omnicast 4.x System

2017-02-20 | Blog

Security is what we do; and while we are technology innovators first, a big part of our job is ensuring our customers have the tools, resources, and knowledge to get the most out of our security solutions.

Read more

Security vulnerabilities for Sony IP cameras

2016-12-07 | Advisory

Security vulnerabilities have been discovered for Sony IPELA Engine IP cameras that allow attackers to execute code remotely using hardcoded credentials.

Read more

Critical security vulnerability for Siemens-branded IP-based CCTV cameras

2016-12-05 | Advisory

A critical security vulnerability has been discovered for Siemens-branded IP-based CCTV cameras that allow remote attackers to obtain administrative credentials from the integrated web server.

Read more

Are Your Cameras Secured?

2016-08-30 | Blog

People, businesses and communities rely on cameras to increase safety and deter threats, but many would be surprised to learn that these network-connected cameras could be leaving them exposed to vulnerabilities.

Read more

What We Know About the Security of Our Security

2016-08-23 | Blog

As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

Read more

A Closer Look at Authorization

2016-07-26 | Blog

When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a long time. Namely, they began thinking about the balance between security and privacy.

Read more

Critical security vulnerability for Axis products

2016-07-18 | Advisory

A critical security vulnerability has been discovered for Axis Communication Inc. products that allow attackers to gain root access without proper authentication.

Read more

How does Authentication Work

2016-07-05 | Blog

Hacking has been making headlines in recent years, and, so far, 2016 is no exception

Read more

What is Encryption and How Important is it?

2016-05-26 | Blog

In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of information it contains and what that information allows people to do. In this week’s post, we’re going to look at what you can do to keep your data out of the hands of unauthorized users.

Read more

ZDI-16-223: HID VertX/Edge Remote Code Execution Vulnerability

2016-04-05 | Advisory

A security vulnerability in HID devices allows executing arbitrary code including the unlocking of all doors controlled by the devices. A patch has been released by the manufacturer. Clients should update their devices as soon as possible.

Read more