Cybersecurity Response Center
Our customers' security and safety are a priority. We are committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk. As technology evolves, our strategy is to follow industry and IT best practices so that we can proactively prepare for, or quickly respond to, new security challenges when they arise.
At Genetec, we are committed to developing resources and providing support to help you strengthen your cybersecurity practices. On this page you can access our hardening guides, report a security vulnerability 24/7, and read our most recent cybersecurity updates and articles.
Report a security vulnerability
The Genetec Cybersecurity Response Center investigates all reports of security vulnerabilities affecting Genetec products and services. If you are a security researcher, partner or end user and believe you have found a Genetec security vulnerability, we would like to work with you to have it investigated and remediated.
Please collect as much of the below information as possible and submit it to [email protected]. This information will help us to better understand the nature and scope of the possible issue.
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Product and/or version, cloud service, or Genetec web URL that contains the bug
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue on a fresh install
- Proof-of-concept or exploit code
- Impact of the issue, including how an attacker could exploit the issue
You should receive a response within one business day. If for some reason you do not, please follow up with us to ensure we received your original message.
Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal. If you do not have access credentials, please contact [email protected].
Download Hardening Guides
Omnicast 4.x - Download
Security Center 5.4 - Download
Security Center 5.5 - Download
Security Center 5.6 - Download
Security Center 5.7 - Download
Security Center 5.8 - Download
Security Center 5.9 - Download