Making your physical security system more secure
At Genetec™, our customers' security and safety are a priority. We are committed to creating secure products from the ground up and have practices in place to help identify and mitigate risk for our users. As technology evolves, our strategy is to follow industry best practices so that we can quickly respond to new security vulnerabilities when they arise.
A key part of this strategy is to work proactively with our ecosystem, including our end users, channel and technology partners, consultants and industry associations, to better understand the threat landscape. We also look to the IT industry to evolve our product lines. Although we cannot guarantee that our products are 100% risk free, we actively encourage the reporting of security vulnerabilities to help us to eliminate potential threats.
To report a potential vulnerability in Genetec Security Center, or any other Genetec product line, please contact us by email at firstname.lastname@example.org. For general technical questions please email email@example.com.
Note: To access the following security document, you must be a Security Center user with the appropriate credentials to log into the Genetec Portal. If you do not have access credentials, please contact firstname.lastname@example.org.
2016-12-05 | Advisory
A critical security vulnerability has been discovered for Siemens-branded IP-based CCTV cameras that allow remote attackers to obtain administrative credentials from the integrated web server.
2016-07-26 | Blog
When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a long time. Namely, they began thinking about the balance between security and privacy.
2016-05-26 | Blog
In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of information it contains and what that information allows people to do. In this week’s post, we’re going to look at what you can do to keep your data out of the hands of unauthorized users.
2016-04-05 | Advisory
A security vulnerability in HID devices allows executing arbitrary code including the unlocking of all doors controlled by the devices. A patch has been released by the manufacturer. Clients should update their devices as soon as possible.
2016-03-31 | Blog
In our last post, we got you thinking about the Security-of-Security. Specifically, we raised questions about the kind of information contained in your IP physical security system, how that data is protected, and what that information allows people to do.