Cybersecurity is a popular topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, developing crisis management policies, and developing mitigation plans for data breach incidents.

Customers demand reliable products and sellers rush to fill this gap to meet market demands. Many suppliers offer a large number of solutions and customers have trouble finding the best solution for their needs.

In this article, Videotec, a company that specializes in the design and development of video surveillance products for outdoor environments, outlines its vision for developing secure products and describes its cyber security strategy.

Why is cybersecurity important in video security applications?

Whenever people working in the surveillance business think about cyber security, they are thinking primarily about privacy.

While this is a critical issue, it is not the only one. The information may indeed be stolen from the cameras, but the cameras can be used to gather additional information.

Let’s take an example of an industrial installation site where different sets of devices can be found:

  • Computers for office work
  • VoIP telephones for calling
  • Surveillance cameras
  • Scada devices for process control

Which is Videotec’s policy and the features for protecting external products in cyberspace?

Thanks to Videotec’s proprietary know-how, their in-house R&D team regularly releases new firmware several times a year, with updates being communicated and distributed throughout the product range. Each update adds innovative enhancements and features and renews the level of cyber security, ensuring all pre-existing compatibility with third party systems.

Long-term firmware support: All Videotec products share the same coding platform. Therefore, each new firmware release applies to the entire product catalog.

Robust software architecture: Protocols are separated from the core of FW. Therefore, they are exported to processes that cannot be exploited to take over the device and spread an attack on the network

IEEE 802.1x Application: This protocol allows a restriction on devices that can connect to the network and helps system administrators to ensure that only authorized devices can access the network.

Digitally signed firmware files: If the downloaded firmware is not digitally signed with the Videotec keys, the video encoder and video details will refuse to install it. For this reason, rogue code cannot be sent to Videotec drives.

Support for the latest TLS standard with self-signed certificates and regular certificates. HTTPS is achieved with TLS. SSL was rejected because all versions are no longer secure.

GDPR (General Data Protection Regulation) Compliance for Streaming: Starting with version 2.0.0 FW, Videotec devices can stream encrypted video. Key and certificate management makes the units compatible with GDPR in any installation scenario. We have an encrypted RTSP-based video streaming stack via HTTPS and it works on both IPV4 and IPV6

Key and Certificate Management: With self-signed certificates, the transaction can be encrypted. With the same technology, cameras and customers can authenticate themselves and ensure that no one has replaced a camera or software with malware.

Certificate-based customer authentication: Videotec products can be configured to accept orders only from customers who have a proven identity stored on a secure item. There are no more passwords to steal and no time is wasted setting policies for the complexity of passwords.

Videotec has a strong presence in many vertical markets with key references such as transport and traffic, shipping, industrial, offshore and onshore oil and gas and energy industries. Videotec strengthens its commitment to global partners by providing them with high-performance IP-based products that are durable, secure in cyberspace, and meet the strict standards of these markets.