Cybersecurity
End-to-end Practices to Keep Your Data Secure
Why
Importance of Cybersecurity
A constantly changing world, including a global pandemic, have caused major shifts in how people conduct their daily lives. Working remotely has become more commonplace, thus vastly increasing online activity. Inevitably, businesses rely on computers, sensors, and IOT/IIOT connected devices more than ever, which also draws the attention of cyber criminals.
Maintaining good cybersecurity protection is crucial, especially for businesses and governments. VIVOTEK understands the importance of cybersecurity for products and corporations. Our quality assurance efforts are built into the lifecycle of our products, including development, verification, manufacturing, delivery, and service. We are constantly evaluating and enhancing our cybersecurity protection efforts in order to provide the highest quality and most reliable products.
Compliance and Standard
Security at the EdgeAs a leading supplier of surveillance cameras, VIVOTEK provides product lines with strengthened security settings to ensure customers safeguard their own security.
ISO27001By implementing a robust Information Security Management System (ISMS), we safeguard data confidentiality, integrity, and availability. This certification demonstrates our commitment to protecting sensitive information, managing risks, and maintaining the highest level of security and trust.
AWS™ Partner and AWS™ Qualified SoftwareBegin AWS™ Partner and AWS™ Qualified Software proves we have successfully completed Foundational Technical Review (also known as FTR). FTR identifies our cloud is built based on AWS Well-Architected best practices specific.
FIPS 140-2 Level 2Our products comply with FIPS 140-2 Level 2, ensuring strong encryption and security protocols. This certification mandates tamper-evident protections, role-based authentication, and rigorous cryptographic module testing, guaranteeing data integrity and confidentiality.
Key Features
Signed Firmware - VIVOTEK Authorized Firmware
VIVOTEK’s signed firmware requires a digital signature in the firmware and verification of the signature by VIVOTEK, thereby ensuring that users can trust the firmware has not been tampered with. A device with signed firmware can validate the firmware before allowing installation. By applying the signed certificates and keys to the firmware, quarantine that all data are secured and encrypted without any exposure and alter risk from hackers.
Secure Boot - Secure from the Beginning
By applying VIVOTEK’s signed firmware, the camera can securely startup step by step. Secure boot is a mechanism that protects the firmware of the product installed. During the boot up process, secure boot blocks unauthenticated or tampered code. Additionally, signed firmware ensures that camera restores safely to factory default, and secure boot ensures that unauthenticated code is rejected, protecting the camera system from attacks or infections by malicious external code.
Secure Console - Constant Protected Connection
On the basis of secure boot, we updated the remote access security mechanism and disabled the console of the camera from the SSH and SFTP protocol, which defends the vulnerability of the system. Permission from VIVOTEK with key based authentication is the only way to access, providing a safer connection for the surveillance system.
Secure VADP - Enhanced Security for 3rd Party Integration
VIVOTEK Application Development Platform (VADP) provides an open platform that enables developers to add on features for specific scenarios or applications with VIVOTEK’s cameras. Securing the VADP with enhanced security is critical. Applying Secure VADP with digital signature and encryption capabilities makes it safer and more reliable for third-party integration.
Multi-Layer Protection with Trend Micro IoT Security
Multi-Layer Protection including Brute Force Attack Detection, Intrusion Detection and Prevention, and Instant Damage Control will automatically secure your network system with the latest signature upgrades.
Cybersecurity Management Solution
Once event notifications in network cameras and VMS have been set up, VIVOTEK’s surveillance solution will be immediately alerted when cyberattacks occur. Quickly know attack trend and status, and acquire attack information in order to diagnose your network promptly on VIVOTEK’s VMS and NVRs.
White Paper_Cybersecurity
Trend Micro Signature V1.085
Trend Micro Rule ID V1.085