Video Data Security. The view from the experts
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises.
This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the viewpoint of the experts when it comes to data security? Geoff Kohl, Senior Director of Marketing for the Security Industry Association, was keen to get the opinions of those who are experiencing the current situation with regard to data protection, and its impact on video security, first-hand. What follows is an outline of Geoff’s discussion with Gregor Schlechtriem, Senior Vice President business unit Security of Bosch Building Technologies, a global player in video surveillance, and Pierre Racz, CEO of Genetec, who are world-renowned for their software in the safety and security domain.
The introduction of a key statistic started the conversation: by 2025, it is expected that 75 billion devices will be connected to the Internet. Therefore, our focus cannot remain solely on image quality and the reduction of bitrates; equal prominence must be given to data security. According to the experts, data security starts with an end-to-end solution.
For example, the consequences of having an unprotected computer inside your firewall are immeasurable; it’s like an open door to cyber criminals. This is a key advantage of an end-to-end security system that eliminates potential weak links.
Solutions such as those developed by Bosch and Genetec are designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted and any commands and configurations to control cameras and other devices are transmitted via a secure channel (c).
Read the full article here.