Keep video data secure

Keep video data secure
 

The security of your surveillance data is just as important as the people and premises you are safeguarding. Bosch achieves the highest standards with a 4-step approach that covers your entire network for end-to-end data security.

 
 

Video security and the Internet of Things

 

Video security and the Internet of Things

We live and work in an increasingly complex and hyper-connected world. That demands a sophisticated approach to data security. Bosch offers end-to-end solutions that cover everything from cameras, servers, clients and storage devices to network protocols and standard key infrastructures. With our 4-step approach, we take data security to a whole new level.

  • We create trust by assigning every component in the network an authentication key.

  • We secure data from hackers by encrypting it at the hardware level, using a cryptographic key that is safely stored in a unique built-in Trusted Platform Module (TPM).

  • We offer easy ways to manage user access rights ensuring only authorized people have access to your data.

  • We can support the set-up of a Public Key Infrastructure together with our in-house Certificate Authority Escrypt.
 

End-to-end security

 

End-to-end security

How we secure our cameras

  • Password enforcement at initial set up
  • Execution of 3rd party software is disabled
  • Firmware updates via Bosch signed firmware files only
  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)

How we secure storage devices

  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)
  • Support of Microsoft Active Directory for safe management of user access rights
  • Digest access authentication only
  • Regular updates via security patches

How we secure network communication

  • Unsecure ports, such as Universal Plug and Play, are disabled by default
  • Password enforcement at initial set up
  • Network authentication using the 802.1x protocol
  • Support of the Advance Encryption Standard (up to 256 bit keys for encryption).

How we support Public Key Infrastructures (PKI)

  • Factory-loaded unique Bosch signed certificates on all cameras
  • Unique built-in Trusted Platform Module (TPM) for highly secure cryptographic operations
  • In-house Certificate Authority (Escrypt)
  • Support of customer specific certificates
  • Support of 3rd party PKI solutions