Skip Navigation LinksASIS International / Education & Events / Global Events / 2016 European Security Conference & Exhibition / Programme and Events / Manageability of Data in a Hyper-Connected World - How to Safeguard and Structure Video Surveillance Data in Practice

Manageability of Data in a Hyper-Connected World - How to Safeguard and Structure Video Surveillance Data in Practice

Today's hyper-connected world – where edge components (cameras) send data to core components (servers) over the Internet – requires a hyper-vigilant approach to data security. Even a single weak link in the surveillance set-up can jeopardize the entire system. For example, skilled hackers can stage so-called man-in-the-middle attacks, hijacking communications between a camera and video management system (VMS). Once hackers have access, they can inject an alternate video feed to conceal illicit activity, or manipulate live camera footage to selectively remove certain details or persons from the scene. This calls for a big-picture view of the entire security network – a perspective Bosch has focused on for years. Data security is only possible when we take into account the complete system.

Bosch's systematic approach seamlessly covers all major elements of video surveillance infrastructure, including:

  • Cameras (edge components): Access protection via passwords and user management; authentication as trusted devices on network (via certificates); encrypted data (via certificates) transfer to core components
  • Servers, clients and storage devices (core components): Authentication as trusted device and "video authentication" to check validity of live and recorded video. Encryption of data.
  • Communication: Network protocols: Encryption and data transfer in line with industry standard communication protocols
  • Security infrastructure: Certificates: Support standard key infrastructures – e.g. public key infrastructure (PKI) – by offering hardware, software, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates. Our officially authorized in-house Certification Authority (CA) ensures that all products leave the factory with proper certificates. Partnerships with authorized third-party certification authorities support customer-specific solutions.

You can find more information on our products and solutions at www.boschsecurity.com/hdsecurity.

Speaker

Klaus Lienland, Director Business Development EMEA, Bosch, Germany/The Netherlands