Search Register  |   Sign in


Cyber Security

Sharing information while maintaining security is paramount. victor and VideoEdge protects video and confidential data, allowing you to give access to only those whose jobs require it. Leverage existing HR databases to centrally manage who has access to the system while ensuring autonomy and privacy compliance by partitioning, encrypting, and restricting access to data containing classified information.

victor and VideoEdge’s user management policies combine with industry-leading cybersecurity and redundant/failover recording to provide business continuity in the event of a natural disaster, cyber threat, physical attack, and other causes of outages.

Our products are gated, analyzed, tested and required to meet or exceed the rigorous standards of the Johnson Controls Cyber Solutions Product Security Program for every consecutive release. This holistic approach is aimed at providing peace of mind to our customers. Our security mindset begins at initial design concept and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cybersecurity environments.
  • Central User Management – Central management of all user accounts and their permissions throughout the system eliminates the need to configure the user accounts for each device independently.
  • Customizable User Account Access – Each operator within the system is assigned their own user account for a higher level of accountability and control.
  • Dual Operator Log-On Authentication – Two-step application log-on verification requires that a supervisor’s credential is also presented each time operators attempt to access the system.
  • Encrypted Command and Control – TLS provides additional privacy and data protection over IP security networks when executing commands.
  • Media Encryption – This allows the NVR to protect against file tampering as well as remote and local sabotage.
  • Redundancy and Failover Recording – Reliability is increased when a redundant server or failover NVR is configured. This assures that high-priority data is retained with minimum loss when a primary system goes offline.
  • Restricting of Ports, Protocols, and Services – victor and VideoEdge user interfaces allow administrators to disable unused ports, protocols and services, enabling the practice of “Least Functionality” which minimizes the risk of unauthorized access as unnecessary entry points will not be available to attackers.
  • Role-Based Permissions – User permission may be assigned by role, simplifying the management of authorizations as the level of access for a group of operators can be configured with a single step.
  • Secure By Default User Permissions – Default secure permission assures that users are initially configured with no system access, reducing the risk that a user is assigned more capabilities to the VMS and its functions than authorized.
  • SHA-256 Certificate Support – The system requires that all HTTPS certificates use a SHA-256 HASH algorithm enabling cryptographic validation of encrypted communications.
  • VideoEdge Operating System – By leveraging a highly customized open Linux operating system, VideoEdge offers a robust, reliable, and stable recording platform.
"


x

Slavery and Human Trafficking Policy and Statement

This policy and statement make explicit our commitment to ensure that slavery and human trafficking is not taking place in any part of our business or supply chain.

Download policy.

Download statement.