How Bosch Secures the Cameras

Video security data is increasingly connected across local and global networks. A growing number of edge components (cameras) send their data to core components (servers) over the Internet, where digital intruders and hackers loom. The security of your surveillance data is just as important as the people and premises you are safeguarding.

Covering all major elements of the video security infrastructure

How Bosch Secure Cameras

Because video data is often highly critical and sensitive, Bosch is driving a systematic approach to maximize data security by considering physical safety and cybersecurity simultaneously. Bosch’s system approach is the key to achieving the highest standards in end-to-end data security:

  • create trust by assigning every component in the network an authentication key.
  • secure data from hackers by encrypting it at the hardware level, using a cryptographic key that is safely stored in an unique built-in Trusted Platform Module (TPM).
  • offer easy ways to manage user access rights ensuring that only authorized people have access to your data.
  • can support the set-up of a Public Key Infrastructure.

To learn more about how Bosch offers end-to-end security, please see the Brochure and download the Data Security Guidebook.

Watch the Video 

Watch the video where it is well explained which measures Bosch takes to secure the camera.

  • Secure connections are supported (HTTPS).
  • Password request at initial set up.
  • Unsecure ports for automatic discovery disabled. Universal Plug and Play protocol (UPnP).
  • Unsecure remote communication disabled (Telnet).
  • Uploading of 3rd party software not possible.
  • Firmware updates by Bosch signed files only.
  • Unique built-in Trusted Platform Module (TPM) safely stores private keys for encryption.

With Bosch you couldn’t be more secure!

Resources