Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48Icon--info-i-black-48x48Icon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48share-circle1Icon--share-black-48x48Icon--shopping-cart-black-48x48Icon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist

This website uses cookies for reasons of functionality, convenience, and statistics. You can change this setting at any time by clicking on “Change settings.” If you consent to this use of cookies, please click “Yes, I agree.”

Guy with sunglasses
Video Systems

Data security

Keep video data secure

Video security and the Internet of Things

The security of your surveillance data is just as important as the people and premises you are safeguarding.

Enter password screen

Video security data is increasingly connected across local and global networks. A growing number of edge components (cameras) send their data to core components (servers) over the Internet, where digital intruders and hackers loom.

Covering all major elements of the video security infrastructure

Because video data is often highly critical and sensitive, Bosch is driving a systematic approach

to maximize data security by considering physical safety and cybersecurity simultaneously.

Bosch’s system approach is the key to achieving the highest standards in end-to-end data security:

  • We create trust by assigning every component in the network an authentication key.
  • We secure data from hackers by encrypting it at the hardware level, using a cryptographic key that is safely stored in an unique built-in Trusted Platform Module (TPM).
  • We offer easy ways to manage user access rights ensuring that only authorized people have access to your data.
  • We can support the set-up of a Public Key Infrastructure.

End-to-end security

How we achieve data security

 How we secure our cameras

How we secure our cameras

How we secure our cameras

  • Secured connections supported (HTTPS)
  • Password enforcement at initial set up
  • Execution of 3rd party software is disabled
  • Firmware updates via Bosch signed firmware files only
  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)

 How we secure our cameras
How we secure storage devices

How we secure storage devices

How we secure storage devices

  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)
  • Support of Microsoft Active Directory for safe management of user access rights
  • Digest access authentication only
  • Regular updates via security patches

How we secure storage devices
How we secure network communication

How we secure network communication

How we secure network communication

  • Unsecure ports, such as Universal Plug and Play, are disabled by default
  • Password enforcement at initial set up
  • Network authentication using the 802.1x protocol
  • Support of the Advance Encryption Standard (up to 256 bit keys for encryption).

How we secure network communication
How we support Public Key Infrastructures (PKI)

How we support Public Key Infrastructures (PKI)

How we support Public Key Infrastructures (PKI)

  • Factory-loaded unique Bosch signed certificates on all cameras
  • Unique built-in Trusted Platform Module (TPM) for highly secure cryptographic operations
  • In-house Certificate Authority (Escrypt)
  • Support of customer specific certificates
  • Support of 3rd party PKI solutions

How we support Public Key Infrastructures (PKI)