<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=159683641205248&amp;ev=PageView&amp;noscript=1">

Data Security Update: Bosch and Genetec News from ISC West 2018

Matt Golueke May 18, 2018 14:18 PM

Genetec Bosch 1Cyber security of electronic security systems remains a top concern for organizations.

Bosch and Genetec held a joint presentation at ISC West 2018 on cyber security to help attendees understand the solutions available to secure their systems.

Below are the documents and videos used in the session to further explain data and device security as related to the electronic security industry, in this case, specifically IP cameras and communication with the video management system. Plus, many questions were raised by the audience which prompted the informative Q&A document.

Bosch Genetec PPT Image imac front Bosch and Genetec End-to-end Security PowerPoint

 

Bosch Genetec Leaflet Image reportBosch and Genetec End-to-end Security Leaflet

 

Bosch and Genetec Video image video playerBosch and Genetec End-to-end Security Video

 

CHAVE Video image video playerBosch CHAVE Video Security Video

 

Bosch QandA Doc image report      Bosch and Genetec End-to-end Security Q and A

  

Cyber security class imageNew Training Course on Cyber Security

A new two-day classroom course - Cyber Security and IP Video - provides demonstrations and in depth practical applications for fundamental vulnerability scanning as well as device and system lockdown procedures. After completing this course, attendees will understand the differences between vulnerability assessments and penetration testing, and be able to leverage scan information to reduce attack surfaces of system devices. Register Here

 

 

Bosch_Data_security_image.jpgWe've summarized the information and many of the cyber security resources to help you stay on top of this topic:

CHAVE_Press_Release.png

 

 

 

 

 

Topics: Your Challenge, Our Solution, Manufacturing Excellence

View More Blog Topics

Trends, interviews, and practical advice on all things Security - Return to Main Blog Page

Search Our Blog

Subscribe for Blog Updates