{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Bosch's Focus Is to Keep Video Data Secure

by Bobby Salerno on May 17, 2017

Video surveillance data is increasingly connected across local and global networks. A growing number of edge components (cameras) send their data to core components (servers) BoschSecure.pngover the Internet, where digital intruders and hackers loom.

The Risks
Even a single weak link in a surveillance set-up can jeopardize an entire system. For example, skilled hackers can stage so-called man-in-the-middle attacks, hijacking communications between a camera and video management system (VMS). Once hackers have access, they can inject an alternate video feed to conceal illicit activity, or manipulate live camera footage to selectively remove certain details or persons from the scene.

Covering All Angles 
Bosch achieve the highest standards with a four-step approach that considers the entire video surveillance infrastructure. Bosch create trust by assigning every component in the network an authentication key. Bosch secure data from hackers by encrypting it at the hardware level, using a cryptographic key that is safely stored in a unique built-in Trusted Platform Module (TPM). Bosch offer easy ways to manage user access rights ensuring that only authorized people have access to your data. And finally, Bosch can support the set-up of a Public Key Infrastructure. So with Bosch, you couldn’t be more secure.

Learn more about Bosch Security

Learn more about Accu-Tech

 

Topics: bosch Security security camera solutions cameras

Subscribe To Our Blog