This guide describes security and physical security measures and best practices that can
help secure your XProtect video management software (VMS) against cyber-attacks.
This includes security considerations for the hardware and software of servers, clients
and network device components of a video surveillance system.
This guide adopts standard security and privacy controls and maps them to each of the
recommendations. That makes this guide a resource for compliance across industry and
government security, and network security requirements.
Link to Milestone Hardening Guide
Whether you're looking to learn about the basics of cybersecurity, pour through more detailed technical content, review marketing materials, or gain access to tools that will help you deploy a more cybersecure system, the cybersecurity resources in this link are a great first step to help you along the way.
Link to Axis Cyber resources
Hikvision network devices, like any other network devices, may be exposed to cybersecurity risks. To
protect the network from the risk, Hikvision takes measures such as disabling the Telnet and FTP
interface, and adopting the security activation mechanism.
Download Hikvision Hardening Guide
This document provides guidance for system end users, system integrators, and security design consultants about establishing a sensible cyber security profile for their deployed Salient Systems security video management system products. Cyber security, also known as computer and network security or IT security, is defined as 'the protection of computer systems from theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.'
Link to Salient Systems Hardening Guide
Zenitel has developed a Cybersecurity Hardening Guide to help you approach your Cybersecurity planning, based on the CIS (Center for Internet Security) Controls. It combines our experience applying best practices developed by CIS to support end users and integrators to build a good cyber defense.
Link to Zenitel Cybersecurity Hardening Guide