Security
Hardware Security
-
Signed Firmware
VORTEX’s signed firmware requires a digital signature in the firmware and verification of the signature by VORTEX, thereby ensuring that users can trust the firmware has not been tampered with. A device with signed firmware can validate the firmware before allowing installation. By applying the signed certificates and keys to the firmware, quarantine that all data are secured and encrypted without any exposure and alter risk from hackers.
-
Secure Boot
Secure boot is a mechanism that protects the firmware of the product installed. During the boot up process, secure boot blocks unauthenticated or tampered code. Additionally, signed firmware ensures that camera restores safely to factory default, and secure boot ensures that unauthenticated code is rejected, protecting the camera system from attacks or infections by malicious external code.
-
Secure Console
On the basis of secure boot, we updated the remote access security mechanism and disabled the console of the camera from the SSH and SFTP protocol, which defends the vulnerability of the system. Permission from VORTEX with key based authentication is the only way to access, providing a safer connection for the surveillance system.
Network & Cloud Security
