With the rising threats of the cyber world, it is important to stay diligent in protecting your technology and security systems. One way to do that is by encrypting communications between your devices and your security system. So how does that work, exactly?
How does end-to-end encryption work?
Generally, end-to-end encryption works when you start an app, generating a private and a public key. Your private key never leaves your phone. Your public key is stored on a server, which is made available to all who send you a message. Then, when someone writes to you, your public key is retrieved and used to encrypt their message so that only your private key can decrypt it. An encrypted file is then sent through the server to you. Finally, you receive a file, and your private key is used to decrypt the message.
In the case of Ganz CORTROL Video Management System, let’s say Sue is a client and John is her security specialist, and they are trying to communicate safely. When Sue starts the CORTROL client, a private and public key are generated. Secondly, Sue's private key never leaves the desktop client while her public key is stored on the CORTROL server. Thirdly, when John starts the CORTROL mobile app, a private and public key are generated. John never leaves the mobile app while his public key is stored on the CORTROL server. The video is received by Sue and John, and their private keys are used to decrypt the communications.
It can be detrimental to a system when it does not have several layers of security. Video management systems may be susceptible to hackers, leaving your company open to having precious data stolen.
Ganz CORTROL has eight depths of layers, each with its own set of sub-layers:
Advanced Threat Protection
Network Security
Data Security
Infrastructure Security
Rick Governance & Compliance
Mobile Security: Desktop Client, Mobile App, and Web Client
System Security: CORTROL Server
Application Security
In closing, I think we can all agree on the importance of taking cybersecurity measures for your personal and your business’ data, especially security footage and analytics. Thus, ensuring your company has these layers of security for your video management system is a must-have. Learn more about our VMS here.