<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Verkada Microsoite</title><link>https://info.verkada.com/category/security/</link><description>Recent content in Security on Verkada Microsoite</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Thu, 12 Jun 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://info.verkada.com/category/security/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://info.verkada.com/security-infrastructure/commercial-security-system/</link><pubDate>Thu, 12 Jun 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-infrastructure/commercial-security-system/</guid><description>Whether protecting a large enterprise or small business, the right security system is crucial for maintaining safety, preventing loss, and ensuring smooth operations. The best security systems are no longer disparate on-premise systems that operate in isolation. Modern cloud physical security systems integrate cloud security cameras, access control, alarms, and more in a fully unified cloud-managed platform.
Verkada&amp;rsquo;s cloud-managed security system makes it ultra simple to monitor, get real-time alerts, make fast data-driven decisions, and easily scale from 1-10,000+ devices.</description></item><item><title/><link>https://info.verkada.com/security/physical-security/</link><pubDate>Mon, 27 Jan 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security/physical-security/</guid><description>The security industry has developed rapidly in recent decades, with an increase in the importance of cybersecurity, network protection, data privacy, and more. However, one of the oldest and most enduring forms of security remains as relevant today as ever: physical security. Despite advancements in our digital landscape, the need to protect physical assets, facilities, data hardware, and personnel is as essential as ever, especially as IoT and cyber-physical threats blur the line between our digital and physical environments.</description></item><item><title/><link>https://info.verkada.com/security/soc-reports/</link><pubDate>Tue, 20 Aug 2024 22:19:07 +0000</pubDate><guid>https://info.verkada.com/security/soc-reports/</guid><description>What is a SOC report? By Nima Emrani, Global Enterprise Solutions Engineer Service Organization Control (SOC) reports are independent audits based on the American Institute of Certified Public Accountants (AICPA) that assess an organization’s security posture and best practices for protecting clients’ data. Organizations that obtain a SOC report demonstrate that they’ve undergone a rigorous assessment process by a third party that points out any weaknesses and flaws.
There are three types of SOC reports: SOC 1 (Detailed Report - Usually Requires an NDA): SaaS Organizations that handle, process, store, or transmit financial information, or information that can impact the financial statements of their customers, need a SOC 1 audit.</description></item><item><title/><link>https://info.verkada.com/security/protecting-security-cameras-from-vandalism/</link><pubDate>Tue, 09 Jan 2024 19:03:05 +0000</pubDate><guid>https://info.verkada.com/security/protecting-security-cameras-from-vandalism/</guid><description>Video surveillance systems offer a critical layer of protection for your property. When designing a surveillance system, a lot of thought goes into optimizing the protection of your property. But you also want to consider how you are protecting the cameras themselves and understand ways to prevent vandalism in your security system.
To protect against security camera vandalism, you should prepare for it on two levels:
System design: while not focused primarily on vandalism, a properly designed video surveillance system is well-protected for just about anything.</description></item><item><title/><link>https://info.verkada.com/security/what-is-onvif/</link><pubDate>Mon, 04 Dec 2023 19:14:35 +0000</pubDate><guid>https://info.verkada.com/security/what-is-onvif/</guid><description>Open Network Video Interface Forum(ONVIF) ONVIF (Open Network Video Interface Forum) is an organization composed of multiple physical security manufacturers, to produce standards for interoperability between IP-based security cameras and physical security products. It dates back to 2008 and was founded by Axis Communications, Bosch Security Systems, and Sony. They cover not only security camera functionality, but also access control.
Benefits of ONVIF ONVIF standardizes the communication between security devices and the software produced by various manufacturers, so that a customer can mix and match different products.</description></item><item><title/><link>https://info.verkada.com/security/calculating-poe-budget/</link><pubDate>Mon, 27 Nov 2023 00:49:59 +0000</pubDate><guid>https://info.verkada.com/security/calculating-poe-budget/</guid><description>By Marcus Orciuch, Solutions Engineer
Overview Power over Ethernet (PoE) is an electrical technology used to transmit both power and data over a single ethernet cable. Defined by the Institute of Electrical and Electronics Engineers (IEEE) as 802.3af, 802.3at, and 802.3bt, PoE simplifies the installation and maintenance of IoT devices by requiring a single cable to deliver both power and network capabilities to powered devices.
Additionally, an organization adopting PoE wherever possible can centrally manage DC power to a multitude of devices, as opposed to managing an individual AC power supply for every device.</description></item><item><title/><link>https://info.verkada.com/security/Securing-Camera-Access-Ports/</link><pubDate>Tue, 14 Nov 2023 19:11:44 +0000</pubDate><guid>https://info.verkada.com/security/Securing-Camera-Access-Ports/</guid><description>By Ciaran Gillespie, Solutions Engineer
Each wired network device, such as PCs, Switches, IP Phones, and Cameras will be wired back to a type of network switch commonly known as the ‘Access Switch’. These switches are at the inner edges of the network, acting as the interface between the end devices and the corporate network. Due to the nature of these switch ports being physically accessible to end-users and bad actors, this can pose a threat to your network security.</description></item><item><title/><link>https://info.verkada.com/security/security-service-edge-sse/</link><pubDate>Tue, 31 Oct 2023 18:44:42 +0000</pubDate><guid>https://info.verkada.com/security/security-service-edge-sse/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
In a previous article (Next generation WAN), we discussed the changes in the way employees and businesses utilize computer networks, and how the increase in traffic and adoption of cloud based applications (especially real time multimedia ones) pushed the redesign of the WAN. Moving away from a rigid hub &amp;amp; spoke architecture, based on expensive private lines, and embracing the Internet, the next generation SD-WAN networks are utilizing a mix of wired and wireless public connections to route traffic based on company policies, protecting and prioritizing business critical applications.</description></item><item><title/><link>https://info.verkada.com/security/ik-ip-guide-for-security-cameras/</link><pubDate>Fri, 13 Oct 2023 14:44:45 +0000</pubDate><guid>https://info.verkada.com/security/ik-ip-guide-for-security-cameras/</guid><description>IP and IK ratings are crucial specifications for security cameras. These ratings indicate the level of protection provided against different factors. Typically, these standards help describe how &amp;ldquo;weather resistant&amp;rdquo; or &amp;ldquo;vandal resistant” a camera is.
IK Ratings IK ratings are defined by the International Electrotechnical Commission (IEC). IEC Standard #60529 describes “the degrees of protection provided by enclosures for electrical equipment against external mechanical impacts.”
The IK rating is a scale of 0 through 10 and each level of testing describes an increased level of physical impact testing.</description></item><item><title/><link>https://info.verkada.com/security/camera-firmware-app/</link><pubDate>Wed, 15 Apr 2020 17:34:48 +0000</pubDate><guid>https://info.verkada.com/security/camera-firmware-app/</guid><description>Securing Your Surveillance Camera Firmware &amp;amp; Application Most IT professionals are aware of how much effort goes into securing firmware for any tech system. It isn’t that firmware is necessarily that much more vulnerable than hardware or other aspects of a network system. But flaws do exist, and malicious actors are always looking for — and finding — new vulnerabilities to gain access.
Beyond the actual security camera firmware, there are also a host of threats — malware, spyware, ransomware, and more — that can infect your system and must constantly be safeguarded against.</description></item><item><title/><link>https://info.verkada.com/security/surveillance-network/</link><pubDate>Tue, 31 Mar 2020 23:10:29 +0000</pubDate><guid>https://info.verkada.com/security/surveillance-network/</guid><description>Securing Your Video Surveillance Network Network security is paramount for all organizations in this increasingly dangerous world. From servers and hardware to databases and software, there is a wide range of vulnerabilities that represent entry points for malicious actors.
Featured Content: How to Protect Your Security Camera System
As with all connected devices, IP video security cameras do present some risk. But they can be protected through strategies including secure transmission, firmware updates, and security patches.</description></item><item><title/><link>https://info.verkada.com/security/camera-hardware/</link><pubDate>Fri, 13 Mar 2020 21:07:08 +0000</pubDate><guid>https://info.verkada.com/security/camera-hardware/</guid><description>Protecting Your Security Camera Hardware Cameras are the main hardware components in any video surveillance system. They are the star of the show, and protecting your security cameras should be job one when it comes to safeguarding the tangible assets in your system. Both physical security and data security must be prioritized.
Because video cameras are often placed outside, they will always be vulnerable to vandalism, damage, and theft to some degree.</description></item><item><title/><link>https://info.verkada.com/security/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security/</guid><description>Prevent Vulnerabilities with a Secure System Infrastructure Video surveillance plays a key role in protecting people and property, but what provisions are in place to protect your system from cyberthreats?
Physical and data security breaches are some of the top threats that organizations face. A web search for “security camera hacked” turns up 16.6 million results. To protect your system from vulnerabilities, having a thoughtfully designed security infrastructure is ground zero.</description></item></channel></rss>