Encrypting video security systems

Issue 8 2021 Surveillance, Information Security

German video technology manufacturer Dallmeier has launched the Dallmeier Device Manager, a tool for conveniently configuring and administering Dallmeier video IP systems. With this successor to the popular PService software, installers and system managers can quickly and easily encrypt a wide range of Dallmeier video systems with TLS certificates and apply other security measures.


Dallmeier Device Manager.

Installers and system administrators are familiar with the challenge: providing encryption for the connections within a video security system is a complex, time-consuming task. Expert technical skills are required, particularly when large network and system landscapes are involved. The new Dallmeier Device Manager tool makes configuring security much more convenient.

Encryption in six easy steps

In addition to all device management tasks, the Dallmeier Device Manager (DDM) makes it possible to encrypt a Dallmeier video system with TLS (Transport Layer Security) certificates. Accordingly, system administrators can provide the Dallmeier devices with the necessary certificates from a single central user interface. It is even possible to encrypt access via mobile end devices. In this way, DDM users further increase the protection for their Dallmeier video systems and can meet their individual security requirements.

TLS encryption.

On its homepage, the manufacturer offers a configuration document which explains how to implement TLS encryption in six easy steps. (Download the document via the short link www.securitysa.com/*DDM).

Dashboard: critical data always in view

The DDM further features a dashboard which displays the most important data regarding hardware and security status, licencing arrangements and the software version. To make this device data available, the software automatically scans the entire video network TCP/UDP for Dallmeier single sensor cameras, multi-focal sensor cameras and recording systems. A scan for ONVIF-compatible devices is also possible. The DDM can also be used to change many settings and the IP addresses of the connected Dallmeier devices, open configuration dialogues directly and to create wide-ranging reports for optimisation and maintenance.

To improve system security further, when they run the software for the first time, system operators are instructed to assign strong passwords for access to the individual devices. Additionally, the system informs the user about current software updates and software maintenance licences that are due to expire. Devices with the same software version can be updated together in a single step via the DDM.

Full system continuity to the VMS

As soon as the connected devices have been stored in the DDM, they can easily be transferred to the Dallmeier Video Management Software SeMSy Compact together with the corresponding configuration files using the multiple selection and drag-and-drop functions. The cameras are ready for use immediately after this operation, there is no need to log onto the VMS again.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Cutting costs and enhancing security
Secutel Technologies Surveillance
[Sponsored] Visual verification, powered by the Secutel Visual Verifier, detects and verifies intrusions and physical attacks and ensures comprehensive protection in areas where high-value losses are at risk.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...