As IoT and remote work grow, so do cybersecurity risks. VIVOTEK is committed to safeguarding devices and data at every stage of our product lifecycle—from development and verification to manufacturing, delivery, and ongoing service. We continuously evaluate emerging threats and enhance our security measures to ensure your business receives the most secure and reliable solutions.
End-to-end Practices to Keep Your Data Secure
Our military-grade cybersecurity shields your data from on-premises to cloud with seamless, end-to-end protection. From hardware-level TPM encryption and secure boot to AES-256 transit security and cloud integration, we deliver comprehensive defense at every layer—ensuring your valuable data remains secure throughout its entire journey.
Data On-premise
Signed Firmware - VIVOTEK Authorized Firmware
VIVOTEK's signed firmware uses digital signatures to verify authenticity, ensuring firmware hasn't been tampered with. Devices validate firmware before installation, while signed certificates and keys encrypt all data to prevent hacker exposure and alteration.
Secure Console - Constant Protected Connection
Building on secure boot, we've enhanced remote access security by disabling SSH and SFTP console access. Only VIVOTEK-authorized, key-based authentication provides system access, creating a safer surveillance connection.
Secure VADP - Enhanced Security for 3rd Party Integration
VIVOTEK Application Development Platform (VADP) enables developers to add custom features to cameras. Secure VADP uses digital signatures and encryption for safer, more reliable third-party integrations.
Secure Boot - Secure from the Beginning
Cameras startup securely step-by-step using VIVOTEK's signed firmware. Secure boot blocks unauthorized or tampered code during startup, protecting against malicious attacks. This ensures safe factory resets and rejects unauthenticated code from compromising the camera system.
Data In Transit & On Cloud
Encryption ProtocolsUtilizes TLS 1.2, AES-256-bit encryption for data in transit and at rest, ensuring end-to-end security for transmitted data over the internet.
Automatic UpgradesRegular security testing, automatic software and firmware updates, proactive vulnerability management, and protection against threats.
No Port ForwardingVORTEX platform eliminates vulnerabilities with exclusion port forwarding to prevent unauthorized access and enhance network safety and integrity.
GDPR ReadyVORTEX platform is engineered to align with GDPR principles, providing robust features that enable both our customers and VORTEX to uphold the highest standards of data privacy and compliance.
Compliance & Certifications
NDAA Compliant
TAA Compliant
ISO 27001 certified
FIPS 140-2 level 2
Trend Micro IoT Security
PSTI
AWS
Compliance and certifications may vary by model. Please refer to the specifications on each product page for details.
Please contact us at security@vivotek.com to report a vulnerability or other security concern.