SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Data security experts at Bosch and Genetec discuss impact of GDPR on video security

Data security experts at Bosch and Genetec discuss impact of GDPR on video security
Contact company
Contact Bosch Building Technologies
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • GDPR impacts video security, demanding privacy by design and affecting business models.
  • Bosch and Genetec emphasise end-to-end solutions for video data and communication security.
  • Digital infrastructure enables video analytics providing deeper business intelligence and security.

Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises.

This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the viewpoint of the experts when it comes to data security? Geoff Kohl, Senior Director of Marketing for the Security Industry Association, was keen to get the opinions of those who are experiencing the current situation with regard to data protection, and its impact on video security, first-hand. What follows is an outline of the discussion with Gregor Schlechtriem, Senior Vice President business unit Security of Bosch Building Technologies, a global player in video surveillance, and Pierre Racz, CEO of Genetec, who are world-renowned for their software in the safety and security domain.

End-to-end security system

According to the experts, data security starts with an end-to-end solution

The introduction of a key statistic started the conversation: by 2025, it is expected that 75 billion devices will be connected to the Internet. Clearly, this also impacts video security as it is no longer isolated and part of a ‘closed’ system; it has become part of the IoT. Therefore, the focus cannot remain solely on image quality and the reduction of bitrates; equal prominence must be given to data security. According to the experts, data security starts with an end-to-end solution.

For example, the consequences of having an unprotected computer inside your firewall are immeasurable; it’s like an open door to cyber criminals. To successfully minimise the risks the complete video security infrastructure needs to be considered, rather than single components. This is a key advantage of an end-to-end security system that eliminates potential weak links.

Secure communication between trusted devices

So, end-to-end data security solutions have their advocates, but what makes them so persuasive, and effective? Well, solutions such as those developed by Bosch and Genetec are designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS).

When one side questions the design of the other we accept that the observation is accurate"

To achieve this effectively requires collaboration, which is why, according to Geoff Kohl, an ecosystem of trusted partners is invaluable, “Risk is not the responsibility of one company. Everyone has to be working together. Bosch and Genetec are obviously doing this.”

To support Geoff’s opinion, Pierre Racz believes that trust is a quality to be earned, not bought. A case in point is the 15-year working relationship between Bosch and Genetec, “The engineers know each other. We have a trusted relationship, so when one side questions the design of the other we accept that the observation is accurate.”

Management of massive data

In what ways can more focus be applied to data security? Although the basic task of video security systems remains unchanged, new technologies are consistently being introduced that offer new possibilities. An example of this is IP technology which, when combined with the increasing computation power, enables video security cameras to capture images of a quality that was previously unimaginable.

End-to-end-data-security-cybercrime-920x533
GDPR instils an obligation to guarantee privacy by design

According to Gregor Schlechtriem, “As the industry moves to delivering great image quality it creates new challenges, like how to intelligently manage the massive influx of data. On the other hand, video security devices connected to the internet and the wealth of their collective data is a fantastic enabler for new opportunities.” Video security has undergone substantial changes and offer limitless possibilitiesHe is also of the opinion that video security data should be viewed as business tool that provides insights to improve efficiency, increase security or create new business opportunities. It is clear that, compared to the earlier days, other departments, like marketing, are getting more interested in video security data.

Meanwhile, as CEO of Genetec, Pierre Racz confirms that video security has undergone substantial changes and offer limitless possibilities. The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata. This metadata adds sense and structure to video data and provides metrics such as speed, direction, colour, size, object class and trajectory. The result of this enriched, more business-focused video data collection is a deeper level of business intelligence.

Minimising risks

Gregor Schlechtriem is only too aware that this level of connectivity also brings a higher level of risk, “Because there is valuable information included in videos we have to focus more on data security, and think beyond the basic tasks of a security system.” Pierre Racz agrees.A digital infrastructure and connectivity opens up countless opportunities The consequences of being hacked are clearly front of mind for him, “If we turn on the news today we can see the circus that has resulted from the global chaos caused by a recent cyber-breach.” By focusing on minimising these risks, Pierre Racz believes that IoT and the technology enabling us to collect and interpret video data will outweigh the risks and provide improvements in health, and wealth.

The key learning here is that a digital infrastructure and connectivity opens up countless opportunities, as expressed by Gregor Schlechtriem, “It is the enabler to generate valuable data for your business, to understand what’s going on with video analytics at the edge and derive invaluable data for situational awareness to improve your business. If you don’t use IP, you miss out.”

Internet connected IoT
The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata

Operational efficiency

Pierre Racz agrees, “Compared to video cassettes we can provide so much more value with the kind of technology that can be initially utilised for security, but then leveraged for operational efficiency and even shared with other departments, such as marketing.” He also believes that, although the economic lifetime of analog equipment is almost double that of digital equipment, analog is a low pass filter, so image quality is limited to standards established in 1937.

As Geoff concludes the interview and the various opinions are assessed, it’s clear that the end-to-end data security solutions such as those employed by Bosch and Genetec are the way forward for video data security.

GDPR influence

Considering the recent changes in European regulations, Geoff Kohl of the Security Industry Association now invites invited Gregor Schlechtriem and Pierre Racz to briefly share their thoughts regarding GDPR – one of the first official data protection acts – and its impact on solutions and business models.

If these regulations are applied to Facebook, the resultant penalty will be $1.6b"Pierre Racz highlights the recent Facebook case, “If these regulations are applied to Facebook, a technologically savvy company with $40b of revenue, the resultant penalty will be $1.6b. There is no better example of why data negligence and fiduciary irresponsibility is simply unacceptable.”

Gregor Schlechtriem’s point of view is that GDPR instils an obligation to guarantee privacy by design, therefore it should influence any business model from the moment of conception. “You have to bring the right ingredients to the table to guarantee privacy, it’s the responsibility of the system owner. That’s why we analysed our systems to ensure our technology was capable of meeting the requirements.” And, of course, trust. But the significance of this to people's everyday lives must also be considered; a sentiment which Pierre Racz captures perfectly, “Privacy is our democratic right.”

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Video analytics
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Video surveillance
  • Related links
  • Genetec CCTV software
  • Related categories
  • CCTV software
  • Video servers (IP transmission)
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Explore Bosch and Genetec experts' take on enhancing data security and devising robust safety protocols in this insightful article.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec