SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Genetec Inc. announces new version of unified IP security platform, Security Center

icon Add as a preferred source Download PDF version
Related Links
  • Genetec to unveil updated Security Center with advanced cyber security, privacy, and access control features at IFSEC International 2016
Security Center 5.5 allows customers to implement more elaborate disaster recovery plans for their security platform
Security Center version 5.5 gives administrators greater control and protection of their security infrastructure

Genetec, a provider of open-architecture, unified IP security solutions has announced version 5.5 of Security Center, the company’s open architecture, unified IP security platform that combines access control, video surveillance, ALPR, and communications. Security Center 5.5 offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control hardware. With innovative capabilities designed to help organisations better secure their sites, version 5.5 gives administrators greater control and protection of their security infrastructure. Security Center 5.5 is available now via the Genetec worldwide channel partner distribution network.

Unified platform enhancements

With a new disaster recovery mode that allows the configuration of multiple failover directory servers at remote sites, Security Center 5.5 allows customers to implement more elaborate disaster recovery plans for their security platform. In the event of a disaster, failover servers at geographically disparate location can immediately take control and ensure organisations continue to have access to their security platform and protect their people and assets.

Security Center 5.5 features alarm
grouping and filtering so that
operators can group alarms visually
by type, state, or priority

Offering a powerful yet efficient user experience remains a paramount driver for Security Center development. In this latest release, map-centric monitoring offers enhanced, fluid map scaling for zooming effortlessly in and out of maps—from floorplans to satellite imagery—along with the option to geo-reference dynamic objects on a map with actual geographic coordinates for greater awareness, and add new map layers. With map layering, operators can add or remove details from a map in real-time to narrow or broaden visualisation of a site. To further simplify alarm management, Security Center 5.5 features alarm grouping and filtering so that operators can group alarms visually by type, state, or priority, as well as handle entire collections of alarms, such as acknowledging or forwarding an entire group.

As part of a continuous effort to grow its ecosystem of technology partners and facilitate integration to Security Center, Genetec offers two flavours of its Software Development Kit (SDK). The Basic SDK is a freely-available package used to connect to Security Center and access configuration information, events and alarms in real-time, as well as make changes or add new tasks to the monitoring client app. A simplified online enrolment and acceptance process, that is largely automated, gives users quick access. An advanced SDK package offers all the elements of the Basic SDK with access to additional tools required by more complex integrations, and is available through Genetec certified channel partners.

Omnicast™ video management enhancements

Building on the advanced cybersecurity measures introduced in Security Center 5.4, and the company’s ongoing commitment to ‘Security of Security’, version 5.5 offers a ‘hardened’ protocol that protects against potential hacking and non-authorised internal access. When users request to access video feeds, new authentication and authorisation steps are in place to protect video data and privacy. By default, only secured media stream requests are accepted, ensuring the app or person making the request is authenticated to avoid any unauthorised requests. Token-based authentication is applied for authorising and authenticating RTSP video requests, TLS encryption for securely transmitting these user authentication tokens, and RTSP over TLS for another level of video stream encryption while in transit.

Security Center 5.5 also offers users the ability to finely manage exported or saved content, such as video clips and snapshots, which facilitates modifications prior to sharing inside or outside an organisation. Examples include the blurring and masking of snapshots to protect privacy, editing saved video clips to remove either sensitive or less valuable content and then re-exporting the final clips, adding new bookmarks to better qualify a recorded scene, and more. Sharing is made simpler by exporting video to the widely used MP4 format so as to leverage common off-the-shelf video players and eliminate the need for proprietary video players.

Synergis™ access control enhancements

Security Center 5.5 also features new access control capabilities to improve organisational security, protect sensitive information, and increase customers' choice of access control hardware.

Security Center 5.5 also features
new access control capabilities
to improve organisational security
and protect sensitive information

Through the support of the latest firmware running on the Synergis™ Cloud Link appliance alongside Mercury Security controllers, organisations are able to extend the reach of their security platform with Allegion Schlage AD-300 Hardwired and AD-400 Wireless electronic locks. Organisations can also unify controller-based and electronic lock-based security systems in the process for a more inclusive approach to access control.

Security Center 5.5 introduces Peer-to-Peer (P2P) communications between Synergis Cloud Link appliances enabling global IO linking and global antipassback. Even when connectivity to the server is unavailable, Synergis Cloud Link appliances have the intelligence to share information across the network, like inputs triggering outputs across appliances and by extending the functionality of antipassback to areas managed by multiple appliances. This added flexibility enables users to move away from relying on constant connection to the server that improves overall security.

For greater protection of confidential and sensitive data, additional means of encrypting communications have been implemented between the Synergis Cloud Link appliance and the server along with numerous industry-leading Genetec access control hardware partners, including Mercury Security (EP controllers) and ASSA ABLOY (IP locks). The primary goal is to ensure secure communications throughout a customer’s entire access control infrastructure.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Security management
  • Security monitoring system
  • Security access systems
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • IP transmission
  • Video surveillance
  • Related links
  • ABLOY Access control systems & kits
  • ASSA ABLOY Access control systems & kits
  • Genetec CCTV observation systems & accessories
  • Genetec IP cameras
  • Related categories
  • Access control systems & kits
  • CCTV observation systems & accessories
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec