SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Cybersecurity and data protection as key elements for highest quality of MOBOTIX video surveillance systems

5 Apr 2023

Cybersecurity and data protection as key elements for highest quality of MOBOTIX video surveillance systems
Contact company
Contact MOBOTIX AG
icon Add as a preferred source Download PDF version

The United States led the way with the National Defense Authorisation Act (NDAA). To protect against Chinese espionage, the NDAA lists specific components and companies that may not be used for telecommunications equipment (including security products) or services to sell the end products to U.S. federal agencies, their contractors, and grant or loan recipients and related entities.

More countries followed suit with the U.K. and Australia, and the EU launched the Cyber Resilience Act (CRA) late last year. These companies and components of Chinese origin listed in the NDAA are suspected of being used for spying and espionage by the Chinese government.

Self-certification process

MOBOTIX AG confirms that all MOBOTIX video systems comply with the requirements of the NDAA and are 100 percent NDAA compliant. MOBOTIX does not use SoC (System on Chip) or other components that can process software from Chinese companies. In addition, MOBOTIX products purchased from OEM (Original Equipment Manufacturers) partners are also 100% NDAA compliant.

MOBOTIX products purchased from OEM partners are also 100% NDAA compliant

MOBOTIX has clearly demonstrated in a defined 3-step self-certification process that its video surveillance cameras do not contain any Chinese components.

The high-quality standards are also confirmed by the renowned Australian ‘Security Electronics & Networks Magazine (sen.news),’ which comments as follows: "In SEN's opinion, the most cyber-secure IP surveillance camera is Mobotix, ... with its tremendous operational flexibility and impeccable cybersecurity credentials."

Comprehensive cybersecurity strategy

Cybersecurity is an integral part of the MOBOTIX DNA. The video systems undergo regular penetration tests, for example, by the French Centre national de prévention et de protection (CNPP) and SySS GmbH, Germany's institute for penetration tests. All MOBOTIX products and solutions are integrated into the comprehensive cybersecurity strategy, whose overall measures are bundled in the MOBOTIX Cactus Concept.

"We very much welcome the growing sensitivity of governments in particular, and companies have long since recognised the danger of industrial espionage," said Christian Cabirol, CTO of MOBOTIX AG.

Christian Cabirol adds. "For many years now, we have been using only high-performance industrial FPGAs (Field Programmable Gate Arrays) for our hardware and image generation chains, thus offering reliable protection for the user."

Processing digital signals

An FPGA is used for continuously processing digital signals such as audio and video

An FPGA is used for continuously processing digital signals such as audio and video, neural networks and deep learning algorithms, and artificial intelligence, making a system far less vulnerable to hacking and spyware.

"Proprietary MOBOTIX software 'Made in Germany' is used on these processors - giving us full control over what the entire system does and can do," explains Christian Cabirol.

The decentralised architecture of the MOBOTIX video systems also ensures the highest level of security, as all image processing processes, such as the pixelation of persons, take place directly on the camera, and no transmission of unpixelated data takes place.

Monitoring sensitive areas

In general, data protection and DSGVO-compliant applications are the focus of MOBOTIX. For example, apps from the MOBOTIX 7 platform can even dynamically pixelate images by recognising and automatically anonymising people.

This can be important when monitoring sensitive areas, public places, or schools. Thermal applications also offer the best opportunities for DSGVO-compliant perimeter and object protection, as people can be seen in the thermal image but cannot be identified.

The decentralised architecture also does not require a permanent stream to a server or control centre, as image data is only transmitted when an event occurs. And this dialog is always encrypted.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Traffic surveillance
  • Digital video surveillance
  • Remote video surveillance
  • IP video surveillance
  • Electronic security systems
  • Physical security
  • Remote security
  • Perimeter security
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security access systems
  • Network monitoring
  • Asset tracking
  • Video analytics
  • Remote video monitoring
  • Electronic access control
  • Institute security
  • Wireless security
  • Network cameras
  • Door access control
  • IP Surveillance
  • Green security
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Covert Surveillance
  • Perimeter protection
  • Cyber security
  • Data Security
  • Network Video Recorders
  • Cloud security
  • Mobile access
  • Video surveillance
  • Touchless Security
  • Related links
  • MOBOTIX Access control software
  • MOBOTIX CCTV software
  • MOBOTIX CCTV monitors
  • Biometric Access control software
  • Infrared CCTV cameras
  • ANPR Software CCTV software
  • Access Control Software Access control software
  • Detection Software CCTV software
  • Mifare Access control software
  • Drawing Software CCTV software
  • Thermal CCTV cameras
  • Wireless CCTV cameras
  • Proximity Access control software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • ConfiCard Creation Tool Access control software
  • Door Monitoring Option Access control software
  • Guard Tour Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • Serial Interface Option Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
  • CCTV monitors
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
Effective high-security wedge barriers by Delta

Effective high-security wedge barriers by Delta

What’s behind (perimeter) door #1?

What’s behind (perimeter) door #1?

TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec