Trust Center

Committed to building secure and compliant solutions so you can protect your organization from both physical and cybersecurity threats.

Our approach

Here at Genetec we've always got your security and data protection in mind. Our approach? To deliver secure solutions so that you can protect your organization from physical and cyber threats. To further reduce cyber risk, we focus on open, transparent communications and working with trusted partners.

We build cybersecurity into our

product design

At Genetec, cybersecurity is part of our design and development process, not something we add on at the end. We use industry best practices, such as DevSecOps, to make sure our products are cybersecure.

With one platform to manage video surveillance, access control, and more, maintenance is easier. Updates require minimal downtime, so you and your team have time to focus on everything else.

Our cybersecurity certifications

ISO/IEC 27001 standard

This certification guarantees that Genetec products follow ISO best practices.

ISO/IEC 27017 standard

Genetec products meet the ISO cybersecurity standard in the collection of customer data.

SOC 2 Type II Compliance

Genetec has successfully completed the System and Organizational Controls (SOC 2) Type II audit.

Achieving cyber resilience, together

Secure and reliable integrations

Our ecosystem of technology partners is built on trust and transparency. We collaborate and share knowledge with organizations that value security and data privacy. This helps to strengthen security and prevent unauthorized access across each component of your system.

Discover our global partner network >

Responsible artificial intelligence

We’ve created strict guidelines to follow for creating and maintaining our AI models. Our developers prioritize privacy, data governance, transparency, safety, and keeping humans in the loop to minimize bias and make decisions.

We’re committed to providing built-in tools that help comply with evolving AI regulations.

Transparency at all times

We regularly contract an external firm to perform routine penetration tests on our products and provide summaries of the findings. We also have a Bug Bounty program and a robust vulnerability management program. Vulnerability reports are triaged, investigated, and remediated in a timely fashion.

View all security advisories >

Take charge of your security and protect what

matters most

Read our guide to cybersecurity for

physical security professionals

Looking for more details?

Download and review certifications, penetration test reports, and product security protocols