Cybersecurity

Whether you are a manufacturer, integrator or end-user, cybersecurity has an impact on your business and network technology. The responsibility of maintaining a cyber-secured network requires all parties involved to each play a critical role in establishing a secure system. This starts with the products coming off the manufacturing line and goes all the way through to the day-to-day users of an installed system.

At Dahua Technology we understand the importance of network security, along with the confusion and concern it can often bring. We strive to keep our manufactured products as secure as possible, and to educate our customers and end-users so that they have the information they need to establish cybersecurity in the finished installation and end-user network.

The Path to Cybersecurity

The cybersecurity of our products is a top priority for Dahua, and we strive to input network security into the product life cycle of all our new products. Each year Dahua dedicates a portion of our R&D budget exclusively to cybersecurity utilizing our independent security research center, partnerships with industry-leading third-party testing agencies, and precautionary steps following Capability Maturity Model Integration (CMMI) guidelines. Through these efforts we strive to continually evolve our cybersecurity features. Check out the rest of our page to access additional resources and information on Dahua’s cybersecurity processes as well as information to help dealers, integrators, and end-users understand their role in cybersecurity practices.

If you have any questions or concerns, please contact us at CyberSecurity@dahuatech.com, or call our cyber security hotline at 877-609-1936.

Dahua has employed a baseline standard to ensure cybersecurity is a priority throughout product development. Learn more about our baseline below.

Once access is granted, sessions are monitored for time and credentials. If the session goes dormant or the client re-enters invalid credentials, the session is closed.

Identity security starts with forced password reset, preventing access with default credentials after deployment. Prior to sending encrypted information, Digest Access Authentication confirms identity of user, preventing plain text from traversing the connection.

Protocol Security uses industry standard protocols, many of which are open-source. Using protocols which are peer reviewed upholds standards and improves quality

Ensures the integrity of firmware upgrade packages, guarding against any unwanted payloads.

Unsafe services are disabled by default, while system is actively monitoring for password cracking attempts and inspecting traffic for undesirable payloads. Rights Management enables admins to limit the rights of each user according to need.

Every change made to the system by any user is logged for security. Permissions to delete logs are highly restricted, meaning only admins with granted access have this ability.

Data Security aids in several aspects of a secure session, supporting HTTPS and asymmetric encrypted sessions with public and private key systems, ensuring only the authorized recipient can see the information.

Click here to download the Dahua Cyber Security Baseline Standard

Additional Information & Resources