Genetec UL Cybersecurity Certificate (2900-2-3) Examined

By: Dan Gelinas, Published on Dec 19, 2018

Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates?

Earlier in 2018, a false Hikvision cybersecurity certification announcement caused controversy. And Genetec itself has cast aspersions against its Chinese rivals as being untrustworthy.

Now, Genetec has announced achieving UL's 2900-2-3 Level 3 (L3) certification that Genetec claims "validates its resilience against cyber-attack."

genetec ul 3

However, does it really? What does it consist of? How much validation does it provide?

In this note, based on our discussions with Genetec, JCI, and UL we examine:

  • UL Overview
  • Cybersecurity certification process
  • Process for Genetec
  • Cost
  • Highest of 3 levels
  • Testing performed
  • UL's process
  • Others certificated

******* * ******* ** cybersecure *** ****** * major ******* *** ******** companies. *** *** *********** are ***** ************?

******* ** ****, ****** ********* ************* ************* announcement****** ***********. ********** ****** *** **** aspersions ******* *** ******* rivals** ***** *************.

***,******************* ***********'*****-*-****** * (**) ************* that ******* ****** "********* its ********** ******* *****-******."

genetec ul 3

*******, **** ** ******? What **** ** ******* of? *** **** ********** does ** *******?

** **** ****, ***** on *** *********** **** Genetec, ***, *** ** we *******:

  • ** ********
  • ************* ************* *******
  • ******* *** *******
  • ****
  • ******* ** * ******
  • ******* *********
  • **'* *******
  • ****** ************

[***************]

Executive *******

***** ** ************* *** guarantee * ******* ** 'invulnerable' *** '******** ****', the **** **** **** UL ************* ******** *********** source **** ******* ******** a ************* ****** ********** level **** ******* ************* certifications.

*******, ** ** ****** expensive *** ****-********* ** many ************* *** *** find ** ***** *****.

** ****, **** * video ************ ************* **** done ** (******* *** Tyco *** *********) ***** are **** *** *********. We ** *** **** how **** **** ***** work ** *** *** camera ************* **** ******** models.

UL ********

***** **** ****** *** 124 ******** ** ****** ****** as * ****** ** developing ********* *** ******* products ** **** **** they ******* ****** *** as ********. *******, ************ those ********* **** **** around ********** *** ********** elements, *** *************.

**’* ************* ********* ******* (UL ***),******** ** ****, ***** **-******* ******** against ******** **** ***** **** ****** ** cybersecurity *********. *** **** ****** covers ************* ** ********* levels *** *** ********* verticals ********* ***** ************ (2900-1), ********** ******* (****-*-*), and ********** ******* ******* (2900-2-2). ** ****-*-* ** UL's ******* ** "******* trust" *** *** ********* of ******** *********.

Cybersecurity ************* *******

**********, *** ************* ******** of ******* ** *** product's ****** ********* '********** penetration *******', '****** **** analysis', *** '****** *** bytecode ********', ** *** excerpts **** ***** '******* of *************' ***** *****:

Process *** *******

**** ***** **** ******* Lead ******** *********,******* ************** *** *******, **** it ******** *** **** it ***** *** *******'* customers.

*******'* ********* **** *** process, ***** **** ****** 8 ******, *** *** easy, ********* ** ** "going ** *****." ** said *** ******* **** the ********* ** *** entire ************* **** ** 5:

** *** * ******* process. *** ** ** trial *** **** ****** evidence *** **** **** that ********** ** **** for *** ***** *** then **** ********* ** in ***** ** *** people **** **. *** findings *** ******** ** that ****. ** *** a *** ** ********* information *** ****** **** everything *** ** ** should **. ** ******* lots ** **** *** my ***** ***** ****—** 5 ******.

***********, ********* **** **** UL ***** ********* ***************, they ********* *** ************ to ******* *** ******** explanation ** ******:

***** *** * ** employee *** *** *** advocate *** *** ******** to *** ****. ** presented **** ** ***** to ** *** ** needed ** ****** *** it ** ******* *** it ** **** ** is.

********* **** **** *** end ** ****** ** change **** ******, ********* formalizing ** ******* ********* Genetec *********** **********:

**** **** ********* *** procedure, ** * *** to ********* ** ******* a ********* **** ** already ***, *** ****'* have ** ******* ****. They ****** *** *************. So: '**** *** **** vulnerabilities, *** *** *** going ** ******** **** and *** ****?'

********* ******* *** ******* helped ******* *******, ****** the *********** ** ********* and *** ********* ** new *****:

** ********** *** ****** exam **** ** **** using ****’* ******** **** problems. ********* ***** *** stronger ** ****** ** different ******. ** *** tried ***** ****—******************—******, *** **** *** improved **.

********* **** ****** *********** testing ****'* ****** *** that *** ** ************* means ******* **** ********** accountable:

**** **** *********** *******, you ***’* **** ** fix ********. **** **, we **** ** *** whatever ******** **** **** or ** ***’* *** the *************.

Cost *** *************

******* **** *** ***** certification ******* **** **** $50,000 ** *****, **** notable ********* ***** ** maintain ********** ** ** guidelines. ********* **** ***** that *** ************* ******* only ******* *** ******* version, ** **** ******* was ***** ** **** on ** ***** **** version—they *** ********* ********* version *—**** **** **** to **** *** ************* process *** **** *****.

Highest ** * ******

******* ******** *** ******* of *** * ******, which ******** ********** **** levels * *** * as **** ** ** assessment ** ******** ************ of *** ******* **** knowledge ** ******** ******** controls *** ** ******** practices ** ******* *** lifecycle ** *** *******, as *** ********* ******* from **'* ******* ** Investigation *** *** *************:

Testing *********

******* ******** **** **** documentation ********* ******** *********** analysis ** *** ****, explaining:

**** ********* **** *** software *** *** ** determine ** ******** **** source ********** *** ****. If **** *** **** then ** ***** ** determine *** ******* *** then ***** ** *** if **** ******* *** known ***************.

*****, ** ***** *************** of ***** ******* *** previously *******:

*** ******** ****—***** ****—** *** **** ****** used ** *** ********. Their **** ** *** I **** ***** ***** of *****************. ** ***** ****** that ***** **** ****’* flag. *** ************ ******** of ****** ***** **** false ******** *** * small ****** **** **** positive.

*** ***** ** *** scan ** ********* ** reflected ** *** ******* graphic *****:

**** **'* ***** ********** potential ***************, *** ******* was ******* ** *******'* attention *** **** **** given * ****** ** respond, ** ** **** redacted *******:

Others ************

*** *** ******** ** ******* *** UL ****-*-* ****** **** **** ***** VideoEdge ******** **** ******** Dynamics.

*** **** *** ******* process *** ****-*-* ** was ********:

***** **** ** ******* UL2900-2-3 ***** * ** was * ******** ****** of *******, ******* *** policies. *** ******* **** of *** ******** ** all *** **** ****** to ** ********.

***********, *** **** **** the ************* ******** ** assurance ** ********* **** a ************ ******* *** doing ***** **** ** secure *** **** ********* could ***** **** *** their ********:

**’* ** *********. ** assures **** *** ************ is ***** ***** **** to **** **** ******** are ********* ************ *** mitigates *****. ** *** industry, ** ****** * level ******* ***** *** end ***** *** ******* designers, *** *** *** trust **** * ** CAP ********* ******* ***** the ************ ** ****** cybersecurity *********. ***** ***** cybersecurity ************** *** *********, the ** ****-*-* ********** standard ** ******** ** electronic ******** ******** ********.

*** *** ******* *** currently *** **** ******** companies ** ** ******* 2900-2-3

***** ******** * ***** ****** (outside *** ******** ********) that **** **** **** series ************(*** **** ** ** logged **** ** ******* IQ ** *** *** list ** **** ****** certificated *********) ** **** level ***** **** ****-*-*.

Vote / ****

Comments (14)

****** ****: **** ***** *** **** ******* ** ******* *** followint ***** **** ***, ***** *** *** ***** ************ ** achieve *** ******-*-* ** *******.

*** **** *** ******* ******* *** ****-*-* ** *** ********:

***** **** ** ******* ******-*-* ***** * ** *** * thorough ****** ** *******, ******* *** ********. *** ******* **** of *** ******** ** *** *** **** ****** ** ** prepared.

***********, *** **** **** *** ************* ******** ** ********* ** customers **** * ************ ******* *** ***** ***** **** ** secure *** **** ********* ***** ***** **** *** ***** ********:

**’* ** *********. ** ******* **** *** ************ ** ***** their **** ** **** **** ******** *** ********* ************ *** mitigates *****. ** *** ********, ** ****** * ***** ******* field *** *** ***** *** ******* *********, *** *** *** trust **** * ** *** ********* ******* ***** *** ************ of ****** ************* *********. ***** ***** ************* ************** *** *********, the ** ****-*-* ********** ******** ** ******** ** ********** ******** security ********.

* ***** ** ** * **** *****, **** ** ***** someone ** ****** ** ********* * ******** *************** *** ********* for ********** * *******/******** **** *** ** **********. ******* ***** is ** *** ***** ******** **** **** ***** ** ******* attack, ***** ******* ***** ** ** ******, ***** *** ********** not *******. **** ** **** ** **** * ****** ***, once *** *** ** ***** ******* ** *** ********** ***** there ** ** ******* ** * ****** *** **** *************, good ****. *** ***** ***** ** ******** ** *** ****** in ******'* ***** *** *** *** ****/*********** ******* ** ***** up *** ***. **** **** ** * **** ** *** bucket ******* ** **** ***** *********** ** ** ***** ******** is ********* ****** ** *** ******* ****** **** **** ** watch ******* ****, **** **** **** ******* ***** ******. ** far ** ***, * **** *******, ***** ** *** ** is ******* ****, ******* **** ****, *****, ****** *** ******. All *** ***** ******* **** *** ** ******** **** *******, I *** *** *** *** ******** ** *** **** ******* murmuring *** ****, ** ** ***** **** ** *** *** this *************. ****.

** * ******** **** *** **** ***, **** *** *******, more ** **** ***** *** ********** ****** *** ********* **** year **** *** ****** **** ***.

******** ** * ****** ********* ****** ***** *** ***** **** are ****** *** *** ***** **** *** *******. **** ** what ***** ** ****.

***** *****, ***

**** ** *****! ** ********* ****** ****, ***** **** ** as ***** ****** ** *******?

* **** **** **** ****** *** ***** **-****** ** *** as ** *** **** * *****, *** *********** ******** * believe *** ***** ** *****.

** **** *** *** ***** ** **? ******* *** ************* criteria ***** *** ****** ** ** ***** ** **** ** the ****** ***'** *** *** ********.

*** * ***'* ******* *** ****** ***** ** ******* **** this.

**** ******. ***** ** **** ** *** **** "***". *** could **** ** * ****:

- ********* ** **** ** ***** ****** ** *******
- ******* ** **** ** ***** ****** ** ********* (******** less ******* ********* ** *** **** ** *********, *** **** also **** * **** ****)

- ******* ** **** ** ***** ****** ** ********* (******** less ******* ********* ** *** **** ** *********, *** **** also **** * **** ****)

**, ****, ***'** *** ****!

***** ********* ********* **** ** **** ***** ************* ***********, ****, let **** ** **. ** *****, **** *** ***** **** some **** ** ****** ******* *******.

*** ** *************, ******, **** ***** *** ****** ***** / issues, ** ***** **'* **** *** '****** ******' ** ********* like ** ***, ** ***** ** **** ******** ** **** any ********** ********* **** **** *** ***** *** ***** *****, the ******* **********.

**** ** *** ***** ***** * ************* *** ***** '**** of ************* ********** *******'?

****** **** *** ******** *** ***** *** **** * ***-*****.

** ******* **** *** *************, **** *** *********, ****** ****, the **** **** ** ***** ********.

** ********* **** *** *************, **** ***** ******** ************* **** super ****** **** ***** *** ***** ** ** *******, **** aim ** ***** *** ****** ** ****** *** *** ** booger ******* *********. *** ** ******* ***** ******* ******** ********* is ******** ***** ** ***** *** ******.

** ******* **** *** *************, **** *** *********, ****** ****, the **** **** ** ***** ********.

***, ** *** **** **** *** ******* ** **** **** here ** ***** *** **** ******* *********?

******** ** **** **********, **** ** **** ** **** ***** Genetec's *************:

***** ** ************* *** ********* * ******* ** '************' *** 'backdoor ****', *** **** **** **** ** ************* ******** *********** source **** ******* ******** * ************* ****** ********** ***** **** generic ************* **************.

**** ***** **** ** *****, ** ****:

** ********* **** *** *************, **** ***** ******** ************* **** super ****** **** ***** *** ***** ** ** *******

** ****** *** **** *** ***** *** ******** ***** **** door ****. ** ******* ****** ** *** ** * ******** that ** ***** *** ****, **** *****. ** ********* ****** to *** ** * ******** **** ** ***** *** ****, they *****.

*** ********** ** - *** ** * ******* ******** ******* who ******** ********* *** *** **** ***** *** *** ***** is ********** ** ** ************* ********** *** ************** ******** ************** and **** ************* *****. *** ***** ** **** ******** *******.

******* ****** ** *** ** * ******** **** ** ***** not ****, **** *****. ** ********* ****** ** *** ** a ******** **** ** ***** *** ****, **** *****.

* ******* ***** **** *** **** *****-******** ********, ************* ********* and ******* *** *** **** ******** ****.

* ******* ***** **** *** **** *****-******** ********, ************* ********* and ******* *** *** **** ******** ****.

***, **** ** **** **** ********. *** *** ******, **** is ******* *** ** ********.

***'* ** **** **********:

  • *'** ******* ********* ****** **** ** **** *** ** ******* of ******* **** ** *************. ** ** **** **** ******* I **** ****** ****.
  • ** ********* ***** **** *************, ** **** **** * ******** article ***** / ** ********* ** ** ****** ** **** clear ***** ** ************* ****.
  • ** **** *** ********* *** ********* / ******* ******* *** it **** ********* ** ******* ********** ** ******** **** **** year's ******** **** *** ****** *****.

******* ** ****** ******* **** ************* ** **** ** ******* they **** ********* ** ******* **** *****. **** ** ***********.

**** *** *********** *** **** ** *********** **** ***** ******** business ******* ** **** ** **** ***** ************ ** *** field *** ***** ** ** ******** ** **** * ***** of ********* ***** ******** ********* ** ** ******** **** ******* customers...............nice ** *** ** ***** ************* ** *** ***** ******** compliance ***********

** **** ***** ** ******* ** *** ************* ** ********... *** ***********?

*'** ******* *** ** ** ******* ** ** *** **** get **** ** *** ****, **#*.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Panasonic 32MP Multi Imager Camera Tested (WV-X8570N) on May 16, 2019
Panasonic has released their first multi imager models including the 32MP (4x4K) WV-X8570N, claiming "Extreme image quality for evidence capturing...
Bank Security Manager Interview on May 15, 2019
Bank security contends with many significant threats - from fraudsters to robbers and more. In this interview, IPVM spoke with bank security...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
China PRC Government New National Video Surveillance Standards on May 14, 2019
The People's Republic of China (PRC) government has released a new set of overarching standards for authorities to follow when they install video...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Bluecherry Open Sources Entire VMS on May 13, 2019
Bluecherry announced they have "released the entire Bluecherry software application open source with a GPL license". We spoke to Bluecherry's...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...
ADT's Top Dealer "The Defenders" Sued 20+ Times on May 07, 2019
ADT's largest authorized dealer, The Defenders, has been sued more than 20 times since 2012, IPVM has verified through analyzing legal...

Most Recent Industry Reports

Verkada Video Quality Problems Tested on May 23, 2019
Verkada suffers from numerous video quality problems, not found in commercial IP cameras, new IPVM testing of Verkada vs Axis and Hikvision...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
US Considers Sanctions Against Hikvision and Dahua on May 22, 2019
The US government is considering blacklisting "up to 5" PRC surveillance firms, including Hikvision and Dahua, Bloomberg reported, with human...
Dahua USA Celebrates 5 Years of Errors on May 21, 2019
Dahua USA is, in their own words, 'celebrating' 5 years in North America or as trade magazine SSN declared: Dahua Technology finds success in...
Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
Covert Facial Recognition Using Axis and Amazon By NYTimes on May 20, 2019
What if you took a 33MP Axis camera covering one of the busiest parks in the US and ran Amazon Facial Recognition against it? That is what the...
Amazon Ring Public Subsidy Program Aims To Dominate Residential Security on May 20, 2019
Amazon dominates market after market. Quitely, but increasingly, they are doing so in residential security, through a combination of significant...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact