Genetec UL Cybersecurity Certificate (2900-2-3) Examined

Author: Dan Gelinas, Published on Dec 19, 2018

Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates?

Earlier in 2018, a false Hikvision cybersecurity certification announcement caused controversy. And Genetec itself has cast aspersions against its Chinese rivals as being untrustworthy.

Now, Genetec has announced achieving UL's 2900-2-3 Level 3 (L3) certification that Genetec claims "validates its resilience against cyber-attack."

genetec ul 3

However, does it really? What does it consist of? How much validation does it provide?

In this note, based on our discussions with Genetec, JCI, and UL we examine:

  • UL Overview
  • Cybersecurity certification process
  • Process for Genetec
  • Cost
  • Highest of 3 levels
  • Testing performed
  • UL's process
  • Others certificated

******* * ******* ** *********** *** ****** * ***** ******* for ******** *********. *** *** *********** *** ***** ************?

******* ** ****, ****** ********* ************* ************* ****************** ***********. ********** ****** *** **** ********** ******* *** ******* ******** ***** *************.

***,******************* ***********'*****-*-****** * (**) ************* **** ******* ****** "********* *** ********** against *****-******."

genetec ul 3

*******, **** ** ******? **** **** ** ******* **? *** much ********** **** ** *******?

** **** ****, ***** ** *** *********** **** *******, ***, and ** ** *******:

  • ** ********
  • ************* ************* *******
  • ******* *** *******
  • ****
  • ******* ** * ******
  • ******* *********
  • **'* *******
  • ****** ************

[***************]

Executive *******

***** ** ************* *** ********* * ******* ** '************' *** 'backdoor ****', *** **** **** **** ** ************* ******** *********** source **** ******* ******** * ************* ****** ********** ***** **** generic ************* **************.

*******, ** ** ****** ********* *** ****-********* ** **** ************* may *** **** ** ***** *****.

** ****, **** * ***** ************ ************* **** **** ** (Genetec *** **** *** *********) ***** *** **** *** *********. We ** *** **** *** **** **** ***** **** ** fit *** ****** ************* **** ******** ******.

UL ********

***** **** ****** *** *** ******** ** ****** ****** ** * ****** ** ********** ********* and ******* ******** ** **** **** **** ******* ****** *** as ********. *******, ************ ***** ********* **** **** ****** ********** and ********** ********, *** *************.

**’* ************* ********* ******* (** ***),******** ** ****, ***** **-******* ******** ******* ******** **** ***** **** ****** ** ************* *********. *** **** ****** ****** ************* ** ********* ****** *** for ********* ********* ********* ***** ************ (****-*), ********** ******* (****-*-*), and ********** ******* ******* (****-*-*). ** ****-*-* ** **'* ******* to "******* *****" *** *** ********* ** ******** *********.

Cybersecurity ************* *******

**********, *** ************* ******** ** ******* ** *** *******'* ****** including '********** *********** *******', '****** **** ********', *** '****** *** bytecode ********', ** *** ******** **** ***** '******* ** *************' shown *****:

Process *** *******

**** ***** **** ******* **** ******** *********,******* ************** *** *******, **** ** ******** *** **** ** ***** for *******'* *********.

*******'* ********* **** *** *******, ***** **** ****** * ******, was *** ****, ********* ** ** "***** ** *****." ** said *** ******* **** *** ********* ** *** ****** ************* team ** *:

** *** * ******* *******. *** ** ** ***** *** they ****** ******** *** **** **** **** ********** ** **** for *** ***** *** **** **** ********* ** ** ***** of *** ****** **** **. *** ******** *** ******** ** that ****. ** *** * *** ** ********* *********** *** making **** ********** *** ** ** ****** **. ** ******* lots ** **** *** ** ***** ***** ****—** * ******.

***********, ********* **** **** ** ***** ********* ***************, **** ********* the ************ ** ******* *** ******** *********** ** ******:

***** *** * ** ******** *** *** *** ******** *** was ******** ** *** ****. ** ********* **** ** ***** to ** *** ** ****** ** ****** *** ** ** explain *** ** ** **** ** **.

********* **** **** *** *** ** ****** ** ****** **** things, ********* *********** ** ******* ********* ******* *********** **********:

**** **** ********* *** *********, ** * *** ** ********* in ******* * ********* **** ** ******* ***, *** ****'* have ** ******* ****. **** ****** *** *************. **: '**** you **** ***************, *** *** *** ***** ** ******** **** and *** ****?'

********* ******* *** ******* ****** ******* *******, ****** *** *********** of ********* *** *** ********* ** *** *****:

** ********** *** ****** **** **** ** **** ***** ****’* catching **** ********. ********* ***** *** ******** ** ****** ** different ******. ** *** ***** ***** ****—******************—******, *** **** *** ******** **.

********* **** ****** *********** ******* ****'* ****** *** **** *** UL ************* ***** ******* **** ********** ***********:

**** **** *********** *******, *** ***’* **** ** *** ********. With **, ** **** ** *** ******** ******** **** **** or ** ***’* *** *** *************.

Cost *** *************

******* **** *** ***** ************* ******* **** **** $**,*** ** front, **** ******* ********* ***** ** ******** ********** ** ** guidelines. ********* **** ***** **** *** ************* ******* **** ******* the ******* *******, ** **** ******* *** ***** ** **** on ** ***** **** *******—**** *** ********* ********* ******* *—**** will **** ** **** *** ************* ******* *** **** *****.

Highest ** * ******

******* ******** *** ******* ** *** * ******, ***** ******** everything **** ****** * *** * ** **** ** ** assessment ** ******** ************ ** *** ******* **** ********* ** internal ******** ******** *** ** ******** ********* ** ******* *** lifecycle ** *** *******, ** *** ********* ******* **** **'* Outline ** ************* *** *** *************:

Testing *********

******* ******** **** **** ************* ********* ******** *********** ******** ** had ****, **********:

**** ********* **** *** ******** *** *** ** ********* ** external **** ****** ********** *** ****. ** **** *** **** then ** ***** ** ********* *** ******* *** **** ***** to *** ** **** ******* *** ***** ***************.

*****, ** ***** *************** ** ***** ******* *** ********** *******:

*** ******** ****—***** ****—** *** **** ****** **** ** *** ********. ***** **** is *** * **** ***** ***** ** *****************. ** ***** ****** **** ***** **** ****’* ****. *** overwhelming ******** ** ****** ***** **** ***** ******** *** * small ****** **** **** ********.

*** ***** ** *** **** ** ********* ** ********* ** the ******* ******* *****:

**** **'* ***** ********** ********* ***************, *** ******* *** ******* to *******'* ********* *** **** **** ***** * ****** ** respond, ** ** **** ******** *******:

Others ************

*** *** ******** ** ******* *** ** ****-*-* ****** **** **** ***** ********* ******** **** ******** ********.

*** **** *** ******* ******* *** ****-*-* ** *** ********:

***** **** ** ******* ******-*-* ***** * ** *** * thorough ****** ** *******, ******* *** ********. *** ******* **** of *** ******** ** *** *** **** ****** ** ** prepared.

***********, *** **** **** *** ************* ******** ** ********* ** customers **** * ************ ******* *** ***** ***** **** ** secure *** **** ********* ***** ***** **** *** ***** ********:

**’* ** *********. ** ******* **** *** ************ ** ***** their **** ** **** **** ******** *** ********* ************ *** mitigates *****. ** *** ********, ** ****** * ***** ******* field *** *** ***** *** ******* *********, *** *** *** trust **** * ** *** ********* ******* ***** *** ************ of ****** ************* *********. ***** ***** ************* ************** *** *********, the ** ****-*-* ********** ******** ** ******** ** ********** ******** security ********.

*** *** ******* *** ********* *** **** ******** ********* ** go ******* ****-*-*

***** ******** * ***** ****** (******* *** ******** ********) **** **** been **** ****** ************(*** **** ** ** ****** **** ** ******* ** ** see *** **** ** **** ****** ************ *********) ** **** level ***** **** ****-*-*.

Vote / ****

Comments (12)

****** ****: **** ***** *** **** ******* ** ******* *** followint ***** **** ***, ***** *** *** ***** ************ ** achieve *** ******-*-* ** *******.

*** **** *** ******* ******* *** ****-*-* ** *** ********:

***** **** ** ******* ******-*-* ***** * ** *** * thorough ****** ** *******, ******* *** ********. *** ******* **** of *** ******** ** *** *** **** ****** ** ** prepared.

***********, *** **** **** *** ************* ******** ** ********* ** customers **** * ************ ******* *** ***** ***** **** ** secure *** **** ********* ***** ***** **** *** ***** ********:

**’* ** *********. ** ******* **** *** ************ ** ***** their **** ** **** **** ******** *** ********* ************ *** mitigates *****. ** *** ********, ** ****** * ***** ******* field *** *** ***** *** ******* *********, *** *** *** trust **** * ** *** ********* ******* ***** *** ************ of ****** ************* *********. ***** ***** ************* ************** *** *********, the ** ****-*-* ********** ******** ** ******** ** ********** ******** security ********.

* ***** ** ** * **** *****, **** ** ***** someone ** ****** ** ********* * ******** *************** *** ********* for ********** * *******/******** **** *** ** **********. ******* ***** is ** *** ***** ******** **** **** ***** ** ******* attack, ***** ******* ***** ** ** ******, ***** *** ********** not *******. **** ** **** ** **** * ****** ***, once *** *** ** ***** ******* ** *** ********** ***** there ** ** ******* ** * ****** *** **** *************, good ****. *** ***** ***** ** ******** ** *** ****** in ******'* ***** *** *** *** ****/*********** ******* ** ***** up *** ***. **** **** ** * **** ** *** bucket ******* ** **** ***** *********** ** ** ***** ******** is ********* ****** ** *** ******* ****** **** **** ** watch ******* ****, **** **** **** ******* ***** ******. ** far ** ***, * **** *******, ***** ** *** ** is ******* ****, ******* **** ****, *****, ****** *** ******. All *** ***** ******* **** *** ** ******** **** *******, I *** *** *** *** ******** ** *** **** ******* murmuring *** ****, ** ** ***** **** ** *** *** this *************. ****.

** * ******** **** *** **** ***, **** *** *******, more ** **** ***** *** ********** ****** *** ********* **** year **** *** ****** **** ***.

******** ** * ****** ********* ****** ***** *** ***** **** are ****** *** *** ***** **** *** *******. **** ** what ***** ** ****.

***** *****, ***

**** ** *****! ** ********* ****** ****, ***** **** ** as ***** ****** ** *******?

* **** **** **** ****** *** ***** **-****** ** *** as ** *** **** * *****, *** *********** ******** * believe *** ***** ** *****.

** **** *** *** ***** ** **? ******* *** ************* criteria ***** *** ****** ** ** ***** ** **** ** the ****** ***'** *** *** ********.

*** * ***'* ******* *** ****** ***** ** ******* **** this.

**** ******. ***** ** **** ** *** **** "***". *** could **** ** * ****:

- ********* ** **** ** ***** ****** ** *******
- ******* ** **** ** ***** ****** ** ********* (******** less ******* ********* ** *** **** ** *********, *** **** also **** * **** ****)

- ******* ** **** ** ***** ****** ** ********* (******** less ******* ********* ** *** **** ** *********, *** **** also **** * **** ****)

**, ****, ***'** *** ****!

***** ********* ********* **** ** **** ***** ************* ***********, ****, let **** ** **. ** *****, **** *** ***** **** some **** ** ****** ******* *******.

*** ** *************, ******, **** ***** *** ****** ***** / issues, ** ***** **'* **** *** '****** ******' ** ********* like ** ***, ** ***** ** **** ******** ** **** any ********** ********* **** **** *** ***** *** ***** *****, the ******* **********.

**** ** *** ***** ***** * ************* *** ***** '**** of ************* ********** *******'?

****** **** *** ******** *** ***** *** **** * ***-*****.

** ******* **** *** *************, **** *** *********, ****** ****, the **** **** ** ***** ********.

** ********* **** *** *************, **** ***** ******** ************* **** super ****** **** ***** *** ***** ** ** *******, **** aim ** ***** *** ****** ** ****** *** *** ** booger ******* *********. *** ** ******* ***** ******* ******** ********* is ******** ***** ** ***** *** ******.

** ******* **** *** *************, **** *** *********, ****** ****, the **** **** ** ***** ********.

***, ** *** **** **** *** ******* ** **** **** here ** ***** *** **** ******* *********?

******** ** **** **********, **** ** **** ** **** ***** Genetec's *************:

***** ** ************* *** ********* * ******* ** '************' *** 'backdoor ****', *** **** **** **** ** ************* ******** *********** source **** ******* ******** * ************* ****** ********** ***** **** generic ************* **************.

**** ***** **** ** *****, ** ****:

** ********* **** *** *************, **** ***** ******** ************* **** super ****** **** ***** *** ***** ** ** *******

** ****** *** **** *** ***** *** ******** ***** **** door ****. ** ******* ****** ** *** ** * ******** that ** ***** *** ****, **** *****. ** ********* ****** to *** ** * ******** **** ** ***** *** ****, they *****.

*** ********** ** - *** ** * ******* ******** ******* who ******** ********* *** *** **** ***** *** *** ***** is ********** ** ** ************* ********** *** ************** ******** ************** and **** ************* *****. *** ***** ** **** ******** *******.

******* ****** ** *** ** * ******** **** ** ***** not ****, **** *****. ** ********* ****** ** *** ** a ******** **** ** ***** *** ****, **** *****.

* ******* ***** **** *** **** *****-******** ********, ************* ********* and ******* *** *** **** ******** ****.

* ******* ***** **** *** **** *****-******** ********, ************* ********* and ******* *** *** **** ******** ****.

***, **** ** **** **** ********. *** *** ******, **** is ******* *** ** ********.

***'* ** **** **********:

  • *'** ******* ********* ****** **** ** **** *** ** ******* of ******* **** ** *************. ** ** **** **** ******* I **** ****** ****.
  • ** ********* ***** **** *************, ** **** **** * ******** article ***** / ** ********* ** ** ****** ** **** clear ***** ** ************* ****.
  • ** **** *** ********* *** ********* / ******* ******* *** it **** ********* ** ******* ********** ** ******** **** **** year's ******** **** *** ****** *****.

******* ** ****** ******* **** ************* ** **** ** ******* they **** ********* ** ******* **** *****. **** ** ***********.

**** *** *********** *** **** ** *********** **** ***** ******** business ******* ** **** ** **** ***** ************ ** *** field *** ***** ** ** ******** ** **** * ***** of ********* ***** ******** ********* ** ** ******** **** ******* customers...............nice ** *** ** ***** ************* ** *** ***** ******** compliance ***********

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
Pelco Favorability Results 2019 on Jan 11, 2019
Pelco had a significant favorability problem amongst integrators in our previous study (see 2016 Pelco results). Now, in the first edition of our...
Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
NTP / Network Time Guide For Video Surveillance on Jan 10, 2019
Inaccurate time can lead to missing or inadmissible video, yet this topic is often overlooked, with cameras and servers left defaulted,...
Managed Video Services UL 827B Examined on Jan 09, 2019
Historically, UL listings for central stations have been important, with UL 827 having widespread support. However, few central stations have...
H.265 / HEVC Codec Tutorial on Jan 08, 2019
H.265 support improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and most manufacturers...
IPVM Best New Products 2019 Opened - 70+ Entrants on Jan 07, 2019
The inaugural IPVM Best New Product Awards has been opened - the industry's first and only program where the awards are not pay-to-play and the...
CyberExtruder Face Recognition Profile on Jan 04, 2019
CyberExtruder offers 3D modeling face recognition software that they say provides quicker and more accurate matches than other 2D face recognition...

Most Recent Industry Reports

The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have not only been big buzzwords over the past decade, but they have also become core features of video...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP reported that the NYPD was using...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Exacq Favorability Results 2019 on Jan 17, 2019
Exacq favorability amongst integrators has declined sharply, in new IPVM statistics, compared to 2017 IPVM statistics for Exacq. Now, over 5 since...
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact