Secure by Default

Verkada’s solution is secure out of the box, featuring end-to-end data encryption.

Introduction

Security was top of mind when designing Verkada. That’s why we redesigned video security infrastructure, and built a system that’s secure from the ground up.

  • Hardware Security

    30+ days of video securely encrypted on solid state storage

    Encrypted at rest

    AES 128

  • Network Security

    Video feeds, thumbnails, firmware updates, and settings securely transmitted between cloud and device

    Encrypted in transit

    AES 128, TLS v1.2

  • Cloud Security

    Archived videos, thumbnails, user history, audit logs securely stored in AWS

    Encrypted at rest

    AES 256

  • Application Security

    2-factor authentication, RBAC, SAML / SSO integration provides secure access across platforms

    Encrypted in transit

    AES 128, TLS v1.2

Hardware Security

At Verkada, cybersecurity isn’t a last minute addition. We build our cameras secure from the very first step, starting with our design for the hardware and systems that store data on camera.

  • Trusted Manufacturers

    Our camera hardware is manufactured by trusted partners who adhere to the same stringent security policies that we do.

  • Firmware Signing

    Each piece of code that we ship is ‘signed’ with Verkada’s secret key. That means nobody can run code on our cameras but us.

  • Durable Design

    Torx Screws and IK10 rated impact protection mean that our cameras are some of the most durable and tamper-resistant on the market.

  • Tamper Detection

    Proprietary Algorithms and a built-in accelerometer are specifically tuned to detect physical and occlusive sabotage.

Network Security

Network security is one of the most critical components for any cloud-connected infrastructure. At Verkada, we pull out all the stops to ensure that your data is protected as it’s transmitted over the network.

  • Encryption in Transit

    We encrypt all data that is sent over the network with AES 128 standards. On top of that, we exclusively use HTTPS over TLS v1.2 to add an extra layer of security.

    Encryption means any malicious interception (be it MITM or Eavesdropping) is neither fatal nor compromising.

  • Compliance

    Because of our commitment to security and durability, we are compatible with most major industry regulations. Robust user management, extended storage options, and strict security protocols enable our users to comply with some of the most stringent electronic standards, including GDPR, PCI, and HIPAA.

  • Required Network Settings

    All Verkada-powered security ecosystems are configured to follow our network protocol guidelines.

    This is how we offer industry-leading security practices, even on your local or personal network.

  • No Port-Forwarding

    Solely employing HTTPS traffic means that all of our data enters and exits through the secure Port 443.

    We never utilize Port-Forwarding, a major vulnerability of traditional NVR systems.

Cloud Security

Everything is hosted on Amazon’s AWS servers, which features the best data security and reliability in the world.

  • AWS Security Measures

    Amazon has exceptional security protocol for their web services. Read more about Security, one of Amazon’s five pillars of their Well-Architected Framework.

  • At-Rest Encryption

    At rest, we encrypt all of your footage and other sensitive data using AES 256, one of the most cryptographically secure encryption algorithms currently used in industry.

  • Automatic Cloud Backup

    Verkada cameras can automatically sync their local storage to the cloud. That means no matter what happens on-site, or even to the camera itself, your data will be safe and sound.

  • Reliability

    AWS and our cloud architecture eliminate any single point of failure in your security system. Our Business Continuity Plan ensures redundancy and reliability, even in the event of catastrophe.

Application Security

Security starts with us, but extends to each user who logs into our software. Verkada gives you the tools you need to control who has access to your system, and what they do with that access.

  • Single Sign On

    We partner with the most trusted Single Sign-On providers in the industry, including Okta, Onelogin, Google Business Apps and Azure Active Directory.

  • Multi-Factor Authentication

    If you prefer not to use SSO, we also offer a robust Multi-Factor Authentication system, partnered with industry-leading MFA providers including: Duo, Lastpass, RSA, Google Authenticator.

  • Role Based Access Control

    Easily customizable individual and group access settings allow you to thoughtfully assign access to only the right people.

  • Audit Logs

    Comprehensive audit logs help reveal who has accessed your system, and any changes they have made.

  • Automatic Software Updates

    Verkada’s Cameras are designed to apply firmware updates automatically during off hours (to keep bandwidth usage low). That means you’ll never miss out when we roll out new features or critical security updates.

  • Regular Penetration Testing

    We employ an independent security firm to continually run penetration tests on our systems. This is how we find and fix security exploits before they ever threaten our customers.

Try Verkada For Free

30-day trial includes camera and full access to management platform.

Start a Free Trial