Resources
Security
Cloud Security
Learn More
Network Security
Learn More
Application Security
Learn More
Cloud Security
LiveReach AI's products and services are built on top of AWS which features some of the best security and reliability on the planet.
01
AWS Security Measures
Amazon has exceptional security protocols for their web services. Read more about Security, one of Amazon’s five pillars of their Well-Architected Framework.
02
At-Rest Encryption
At rest, we encrypt all of your footage and other sensitive data using AES 256, one of the most cryptographically secure encryption algorithms currently used in industry.
03
Automatic Analytics Cloud Backup
The LiveReach-AI-NVR backs up all analytics to the cloud. No matter what happens on site, your analytics data will be safe and sound.
Network Security
LiveReach's networking stack is designed to put IT teams at ease. Our experience in large venues such as airports has hardened and shaped our industry leading approach.
01
Cloud-Based + On-Prem User Access
We encrypt all data that is sent over the network with AES 128 standards. On top of that, we exclusively use HTTPS over TLS v1.2 to add an extra layer of security. Encryption means any malicious interception (be it MITM or Eavesdropping) is neither fatal nor compromising.
02
No Inbound Connections
The LiveReach-AI-NVR doesn't require any inbound connections, keeping our hardware secure from bad actors.
03
Required Network Settings
Siphon users off based on whether they are accessing the platform in the cloud or on-premise. We've added an extra layer of security for our airport partners and other venues sensitive to video footage leaving the premise.
04
No Port-Forwarding
Solely employing HTTPS traffic means that all of our data enters and exits through the secure Port 443. We never utilize Port-Forwarding, a major vulnerability of legacy security systems.
Application Security
LiveReach partners with the most trusted Single Sign-On (SSO) providers in industry, including Okta, Onelogin, Google Business Apps and Azure Active Directory. If you prefer to use 2 Factor Authentication, we offer that too.
Even in the event an unintended party gains access, LiveReach’s cloud gives you tools like Audit Logs and individual user permissions. These empower admins to revoke access to specific users at will and identify what they saw or changed.
01
Single Sign On
We partner with the most trusted Single Sign-On providers in the industry, including Okta, Onelogin, Google Business Apps and Azure Active Directory.
02
Multi-Factor Authentication
If you prefer not to use SSO, we also offer 2FA using Google Authenticator.
03
Role Based Access Control
Easily customizable individual and group access settings allow you to thoughtfully assign access to only the right people.
04
Audit Logs
Comprehensive audit logs help reveal who has accessed your system, and any changes they have made.
05
Automatic Software Updates
All devices have a designated upgrade window during off hours meaning you'll never miss out on video recordings while we roll out new software features and upgrades.
06
Regular Penetration Testing
We employ an independent security firm to continually run penetration tests on our systems. This is how we find and fix security exploits before they ever threaten our customers. Pen test information can be sent on request.
Layer your Security Footage with Artificial Intelligence
Discover. Quantify. Respond.