Download PDF version Contact company

Bosch Security Systems, Inc. is now providing dealers and integrators in North America cloud-based connectivity to its B and G Series intrusion control panels for remote programming and end-user app connectivity. The new Remote Connect cloud service makes it even faster and easier to connect to the control panels by eliminating the need to change customer router settings, firewall rules, or to use Domain Name Service (DNS) to access the systems remotely.

Connectivity

Installers simply create a services account with Bosch and then plug the panel into the network using the on-board Ethernet port or set up a cellular communication connection. The panel reaches out to the cloud without the need to configure the customer’s network for inbound communications. The connection allows Bosch’s Remote Programming Software (RPS) and the Remote Security Control app to connect securely from anywhere. Alarm communications are still sent directly to the central monitoring station using standard IP, cellular or PSTN (public switched telephone network) connections and do not utilize the cloud service.

Public Key Infrastructure Certificate

Bosch programs each cloud-ready B and G Series Control Panel with a unique Cloud ID and public key infrastructure (PKI) certificate, allowing mutually authenticated Transport Layer Security (TLS) connection to cloud services. Bosch is leading the intrusion market by adopting these advanced IT industry cryptology standards to prevent eavesdropping, substitution, and data tampering.

With this new service offering, security dealers and integrators have the option to connect direct to the panels or to use the Remote Connect cloud service, choosing the method that will best meet the needs and requirements of each end customer.

Save

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...