User Manual

Siveillance Vantage
The command and control solution from Siemens,
Siveillance Vantage, is specifically designed to support
security management at critical infrastructure sites, indus-
trial complexes, campus-type environments, or multi-site
applications. It offers precisely the kind of on-time support
needed to react effectively to security and safety incidents
at any time.
Cybersecurity measures in Siveillance Vantage
Both Siveillance Vantage and Viewpoint product develop-
ment processes integrate the following Security by Design
elements:
Certificate-based data exchange
Certificates are an important way to define a trusted
source of communication. They establish that a server,
for example, is not an imposter but rather is already
known and can be trusted. Siveillance Suite seamlessly
integrates certificates in our customers’ IT infrastructure.
LDAP-based authentication
LDAP stands for lightweight directory access protocol,
a defined protocol for authentication and authorization.
The most common use of LDAP is Microsoft’s Active
Directory, which applications (including our products)
can use to log in using their Windows accounts as
opposed to application-specific logins.
Secure encrypted communication (HTTPS, SSH)
Encrypted communication is important for our customers
in order to prevent man-in-the-middle attacks and
ascertain that sensitive security data cannot be inter-
cepted or changed in transit. HTTPS is one of these
communication protocols, and it is the de facto standard
for secure web communication. SSH is a secure shell
communication protocol that is the default for terminal
access to Linux servers.
Siveillance Viewpoint
Our innovative and powerful physical security information
management (PSIM) solution Siveillance Viewpoint
supports mid- to large-sized industrial customers in
managing risks while reducing operational costs.
It is a single platform that integrates all subsystems using
open integration methods and provides our customers with
a comprehensive security view of their physical business
landscape.
Cybersecurity measures in Siveillance Viewpoint
Both Siveillance Vantage and Viewpoint product develop-
ment processes integrate the following Security by Design
elements:
Certificate-based data exchange
Certificates are an important way to define a trusted
source of communication. They establish that a server,
for example, is not an imposter but rather is already
known and can be trusted. Siveillance Suite seamlessly
integrates certificates in our customers’ IT infrastructure.
LDAP-based authentication
LDAP stands for lightweight directory access protocol,
a defined protocol for authentication and authorization.
The most common use of LDAP is Microsoft’s Active
Directory, which applications (including our products)
can use to log in using their Windows accounts as
opposed to application-specific logins.
Secure encrypted communication (HTTPS, SSH)
Encrypted communication is important for our customers
in order to prevent man-in-the-middle attacks and
ascertain that sensitive security data cannot be inter-
cepted or changed in transit. HTTPS is one of these
communication protocols, and it is the de facto standard
for secure web communication. SSH is a secure shell
communication protocol that is the default for terminal
access to Linux servers.
Siveillance Suite portfolio in detail
Siveillance Suite incident management

Siveillance Suite™ | Cyberintelligent security solutions