We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers.
Castel’s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security performance (LOPPSI), to minimise the risks of digital and physical attack. To achieve this, we have innovated to restrict the attack surface of our solutions. Our products are cybersecure, vandal-proof and offer an appropriate response in the event of malicious intent.
NETWORK SECURITY
> Connection authentication on Ethernet networks via the 802.1X protocol and Radius servers (RFC 2865)
> Failover solution for reliable remote management
> VLAN support
> Security certificates adaptable to your requirements Genuine onboard firewall allowing you to define restrictions by service and by IP address
ENCRYPTION
> The configuration web pages are fully TLS 1.3 secure
> The call setup is encrypted using SIP TLS
UPDATES
> Regular firmware updates over several years
> Use of an operating system that is highly monitored for security flaws and guaranteed for correction maintenance over the long term
> Continuous improvement of security bricks and functionalities
PASSWORD POLICY
> Advanced password encryption
> The database storing encrypted passwords is secure
> Possibility of setting constraints on password complexity and periodic renewal
> Different password policy for different account types (user/administrator)
SECURITY LEVEL TAILORED TO YOUR NEEDS
> A wizard guides you during commissioning toward the solution best suited to your needs
> Native locking of unused ports
> The level of security evolves with your expectations
INTRUSION AND VULNERABILITY TESTING
> Each firmware version undergoes several series of intrusion tests and is evaluated for improvements or corrections before delivery
> The security event log is non-erasable and tamper-proof
ETHERNET CONNECTION SECURITY
To secure the Ethernet socket on your IP intercom, accessible from outside the area secured by the access control system, Castel has developed effective solutions to prevent any unauthorised use of its network connection.
The first native barrier is its Radius authentication mode. This software solution blocks access to the network by hardware that is not recognised by the server.
The Castel IP Protect solution physically breaks the network connection in the event of tampering. Castel offers various opening detection technologies to enable this solution.