Cybersecurity
Your trusted partner in managing video data security
You can count on Milestone to offer reliable security against external and internal threats, ensuring your operations remain resilient and responsive in the face of evolving challenges.


Dedicated to security and privacy  
At Milestone, we integrate security and privacy into every aspect of our technology. Our approach extends from initial design to ongoing vigilance against new and emerging threats, ensuring our products not only meet rigorous security standards but also actively protect your privacy.

Explore our commitment to secure and responsible technology

Learn more about how our security practices and our use of responsible technology are shaping safer and more secure environments. Dive deeper into our commitment to cybersecurity and privacy with our curated selection of customer stories, articles and whitepapers. 
Frequently asked questions 
Got questions? We’ve got answers. Browse through our FAQ section for more information on our cybersecurity practices, privacy policies, and more. Get detailed explanations to better understand how we protect, enhance security and safeguard privacy. 

How does Milestone keep the knowledge and practice described in the SDL current with employees?

All new Milestone developers receive onboarding training that includes Security Development Lifecycle (SDL) training. Existing staff get updates when SDL changes. Security champions ensure teams follow SDL processes, staying informed through the cybersecurity team, which manages the SDL. 

My VMS is not a business-critical system in my organization, so why do I need to worry about security for my VMS? 

Even if the VMS is not a business-critical component, it can be used as a stepping stone for attacking other business-critical systems in your organization if it isn’t kept secure. Keeping the VMS secure helps protect your other business-critical systems.

My VMS runs in an air-gapped network, so why do I need to worry about security? The network cannot be reached from the Internet, so I’m safe – right? 

Even in air-gapped networks, VMS installations require strong security measures, and proper access control and protection of media confidentiality are essential, as threats aren't limited to the Internet 

If I find and report a vulnerability, does Milestone offer a reward for finding the vulnerability?

Milestone currently does not offer rewards for finding vulnerabilities.

Does an organization using video management software require special precautions due to video media handling? 

As with all IT systems, handling data which may be personal requires confidentiality. It is important that appropriate security measures, like encryption and permission controls are implemented.   

Is it necessary to regularly update cameras, servers, and the VMS? 

Yes. New threats appear all the time and keeping systems updated provides the best protection against new threats. Generally, updating twice a year is a good general rule, but ideally, updates should be applied as soon as they are released. 

Do I really need separate VLANs for my cameras, my VMS clients and corporate network? 

No, but in many cases, it increases security by adding additional security layers. For instance, it can stop security threats from the VMS client or corporate network spreading to the camera and VMS network, and vice versa.

You will be logged out in
5 minutes and 0 seconds
For your security, sessions automatically end after 15 minutes of inactivity unless you choose to stay logged in.