EZVIZ implements multi-layered methods to ensure that your device communicates encrypted data and performs firmware upgrades safely, while maintaining a secure operating system.
Every layer of data – from the EZVIZ cloud to the app and the connected device – is fully encrypted from end to end with AES encryption and TLS encryption protocols.
The user is the only owner of their information throughout the data lifecycle. EZVIZ requires complex, multi-step authentications to make sure only the user has access to their account and device data.
We do our best to provide continuous protection for our products through necessary security updates within the support period. These updates include bug fixes and new security features based on user feedback and industry best practices.
Each device downloads the upgrade package from the server with a strict two-way authentication mechanism, and the transmission channel of the firmware package uses the industry-recognized, secure HTTPS transmission channel.
After downloading the update package, the device will first perform a firmware integrity check to avoid updating a firmware package that has been maliciously tampered with or implanted with viruses.
The updated firmware of the device is reinforced with secure encryption algorithms to ensure that the firmware is encrypted during transmission.
EZVIZ devices follow the principle of minimizing the number of open ports, keeping only the functional ports open that are needed by the business to maintain the use of basic functions, and the non-business ports are all closed.
EZVIZ devices have joined the stack protection mechanism, which can effectively prevent the occurrence of buffer overflow or other problems that cause the device to crash and become unusable.
All ports and protocols open on the device must be authenticated and verified prior to interaction, and no data messages will be received if they have not passed authentication or verification. All external input parameters received by the device are subjected to data validation and data filtering, which can effectively prevent buffer overflow, stack overrun and other problems.
All ports and protocols that interact with the device for authentication or certification are equipped with protection measures against brute force attacks that effectively prevent attackers from bypassing the authentication and verification of the device using enumeration techniques.
EZVIZ develops a reliable, disaster-tolerant infrastructure, and applies strict network and storage security principles to protect users' data to the highest degree.
To ensure smooth, secure and continuous use of EZVIZ products and services for our global users, EZVIZ has developed a network of globally distributed cloud servers by flexibly deploying data and systems in different data centers and regions to meet local laws and regulations, as well as the company's disaster tolerance requirements.
We partner with market-leading service providers including Amazon Web Services (AWS) and Alibaba Cloud to ensure your data is protected by the best of the best in the industry.
Our products are private by design and supported by privacy enhancing technologies and flexible privacy control features.
We are committed to being transparent in our handling of data. For the EZVIZ websites and the EZVIZ App, we update and publish their privacy policies regularly, and inform users with clear texts when you register EZVIZ accounts or choose to enable privacy-associated features.
We design camera products with built-in privacy features and develop useful, easy-to-use control options and user settings. You can use these to feel secure when using EZVIZ products in private areas, customize your privacy preferences and manage your data confidently.