Applications; Cybersecurity - Axis P47-PLVE Series User Manual

Panoramic camera
Table of Contents

Advertisement

AXIS P47-PLVE series
Learn more
1
Target bitrate
2
Actual average bitrate

Applications

With applications, you can get more out of your Axis device. AXIS Camera Application Platform (ACAP) is an open platform that
makes it possible for third parties to develop analytics and other applications for Axis devices. Applications can be preinstalled on the
device, available for download for free, or for a license fee.
To find the user manuals for Axis applications, go to help.axis.com.
Note
• Several applications can run at the same time but some applications might not be compatible with each other. Certain
combinations of applications might require too much processing power or memory resources when run in parallel. Verify
that the applications work together before deployment.
AXIS Object Analytics
AXIS Object Analytics is an analytic application that comes preinstalled on the camera. It detects objects that move in the scene and
classifies them as, for example, humans or vehicles. You can set up the application to send alarms for different types of objects. To
find out more about how the application works, see AXIS Object Analytics user manual.

Cybersecurity

Signed firmware
Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this
signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware
integrity is compromised, the firmware upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable
memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized
firmware.
Axis Edge Vault
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It offers features to guarantee the
device's identity and integrity and to protect your sensitive information from unauthorized access. It builds on a strong foundation of
cryptographic computing modules (secure element and TPM) and SoC security (TEE and secure boot), combined with expertise in
edge device security.
kbit/s
53
1
2
s

Advertisement

Table of Contents
loading

This manual is also suitable for:

P4708-plveP4707-plve

Table of Contents