We have reduced pricing on several of our product lines. Learn more

        Thousands of companies across hundreds of industries, government agencies, universities, and more have standardized on Crestron products. They trust and rely on us to make their lives simpler and more successful every day. Central to that success is Crestron’s unwavering commitment to network security. Simply put, “If it’s on the network, it must be secure.” Clients need to know who and what is on their network.

        Crestron sets the gold standard for network security by leveraging the most advanced technologies including 802.1x authentication, AES encryption, Active Directory® credential management, JITC Certification, SSH, secure CIP, PKI certificates, TLS, and HTTPS, among others, to provide network security at the product level. Many enterprise IT departments categorize devices that don’t support these features as a security risk. Quite simply, the Crestron security feature set is unmatched in the industry:

        • AES Encryption
          Ensures secure transmissions. The same protocol banks use to protect transactions on the Internet.
        • 802.1x Authentication
          Ensures that every device on the network is explicitly authorized by the IT department.
        • Active Directory®
          Centralized credential management ensures that only authorized users gain access.
        • JITC Certification
          Crestron products have received approval by the Joint Interoperability Test Command (JITC) of the U.S. Department of Defense Information Systems Agency (DISA) and have been added to the Unified Capabilities (UC) Approved Products List (APL).
        • PKI Authentication
          Required when simple passwords are inadequate to confirm the identity of the parties involved in a particular action or communication, and to validate the information being transferred.
        • TLS
          The most widely used security protocol, TLS provides privacy and data integrity between two applications communicating over a network.
        • SSH Network Protocol
          Encrypts and protects communications, whereas Telnet, used in other Network AV products, does not.
        • HTTPS
          The secure version of HTTP, HTTPS encrypts the data sent between your web browser and the website you’re connected to, ensuring the privacy and integrity of the exchanged data. The “S” at the end of HTTPS stands for “Secure.”
        • Secure CIP
          Ensures communications between Crestron control processors and DM NVX devices are secure. 

        For the latest details from Crestron on security and safety on the Internet, visit here.