Axon Evidence Security
Understand the many security measures implemented by Axon Evidence, including access control, evidence integrity, and more. Learn More
Axon Cameras Security
Understand security safeguards, considerations, and recommendations for Axon Cameras. Learn More
Axon Fleet Security
Find out about the principles of Axon Fleet's commitment to information security and video evidence authenticity. Learn More
Axon View Security
Discover how Axon View protects the confidentiality and integrity of Axon body camera connectivity and video files. Learn More
Axon Dock Security
Understand how the Axon Dock plays its part to protect the confidentiality and integrity of Axon video files. Learn More
Axon Commander Security
Understand the security safeguards, considerations, and recommendations for your Axon Commander instance. Learn More
Security of The Axon Network
These are features and measures Axon has taken to secure Axon products and services.
VULNERABILITY IDENTIFICATION AND REMEDIATION
Axon conducts regular vulnerability assessments to improve Axon products, security controls, and processes. Identification programs for Axon Cloud Services include frequent vulnerability scans and scheduled penetration tests performed by independent firms and contractors. All identified vulnerabilities are evaluated by the Axon Information Security team, assigned remediation time frames, and tracked through remediation.
If you are interested in performing security testing of Axon products, please first review Axon’s Penetration Testing & Vulnerability Disclosure Guidelines.
SECURITY MONITORING AND RESPONSE
Axon employs a dedicated Security Operations team to monitor the security of Axon Cloud Services, including Axon Evidence (Evidence.com). The team is equipped to immediately respond to threats and malicious actors.
Hackers and other malicious actors move fast, and they take advantage of entities that can’t keep their systems up to date and secure. Axon Cloud Services are delivered as Software as a Service and not only are security patches applied well within vendor recommendations, but Axon Cloud Services also ensure that Axon devices that are part of the Axon Network frequently receive security upgrades. These security updates and upgrades come out of the box with Axon Cloud Service licenses and do not require customer interaction. Axon's security upgrades and patches are applied during Axon Evidence's Maintenance Schedule.
By having a laser focus on security and aggressively investing to maintain such security, we are able to deploy and appropriately manage advanced security tools and threat prevention solutions that are cost- or resource-prohibitive to individual customers. Unlike what you would find with an off-the-shelf anti-virus software that you install yourself, we offer advanced protections that deter even the most sophisticated attackers. We have finely tuned web application firewalls, leverage security intelligence tools for continuous monitoring, and deploy layers of defense to detect and react to malicious activity.
REPORTING POTENTIAL SECURITY ISSUES OR VULNERABILITIES
If you know or suspect security issues with an Evidence.com account or if you believe you've discovered a security vulnerability on Evidence.com or with an Axon product, please email firstname.lastname@example.org with a thorough explanation of the issue or vulnerability. Any sensitive testing results or information should be transmitted to Axon using an encrypted communication channel. Our PGP key is available here: Axon Information Security (4CB2324C) – Public
We ask that you do not disclose any vulnerability information publicly or to any third party without coordination with Axon's Information Security team. Axon is committed to working with customers and the security researcher community to validate and address reported potential vulnerabilities. Further information regarding this commitment is outlined in Axon’s Penetration Testing & Vulnerability Disclosure Guidelines.
All non-security related issues should be directed to Axon Customer Support.